CISSP Certified Information Systems Security Professional Training

  • Learn via: Classroom / Virtual Classroom / Online
  • Duration: 5 Days
  • We can host this training at your preferred location. Contact us!
Upcoming Training

19 April 2021

5 Days

Aimed at security professionals, this course surveys the entire information security landscape and the technologies involved. The course addresses the eight knowledge domains that comprise the common body of knowledge (CBK) for information systems security professionals and will help delegates prepare for CISSP certification.

The course offers a theory based approach to the security process, with opportunities to discuss the immediate application of concepts and techniques described in the CBK to the real world. It can be considered as providing a good introduction to security management, architecture and engineering.

The course comprises of eight sessions that map directly to the (CBK), each one is theory based with instructor led discussions; there are no hands on labs.

Examinations:

  • To book the CBT exam requires the candidate to acquire a Pearson VUE testing voucher. Please note, the price of the voucher is not included in the RRP of this course
  • https://www.isc2.org/certification-register-now.aspx
  • Delivery Method - Computer Adaptive Testing (CAT)
  • Length of exam – Up to 3 hours
  • Number of questions – 100 – 150
  • Question format – Multiple choice and advanced innovative questions
  • Passing grade – A passing score is 700 out of 1000 points


Q. If I have been studying for the CISSP exam with material that focuses on the current domains, will I be sufficiently prepared to take the new exam without additional study?

A. (ISC)² exams are experience-based that include experience-based questions that cannot be learned by studying alone. If you already have the experience in the domains covered in CISSP and believe that you have sufficiently studied those domains, you should feel confident that you are qualified to take the new exam and pass it. (ISC)² cannot guarantee you will pass the exam.

Delegates should have experience in at least two of the domains in the (CBK), for 5 years or more (4 years if they have achieved relevant industry or degree level certifications) to achieve full certification. Associate status can be achieved without the full 4/5 years experience; full certification will be assigned when the correct amount of experience is obtained.

  • We recommend delegates have some knowledge of all CBK domains and are encouraged to read one or two of the books on the Reading List at ISC2.org.
  • Bilginç IT Academy will provide a CISSP guide book as pre-reading. It is expected that delegates review the guide and gain an appreciation of the key concepts in each of the eight CISSP domains in advance of the course. However, we do not expect delegates to be familiar with all the details of the guide book in advance of the course itself.


We recommend that work completed in the classroom is complemented by extra reading to ensure success in the exam. The amount of extra reading required will depend on the amount of experience the delegate has. The 'mile wide, inch deep' description indicates the challenge to most delegates, not all will have 'hands on' experience spanning all 8 domains of the CBK.

Module 1. Security and Risk Management

  • Understand and apply concepts of confidentiality, integrity and availability
  • Apply security governance principles
  • Compliance
  • Understand legal and regulatory issues that pertain to information security in a global context
  • Understand professional ethics
  • Develop and implement documented security policy, standards, procedures, and guidelines
  • Understand business continuity requirements
  • Contribute to personnel security policies
  • Understand and apply risk management concepts
  • Understand and apply threat modelling
  • Integrate security risk considerations into acquisition strategy and practice
  • Establish and manage information security education, training, and awareness


Module 2. Asset Security

  • Classify information and supporting assets
  • Determine and maintain ownership
  • Protect privacy
  • Ensure appropriate retention
  • Determine data security controls
  • Establish handling requirements


Module 3. Security Engineering

  • Implement and manage engineering processes using secure design principles
  • Understand the fundamental concepts of security models
  • Select controls and countermeasures based upon systems security evaluation models
  • Understand security capabilities of information systems
  • Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements
  • Assess and mitigate the vulnerabilities in web-based systems
  • Assess and mitigate vulnerabilities in mobile systems
  • Assess and mitigate vulnerabilities in embedded devices and cyber-physical systems
  • Apply cryptography
  • Apply secure principles to site and facility design
  • Design and implement physical security


Module 4. Communication & Network Security

  • Apply secure design principles to network architecture
  • Secure network components
  • Design and establish secure communication channels
  • Prevent or mitigate network attacks


