CISSP Certified Information Systems Security Professional

Learn to detect and prevent threats.

ABOUT THE PROGRAM

Security Professionals are need of almost every organisation. The system may undergo through any software or network attack, therefore, to save the confidential data we need some security measures.

MSP Training’s CISSP Certified Information Systems Security Professional course is designed to provide in-depth knowledge and skills to design, organise and manage IT security programs.

 

  • Learn to secure and manage the organisation

  • Delivered by certified trainers in luxury venues

  • Designed mainly for security managers

  • Key learning points and tutor support

WHAT'S INCLUDED ?

Find out what's included in the training programme.

Includes

Key Learning Points

Clear and concise objectives to guide delegates through the course.

PREREQUISITES

CISSP Certified Information Systems Security Professional course doesn’t have any prerequisites.

TARGET AUDIENCE

This course is best suited for the following audience:

  • Security Managers
  • Security Systems Engineers
  • Security Consultants
  • Chief Information Security Officers
  • IT Managers
  • Security Auditors
  • Security Architects

WHAT WILL YOU LEARN?

Upon the course completion, the delegate will learn to:

  • Perform security assets and engineering
  • Develop secure software development
  • Network Safety and Security operations

Enquire Program

Fill in the form below & we'd get back to you.

PROGRAM OVERVIEW

During CISSP Certified Information Systems Security course, the delegates will learn how to detect and prevent system threats. The course will provide knowledge about Risk Management, Security Engineering, Network Security and Security Operation. The candidates will gain skills as mentioned below:

  • Security Assessment
  • Security Operations
  • Software Security Development

PROGRAM CONTENT

Introduction to Information System Security

  • Define IT Security
  • Confidentiality, integrity, and availability
  • Define Security Principles
  • Security Policy, Morals, Activities, and Approaches
  • Understanding business needs
  • Legal and managerial matters for information security
  • Classify professional philosophies

Introduction to Risk Management

  • Define risk management
  • Threat modelling
  • Integrate security risk into plan
  • Awareness of information security
  • Risk Safety
  • Retentive confidentiality, integrity and obtainability security principles
  • Security policies and standards
  • Applying compliance
  • Effective risk management
  • Evaluating threats and vulnerabilities
  • Risk detection and control
  • Qualitative and Quantitative analysis
  • Business Continuity Management
  • Define Business Continuity Management Code
  • Business impact analysis
  • Define Legal Events Monitoring
  • Analysing intelligent property, obligation and law
  • Define computer crime
  • Define ethical behaviour and compliance

Introduction to Asset Security

  • Organising information
  • Supporting properties
  • Possession controlling and maintain tenancy
  • Protect privacy
  • Asset Identification
  • Data safety controls
  • Categorisation and Prioritisation

Introduction to Security Engineering

  • Define secure design principles
  • Implement manufacturing processes
  • Define security models
  • Define cryptography
  • Define Security abilities
  • Measure flaws in mobile systems
  • Security models and frameworks
  • Information Security Triad and multi-level models
  • Examining industry morals: ISO 27001/27002
  • Security model essential concepts
  • Exploring system and component security concepts
  • System design ideas, competencies, and boundaries
  • What are mobile systems vulnerabilities?
  • Defensive information by relating cryptography
  • Symmetric and asymmetric encryption systems
  • Cryptographic systems threats
  • Protection of physical capitals
  • Planning environments to resist intimidating threats
  • Rejecting unauthorised access

Introduction to Network Security and Communication

  • Investigating Secure network works
  • Planning and executing secure communication
  • Prevent or decrease network spams

Introduction to Access & Identify Management

  • Logical and physical access to control properties
  • Managing documentation and confirmation of devices
  • Assimilate individuality as a service
  • Assimilate third-party identity amenities
  • Apply and attain authorization tools
  • Avoid or ease access control attacks
  • Manage the individuality and access provisioning lifecycle
  • Managerial access to protect possessions
  • Describing administrative, technical and physical controls
  • Implementing centralised and decentralised methods
  • Monitoring biometric and multi-factor verification
  • Categorizing common dangers
  • Studying cloud services and architecture

