Pour les demandes entreprises : (+212) 703173603
Pour les demandes particuliers : (+212) 702062126
CISSP, the foremost certification in information security, is the focus of our training program in Toronto, Canada. Geared towards providing participants with the technical and administrative skills required for designing and managing an organization's security, the training covers the eight domains of CISSP common body knowledge (CBK). This comprehensive preparation aims at success in the CISSP exam administered by (ISC)², a globally recognized nonprofit organization dedicated to advancing information security standards. CISSP stands as a hallmark of excellence and a highly esteemed achievement in the field.
Module 1: Security and Risk Management
Understand and Apply Security Concepts
Evaluate and Apply Security Governance Principles
Determine Compliance and Other Requirements
Legal and Regulatory Issues in a Global Information Security Context
Requirements for Various Investigation Types
Develop, Document, and Implement Security Policy, Standards, Procedures, and Guidelines
Identify, Analyze, and Prioritize Business Continuity (BC) Requirements
Contribute to and Enforce Personnel Security Policies and Procedures
Understand and Apply Risk Management Concepts
Understand and Apply Threat Modeling Concepts and Methodologies
Apply Supply Chain Risk Management (SCRM) Concepts
Establish and Maintain a Security Awareness, Education, and Training Program
Understand, Adhere to, and Promote Ethics
Module 2: Asset Security
Identify and Classify Information and Assets
Establish Information and Asset Handling Requirements
Provision Resources Securely
Manage Data Lifecycle
Ensure Appropriate Asset Retention
Data Security Controls and Compliance Requirements
Module 3: Security Architecture and Engineering
Research, Implement, and Manage Engineering Processes Using Secure Design Principles
Fundamental Concepts of Security Models
Select Controls Based Upon Systems Security Requirements
Security Capabilities of Information Systems
Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements
Cryptographic Life Cycle
Methods of Cryptanalytic Attacks
Apply Security Principles to Site and Facility Design
Design Site and Facility Security Controls
Module 4: Communication and Network Security
Implement Secure Design Principles in Network Architectures
Secure Network Components
Implement Secure Communication Channels According to Design
Module 5: Identity and Access Management (IAM)
Control Physical and Logical Access to Assets
Manage Identification and Authentication of People, Devices, and Services
Integrate Identity as a Third-Party Service
Implement and Manage Authorization Mechanisms
Manage the Identity and Access Provisioning Lifecycle
Implement Authentication Systems
Module 6: Security Assessment and Testing
Design and Validate Assessment, Test, and Audit Strategies
Conduct Security Control Testing
Collect Security Process Data
Analyze Test Output and Generate Reports
Conduct or Facilitate Security Audits
Module 7: Security Operations
Understand and Support Investigations
Requirements for Various Investigation Types
Conduct Logging and Monitoring Activities
Securely Provision Resources
Understand and Apply Foundational Security Operations Concepts
Apply Resource Protection Techniques
Conduct Incident Management
Operate and Maintain Detective and Preventative Measures
Implement and Support Patch and Vulnerability Management
Participate in Change Management Processes
Implement Recovery Strategies
Module 8: Software Development Security
Integrate Security in the Software Development Life Cycle (SDLC)
Identify and Apply Security Controls in Development Environments
Assess the Effectiveness of Software Security
Assess Security Impact of Acquired Software
Define and Apply Secure Coding Guidelines and Standards