Module 5. Identity & Access Management 

  • Control physical and logical access to assets
  • Manage identification and authentication of people and devices
  • Integrate identity as a service
  • Integrate third-party identity services
  • Implement and manage authorization mechanisms
  • Prevent or mitigate access control attacks
  • Manage the identity and access provisioning lifecycle


Module 6. Security Assessment & Testing

  • Design and validate assessment and test strategies
  • Conduct security control testing
  • Collect security process data
  • Analyse and report test outputs
  • Understand the vulnerabilities of security architectures


Module 7. Security Operations

  • Understand and support investigations
  • Understand requirements for investigation types
  • Conduct logging and monitoring activities
  • Secure the provisioning of resources
  • Understand and apply foundational security operations concepts
  • Employ resource protection techniques
  • Conduct incident management
  • Operate and maintain preventative measures


Module 8. Software Security Development

  • Understand and apply security in the software development lifecycle
  • Enforce security controls in development environments
  • Assess the effectiveness of software security
  • Assess security impact of acquired software


CISSP and CBK are registered certification marks of (ISC)2, Inc.



Contact us for more detail about our trainings and for all other enquiries!

Blog posts related to CISSP Certified Information Systems Security Professional Training

FREE CYBER SECURITY RESOURCES FOR REMOTE WORKERS!

During the COVID-19 crisis, the transition to remote online working system and what can be done to ensure cyber security are on the agenda. Some security programs have taken action to help organizations better protect their networks. During the COVID...

NEW YORK AIRPORT RANSOMWARE ATTACK

New York Airport were attacked by Ransomware over Christmas!According to officials, New York Airport and its computing management provider were attacked by Ransomware. The attack discovered on Christmas day encrypted administrative files such as budg...

Upcoming Trainings

Join our public courses in our Istanbul, London and Ankara facilities. Private class trainings will be organized at the location of your preference, according to your schedule.

19 April 2021

5 Days
Classroom / Virtual Classroom

Istanbul, Ankara, London
Istanbul, Ankara, London

10 May 2021

5 Days
Classroom / Virtual Classroom

Istanbul, Ankara, London
Istanbul, Ankara, London

17 May 2021

5 Days
Classroom / Virtual Classroom

Istanbul, Ankara, London
Istanbul, Ankara, London

07 June 2021

5 Days
Classroom / Virtual Classroom

Istanbul, Ankara, London
Istanbul, Ankara, London

28 June 2021

5 Days
Classroom / Virtual Classroom

Istanbul, Ankara, London
Istanbul, Ankara, London

12 July 2021

5 Days
Classroom / Virtual Classroom

Istanbul, Ankara, London
Istanbul, Ankara, London

23 August 2021

5 Days
Classroom / Virtual Classroom

Istanbul, Ankara, London
Istanbul, Ankara, London

06 September 2021

5 Days
Classroom / Virtual Classroom

Istanbul, Ankara, London
Istanbul, Ankara, London

27 September 2021

5 Days
Classroom / Virtual Classroom

Istanbul, Ankara, London
Istanbul, Ankara, London

Related Trainings

Certified Information Security Manager (CISM)

This Certified Information Security Manager (CISM) training course focuses on the construction, de...

  • Classroom
  • Virtual Classroom
  • Online

4 Day

Certified ISO 27001 Practitioner

This Certified ISO27001 Practitioners training course will provide delegates with the requirements...

  • Classroom
  • Virtual Classroom
  • Online

5 Day

Foundation Certificate in Cyber Security

The objective of the course is to provide a comprehensive but necessarily high level overview acro...

  • Classroom
  • Virtual Classroom
  • Online

5 Day

BCS Certificate in Information Security Management Principles

A thorough, practical, 5 day course designed to provide the knowledge and skills required to manage...

  • Classroom
  • Virtual Classroom
  • Online

5 Day

Certified in The Art of Hacking

Securing customer data is often crucial when deploying and managing web applications and network i...

  • Classroom
  • Virtual Classroom
  • Online

5 Day

Certified Information Systems Auditor (CISA)

Certified Information Systems Auditor (CISA) is a globally acknowledged certification, which builds...

  • Classroom
  • Virtual Classroom
  • Online

4 Day