Home

Training

Certified Information Systems Security Professional (CISSP)

(ISC)2 - International Information System Security Certification Consortium

The International Information System Security Certification Consortium or (ISC)2 is the world's leading cybersecurity professional organisation. (ISC)2 is a global community of information system professionals who define the architecture, design, management and/or security controls that assure the security of business environments.

This 9 week (ISC)2 authorised instructor-led course explores the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge. It provides information system managers, executives and leaders with an awareness and deep understanding of current global threats, technologies, regulations, standards and best practices.

Course completion affirms an experienced information system professional's knowledge in the field of information security. It provides a comprehensive analysis of the knowledge required to effectively design, engineer and manage the overall security posture of an organisation.

view certificate

CISSP Common Body of Knowledge

The Certified Information Systems Security Professional (CISSP) Common Body of Knowledge defines global industry standards and best practices in information security. (ISC)2 develops and maintains the CISSP Common Body of Knowledge through ongoing peer review by subject matter experts.

(ISC)2 Certified Information Systems Security Professional (CISSP) training provides a comprehensive review of information system security concepts and global best practices covering the 8 domains of the CISSP Common Body of Knowledge:

  1. Security and Risk Management
  2. Asset Security
  3. Security Architecture and Engineering
  4. Communications and Network Security
  5. Identity and Access Management (IAM)
  6. Security Assessment and Testing
  7. Security Operations
  8. Software Development Security

Domain 1: Security and Risk Management

Domain 1 lays the foundation of the CISSP Common Body of Knowledge, particularly focusing on the CIA Triad - confidentiality, integrity, and availability. It explores skills required related to implement security policies and procedures and risk management in relation to the safe acquisition of software, hardware and services. Domain 1 is comprised of the following modules:

2. Asset Security

Domain 2 explores the protection of an organisation's assets via application of baselines, scoping, tailoring and standards selection. It examines the handling requirements and security controls required to protect an asset throughout its lifecycle. Privacy protection is covered through the exploration of legal and regulatory requirements, and concepts of ownership, accountability, remanence, collection, storage and retention. Domain 2 is comprised of the following modules:

3. Security Architecture and Engineering

Domain 3 examines the principles and standards used to design, implement, secure and monitor operating systems, equipment, networks and applications. This includes the controls used to enforce various levels of confidentiality, integrity and availability. Domain 3 is comprised of the following modules:

4. Communications and Network Security

Domain 4 analyses different aspects of network architecture, communication protocols, segmentations, routing and wireless transmissions. It examines the mechanisms to design and protect network security to manage vulnerabilities, and respond to threats and countermeasures to avoid communication and network system interruption or service degradation. Domain 4 is comprised of the following modules:

5. Identity and Access Management (IAM)

Domain 5 examines the critical elements required to maintain confidentiality, integrity, and availability of assets through the procedures utilised to identify, name, associate and apply appropriately scoped access controls that meet tailored organisational needs. It explores concepts such as sessions, multi-factor authentication, proofing, credentials, role-based and rule-based access control. Domain 5 is comprised of the following modules:

6. Security Assessment and Testing

Domain 6 examines security testing and assessment activities that serves to mitigate risk for an organisation. It explores the tools and techniques used to assess the security of systems to find vulnerabilities, weaknesses and errors in coding and design. In addition to testing, auditing, disaster recovery, business continuity plans and awareness training are also covered. Domain 6 is comprised of the following modules:

7. Security Operations

Domain 7 explores aspects of security related to the organisation’s operational environment such as asset protection, sandboxing, intrusion prevention, forensic investigations, incident management and response, business continuity and disaster recovery, and personnel security. Domain 7 is comprised of the following modules:

8. Software Development Security

Domain 8 examines the involvement and design of security into the application from inception to decommission, and throughout both the software development lifecycle (SDLC) and system lifecycle (SLC). It explores the implementation of security controls on software and the data they process, including the environment in which systems exists. Domain 8 is comprised of the following modules:

About (ISC)2

The International Information System Security Certification Consortium or (ISC)2 is a non-profit global organisation which specialises in training and certifications for cybersecurity professionals.

It is certified by ANSI that (ISC)2 meets the requirements of ANSI/ISO/IEC Standard 17024, a personnel certification accreditation program.

(ISC)2 develops and maintains the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge. The CISSP Common Body of Knowledge establishes a common framework of information security terms and principles that allow information security professionals worldwide to address matters pertaining to the profession with a common understanding.

www.isc2.org

Thanks for taking the time to learn about my CISSP training about information system security

return to the top