Course Description
The Certified Information Systems Security Professional (CISSP) course is an advanced-level certification program designed to validate the expertise and skills of information security professionals in managing and securing an organization's information assets. This globally recognized certification, developed by (ISC)², covers a comprehensive range of information security topics, ensuring that participants are well-prepared to handle real-world security challenges and implement robust security measures.
What you'll learn in this course?
- Develop, document, and implement comprehensive security policy, standards, procedures, and guidelines.
- Identify, analyze, and prioritize business continuity requirements to ensure organizational resilience.
- Understand and apply risk management concepts and methodologies to minimize potential threats.
- Implement and manage engineering processes using secure design principles to protect systems and data.
- Control physical and logical access to assets through effective identity and access management practices.
- Design and validate assessment, test, and audit strategies to ensure ongoing security effectiveness.
- Conduct logging, monitoring, and incident management activities to promptly respond to security events.
- Integrate security best practices into the Software Development Life Cycle (SDLC) to mitigate risks in software systems
Prerequisites
- A basic understanding of information security principles and practices.
- Familiarity with IT security concepts, such as confidentiality, integrity, and availability.
- Working knowledge of computer networks, including network architecture and security controls.
- Experience with IT governance and risk management processes.
- Awareness of relevant legal and regulatory requirements affecting information security.
- Knowledge of general security protocols and authentication methods.
- An understanding of data lifecycle management, including data retention, encryption, and secure destruction practices.
- Prior exposure to security policy development and the implementation of security standards and procedures.
- Some experience with security software and hardware tools used for security assessment and testing.
- Although not mandatory, it is beneficial to have some practical experience in an IT or information security role.
Course Curriculum
1. Understand, adhere to, and promote professional ethics
(ISC)2 Code of Professional Ethics
Organizational code of ethics
2. Understand and apply security concepts
Confidentiality, integrity, and availability, authenticity and nonrepudiation
3. Evaluate and apply security governance principles
Alignment of the security function to business strategy, goals, mission, and objectives
Organizational processes (e.g., acquisitions, divestitures, governance committees)
Organizational roles and responsibilities
Security control frameworks
Due care/due diligence
4.Determine compliance and other requirements
Contractual, legal, industry standards, and regulatory requirements
Privacy requirements
5. Understand legal and regulatory issues that pertain to information security in a holistic context
Cybercrimes and data breaches
Licensing and Intellectual Property (IP) requirements
Import/export controls
Transborder data flow
Privacy