Official (ISC)² CBK Training Seminar for the Certified Information Systems Security Professional (CISSP)

TUV Hellas newLanguage: Course content is offered in English.

TUV HELLAS in cooperation with (ISC)² announce certified training program on Information Systems Security Professional (CISSP)

Course Summary

This course is designed for information security professional’s with deep technical and managerial knowledge and experience to effectively design, engineer, and manage the overall security posture of an organization. Led by an (ISC)² authorized instructor, this training seminar provides a comprehensive review of information systems security concepts and industry best practices, covering the following eight domains of the CISSP Common Body of Knowledge (CBK®)

Domain 1: Security and Risk Management
Domain 2: Asset Security
Domain 3: Security Architecture and Engineering
Domain 4: Communication and Network Security
Domain 5: Identity and Access Management (IAM)
Domain 6: Security Assessment Testing
Domain 7: Security Operations
Domain 8: Software Development Security

Course Learning Objectives

At the end of this course, learners will be able to:

  • Apply fundamental concepts and methods related to the fields of information technology and security.
  • Align overall organizational operational goals with security functions and implementations.
  • Determine how to protect assets of the organization as they go through their lifecycle.
  • Leverage the concepts, principles, structures, and standards used to design, implement, monitor, and secure operating systems, equipment, networks, applications, and those controls used to enforce various levels of confidentiality, integrity, and availability.
  • Apply security design principles to select appropriate mitigations for vulnerabilities present in common information system types and architectures.
  • Explain the importance of cryptography and the security services it can provide in today’s digital and information age.
  • Evaluate physical security elements relative to information security needs.
  • Evaluate the elements that comprise communication and network security relative to information security needs.
  • Leverage the concepts and architecture that define the associated technology and implementation systems and protocols at
  • Open Systems Interconnection (OSI) model layers 1–7 to meet information security needs.
  • Determine appropriate access control models to meet business security requirements.
  • Apply physical and logical access controls to meet information security needs.
  • Differentiate between primary methods for designing and validating test and audit strategies that support information security requirements.
  • Apply appropriate security controls and countermeasures to optimize an organization’s operational function and capacity.
  • Assess information systems risks to an organization’s operational endeavors.
  • Determine appropriate controls to mitigate specific threats and vulnerabilities.
  • Apply information systems security concepts to mitigate the risk of software and systems vulnerabilities throughout the systems’ lifecycles.

Στοιχεία σεμιναρίου

Έναρξη 27-03-2023 09:00
Λήξη 31-03-2023 17:00
Χωρητικότητα 30
Τιμή ατόμου Κατόπιν επικοινωνίας
Διοργανωτής TÜV HELLAS
Τόπος διεξαγωγής Εξ' αποστάσεως
Πόλη Εξ' αποστάσεως
Μοιραστείτε αυτό το σεμινάριο:
© 2024 Digital Ideas