Introduction to Security Assessment & Testing

  • Define Security Assessment & Testing
  • Plan and evaluate test plans
  • Conduct and collect security control testing
  • Reviewing and reporting test outputs
  • Sympathetic flaws of security architectures
  • Planning and showing security valuation methods
  • Helping the role of testing and monitoring to the competence of security controls
  • Distinctive detection and protection systems
  • Showing logging and monitoring methods
  • Distinctive roles of internal and external reviews
  • Labelling secure account management

Introduction to Security Operations

  • Define inquiries
  • Understand supplies for investigation types
  • Service resource protection methods
  • Conduct incident management
  • Conducting logs and observing actions
  • Understand the foundational security processes thoughts
  • Understanding Function and sustain preventative events

Introduction to Software Security Development

  • Software development lifecycle
  • Security controls in development environment

CISSP Certified Information Systems Security Professional Enquiry

 

Enquire Now


----- OR -------

Reach us at 0121 368 7851 or info@msptraining.com for more information.

ABOUT Canterbury

Canterbury is a historic cathedral city located on the River Stour in the Southeast England. It is located 55 miles southeast of London with a population of around 43,432 in 2011 census. The nearby villages and suburbs of the city include Rough Common, Harbledown, Tyler Hill, Hales Place, Sturry, and Wincheap. The River Stour segregates the south-east part of the city into two wings, one wing flowing through the city and other around the position of the former walls. The two wings further combine on the northeast edge of the city. Canterbury local government district covers the area of Herne and Whitstable Bay and Member of Parliament elected in the city is Rosie Duffield of Labour Party. Under Local Government Act, the city became a county borough, later on, it lost its county borough status and afterward, Kent County Council has taken the full control.

History

The first early settlement of Canterbury dates back to prehistoric times. Romans captured the settlement of Celtic tribe in the 1st century and given the name Durovernum Cantiacorum. The city was redeveloped with the construction of the temple, public baths, theatre and roads with grid pattern by the Romans. They also built a wall with seven gates and an earth bank around the city to safeguard from Barbarians attack. After the abandonment of Roman period, Anglo-Saxon community developed within the city walls and trade developed in textile, pottery and leather sector.

The most serious epidemics Black Death affected the city in the 13th century and a population of the city declined from 10,000 to 3,000. Between 17th and 18th century, the castle of the city fell into disrepair and six gates were demolished. The silk industry was closed and trade was limited to only wheat and hops. The world’s first passenger railway came into existence in 1830 connected the town to a larger network of South Eastern Railway. The city was affected by First and Second World War destroyed 296 buildings and 731 homes and resulted in the death of 115 people. The redevelopment of the city took place ten years after the war and ring road was constructed to avoid growing problem of traffic congestion along with the development of Christ Church College and the University of Kent at Canterbury.

Economy

Canterbury is the second largest economy in the Kent and also known as wealthiest places in the south-east. The city is home to 4761 businesses provide job opportunities to more than 60,000 employees. Unemployment in the city has dropped largely with the involvement of Lakesview International Business Park, Whitefriars shopping complex and Canterbury Enterprise Hub. According to a survey in September 2011, unemployment rate recorded at just 5.7% which is quite low as compared to other cities of the England. Tourism plays a crucial role in the development of the city and contributes 258m dollars to the economy.

Education

Canterbury has several primary and secondary schools including Kings School, Barton Court Grammar School, The Canterbury High School and Archbishops School. For higher education, the city has three main universities and several other higher colleges and institutions providing education to 22% of the population according to 2011 census. The universities include the University of Kent, University for the Creative Arts and Canterbury Christ Church University.

Tourism

The city is famous for its beautiful beach fronts, stunning architecture, surrounding coastal towns and world-famous buildings. The tourism of the city is a perfect combination of city, countryside, and coast. The city is also a pilgrimage site and its renowned cathedral is recognised by UNESCO World Heritage Site drawing the attention of million tourists. The top rated tourist attractions in the city include Canterbury Cathedral, St Augustine’s Abbey, Heritage Museum, Norman Castle, Roman Museum, Chilham Castle and St Martin’s Church.

CISSP