Training & Certifications

CISSP® certification is a globally recognized standard of achievement that confirms an individual's knowledge in the field of information security. CISSPs are information assurance professionals who define the architecture, design, management and/or controls that assure the security of business environments. It was the first certification in the field of information security to meet the stringent requirements of ISO/IEC Standard 17024.

This program also prepares the participants for the Certified Information Systems Security Professional (CISSP®) examination, owned and maintained by the International Information Systems Security Certification Consortium (ISC)2®. Successful completion of this program requires the participants to complete all required assignments and self-study.

At the end of the program, the participants will be able to :

  1. How to identify and correctly answer the five types of CISSP hard questions
  2. Techniques for committing key facts and figures to memory for test preparation
  3. Critical test-taking tips and study techniques for the CISSP exam
  4. Proven techniques for scoring well on the CISSP exam
  5. Key aspects of Security Policy development and Security Management Practices

CISSP Program is beneficial to Security Consultant, Security Analyst, Security Manager, Security Systems Engineer, IT Director/Manager, Chief Information Security Officer, Security Auditor, Director of Security, Security Architect and Network Architect.

This program is 5 days of intensive training class.

Participants are required to have minimum of five years of cumulative paid full-time work experience in two or more of the eight domains:

  • Security and Risk Management
  • Asset Security
  • Security Engineering
  • Identity and Access Management
  • Security Assessment and Testing
  • Security Operations
  • Software Development Security
  • Communications and Network Security

At the end of the program, the participants will be assessed with 6 hours of CISSP® Exam.

CISSP® Certification will be awarded upon successfully passing the exam from (ISC)2.

  1. Becoming a CISSP
  2. The CISSP Exam
  1. Fundamental Principles of Security
  2. Security Frameworks
  3. Security Management
  4. Risk Management
  5. Risk Assessment and Analysis
  6. Layers of Responsibility
  7. Security Steering Committee
  1. Access Control Overview
  2. Security Principles
  3. Identification, Authentication, Authorization, and Accountability
  4. Access Control Models, Techniques and Technologies, and Administration
  5. Access Control Methods
  6. Accountability
  7. Access Control Practices and Monitoring
  8. Threats to Access Control
  1. Computer Security
  2. System Architecture
  3. Computer Architecture
  4. Operating System Architectures
  5. System Security Architecture
  6. Security Models
  7. Security Modes of Operation
  8. Systems Evaluation Methods
  9. Information Technology Security
  1. Introduction to Physical Security
  2. The Planning Process
  3. Protecting Assets
  4. Internal Support Systems
  5. Perimeter Security
  1. Telecommunications
  2. Open Systems Interconnection Reference Model
  3. TCP/IP Model
  4. Types of Transmission
  5. Cabling
  6. Networking Foundations
  7. Networking Devices
  8. Wide Area Networks
  9. Remote Connectivity
  10. Wireless Technologies
  1. Cryptography Definitions and Concepts
  2. Types of Ciphers
  3. Methods of Encryption
  4. Types of Symmetric Systems
  5. Types of Asymmetric Systems
  6. Message Integrity
  7. Public Key Infrastructure
  8. Key Management
  9. Attacks
  1. Business Continuity and Disaster Recovery
  2. BCP Project Components
  3. Recovery Strategies
  4. Insurance
  5. Recovery and Restoration
  6. Testing and Revising the Plan
  1. Complexities in Cybercrime
  2. Intellectual Property Laws
  3. Privacy
  4. Liability and Its Ramifications
  5. Compliance
  6. Investigations
  7. Ethics
  1. Where do we place Security?
  2. System Development Life Cycle
  3. Software Development Life Cycle
  4. Software Development Models
  5. Capability Maturity Model Integration
  6. Change Control
  7. Programming Languages and Concepts
  8. Distributed Computing
  9. Mobile Code
  10. Web Security
  11. Database Management
  12. Malicious Software (Malware)
  1. The Role of the Operations Department
  2. Administrative Management
  3. Operational Responsibilities
  4. Configuration Management
  5. Media Controls
  6. Data Leakage
  7. Network and Resource Availability
  8. Mainframes
  9. E-mail Security
  10. Vulnerability Testing

Scroll to Top