For business inquiries : (+971) 561803315

For special requests : (+971) 561803315

A propos de la formation CISSP ISC2

CISSP, the foremost certification in information security, is the focus of our training program in Toronto, Canada. Geared towards providing participants with the technical and administrative skills required for designing and managing an organization's security, the training covers the eight domains of CISSP common body knowledge (CBK). This comprehensive preparation aims at success in the CISSP exam administered by (ISC)², a globally recognized nonprofit organization dedicated to advancing information security standards. CISSP stands as a hallmark of excellence and a highly esteemed achievement in the field.

Détails
Objectifs pédagogiques de la formation CISSP ISC2
  • Gain a comprehensive understanding of IT security fundamentals. Align organizational goals with effective security functions. Safeguard valuable assets of the organization
  • Implement- design- monitor and secure operating systems- networks and applications
  • Recognize the importance of cryptography for modern security services
  • Implement physical security protection measures
  • Comprehend communication and network security concepts
  • Apply both physical and logical access controls effectively.

Qui devrait suivre cette formation CISSP ISC2 ?

Public visé par la formation CISSP ISC2

CISO, CIO, Security Directors, IT Managers, Security Professionals, and Network Architects.  

Prérequis de la formation CISSP ISC2

Minimum 5 years of relevant work experience in two or more CISSP domains or a one-year experience waiver with a 4-year college degree or equivalent credential.

Formations Similaires

Déroulé de la formation CISSP ISC2


Module 1: Security and Risk Management

Understand and Apply Security Concepts

Evaluate and Apply Security Governance Principles

Determine Compliance and Other Requirements

Legal and Regulatory Issues in a Global Information Security Context

Requirements for Various Investigation Types

Develop, Document, and Implement Security Policy, Standards, Procedures, and Guidelines

Identify, Analyze, and Prioritize Business Continuity (BC) Requirements

Contribute to and Enforce Personnel Security Policies and Procedures

Understand and Apply Risk Management Concepts

Understand and Apply Threat Modeling Concepts and Methodologies

Apply Supply Chain Risk Management (SCRM) Concepts

Establish and Maintain a Security Awareness, Education, and Training Program

Understand, Adhere to, and Promote Ethics


Module 2: Asset Security

Identify and Classify Information and Assets

Establish Information and Asset Handling Requirements

Provision Resources Securely

Manage Data Lifecycle

Ensure Appropriate Asset Retention

Data Security Controls and Compliance Requirements


Module 3: Security Architecture and Engineering

Research, Implement, and Manage Engineering Processes Using Secure Design Principles

Fundamental Concepts of Security Models

Select Controls Based Upon Systems Security Requirements

Security Capabilities of Information Systems

Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements

Cryptographic Life Cycle

Methods of Cryptanalytic Attacks

Apply Security Principles to Site and Facility Design

Design Site and Facility Security Controls
 

Module 4: Communication and Network Security

Implement Secure Design Principles in Network Architectures

Secure Network Components

Implement Secure Communication Channels According to Design


Module 5: Identity and Access Management (IAM)

Control Physical and Logical Access to Assets

Manage Identification and Authentication of People, Devices, and Services

Integrate Identity as a Third-Party Service

Implement and Manage Authorization Mechanisms

Manage the Identity and Access Provisioning Lifecycle

Implement Authentication Systems


Module 6: Security Assessment and Testing

Design and Validate Assessment, Test, and Audit Strategies

Conduct Security Control Testing

Collect Security Process Data

Analyze Test Output and Generate Reports

Conduct or Facilitate Security Audits


Module 7: Security Operations

Understand and Support Investigations

Requirements for Various Investigation Types

Conduct Logging and Monitoring Activities

Securely Provision Resources

Understand and Apply Foundational Security Operations Concepts

Apply Resource Protection Techniques

Conduct Incident Management

Operate and Maintain Detective and Preventative Measures

Implement and Support Patch and Vulnerability Management

Participate in Change Management Processes

Implement Recovery Strategies


Module 8: Software Development Security

Integrate Security in the Software Development Life Cycle (SDLC)

Identify and Apply Security Controls in Development Environments

Assess the Effectiveness of Software Security

Assess Security Impact of Acquired Software

Define and Apply Secure Coding Guidelines and Standards

 

Formations Similaires
CISSP ISC2 Détails
GIAC Certified Incident Handler Détails
Introduction to Shodan Détails

Vous pouvez faire l’inscription ou la demande du devis avec un seul click