Scheduled Course - Certified Information Systems Security Professional - CISSP

Register today for this scheduled course.

  • Start date
    11-11-2024 18:00
  • End date
    28-11-2024 21:00
  • Course length
    14x Lesson
  • Class duration
    180 Minutes

Course Overview

The Certified Information Systems Security Professional (CISSP) Training Course is designed for seasoned security practitioners, managers, and executives seeking to validate their expertise across a wide array of security practices. This comprehensive course prepares candidates to design, implement, and manage a best-in-class cybersecurity program, ensuring they are well- versed in eight domains, including Security and Risk Management, Asset Security, and Security Architecture and Engineering. With a focus on real-world application, the CISSP certification is recognized globally as a standard of achievement that confirms an individual’s knowledge and proficiency in information. security

Program Outcomes

Upon completion of the CISSP Training Course, participants can expect to achieve the following outcomes:

  • Comprehensive Security Knowledge: Gain an in-depth understanding of the eight domains of information security as outlined by (ISC)².
  • Risk Management Skills: Develop the ability to identify, evaluate, and mitigate information security risks effectively.
  • Best Practices Implementation: Learn to implement and manage security best practices and policies within
    an organization.
  • Leadership and Management: Enhance leadership and project management skills specific to information security tasks.
  • Global Recognition: Earn a globally recognized credential that validates information security expertise and opens advanced career opportunities.

Your Advantage

  • Industry-Recognized Credential: Employers trust ISC2 as the gold standard for IT Security professionals.
  • Applied Scenarios – A course-wide, recurring project where the learners assume specific roles and apply security concepts to a situation that CISSPs will likely encounter in the workplace.
  • Discussions – Generate deeper conversation among learners in the classroom around a given topic. There are eight discussion questions encouraging peer to peer interaction.
  • Activities – Interactive exercises, reflections and knowledge checks leveraging real-world and fictitious case studies providing examples of security failures and other course related content.
  • Quizzes & Exam Simulation Questions – Each chapter concludes with an end of chapter quiz to assess comprehension of the learning within the chapter. There are 9 quizzes with feedback included in this course.
  • Assessment – The course concludes with a post course assessment designed to validate learnings in the course and identify areas for further study.
  • Experienced Instructors: Highly skilled and Certified Instructors using Vendor Approved Training Content.
  • Pricing: Friendly Affordable Pricing including Discounted Exam Vouchers.
  • Customization: Ability t o customize for Onsite or Group Training.
  • Completion Certificate: Certificate after successf ul Completion of the course.

Course Content

1. Security and Risk Management

  • Professional ethics
  • Security governance principles
  • Legal and regulatory issues
  • Risk management concepts and methodologies.

2. Asset Security

  • Information and asset classification
  • Ownership and protection of sensitive information
  • Data security controls

3. Security Architecture and Engineering

  • Engineering processes using secure design principles.
  • Security models and architectures
  • Cryptography and secure communications

4. Communication and Network Security

  • Secure network architecture and components
  • Secure communication channels
  • Network attacks and countermeasures.

5. Identity and Access Management (IAM)

  • Physical and logical access control
  • Identification and authentication of people and devices
  • Identity as a service

6. Security Assessment and Testing

  • Assessment and test strategies
  • Security process data
  • Security control testing

7. Security Operations

  • Foundational security operations concepts
  • Resource protection techniques
    Incident management

8. Software Development Security

  • Security in the software development lifecycle
  •  Development environment security controls
  • Software security effectiveness

This course can be customized to fit the specific needs of the attendees and the company or industry they operate in.

Why KnowledgeSpace Training and Consulting?

  • Modern Learning Management System: Our cloud-based device-enabled learning platform supports self-paced, mentor guided, and instructor led learning.
  • Strong Partnerships: We have strategic Partnerships with renowned international organizations for unrivalled training platforms and content.
  • Modern Delivery Methodology: Enhanced course delivery techniques comprising of: Assessments, test preps, Labs, Instructor led training, Self-paced online Training and Blended Solutions
  • Practical Courses: Courses and labs complete with Pre-Assessments, Exercises, Flashcards, Quizzes, and Post Assessments. Our Hands-on labs are virtual and live environments where students learn by doing.
  • Customer Centricity: We listen to you. You are at the epicenter of what we do. Therefore, you ultimately determine the services you receive from us. We have maintained a Customer Satisfaction rating of 99%. This is a testament to the quality of courses that we deliver.
  • Certified Training Experts: Our training team consists of Certified industry experts who facilitate your learning experience..

Career Prospects

  • Information Security Consultant: Advise organizations on how to protect their information assets.
  • Cybersecurity Engineer: Develop systems and measures to safeguard information systems against cyber
    threats.
  • Penetration Tester: Simulate cyber-attacks to identify and fix security vulnerabilities.
  • Risk Analyst: Assess and mitigate risks associated with information security.
  • Security Software Developer: Create security software solutions to protect against cyber threats.
  • Forensic Computer Analyst: Investigate cyber crimes and analyze data breaches.
  • Security Trainer: Educate employees and clients on best practices in information security.
  • Disaster Recovery Specialist: Plan and implement strategies for data recovery and business continuity in the event of a security breach.
  • Regulatory Compliance Analyst: Ensure that security policies and procedures comply with regulatory requirements.
  • Data Privacy Officer: Oversee the management of personal data and ensure compliance with privacy laws.

Prerequisites

  • Work Experience: A minimum of five years cumulative, full-time work experience in two or more of the eight domains of the CISSP.
  • Educational Background: A four-year college degree or equivalent can substitute one year of the required experience.
  • Additional Credentials: Holding an additional credential from the (ISC)2 approved list may satisfy up to one year of the required experience.
  • Part-Time Work and Internships: Part-time work and internships may count towards the experience requirement, with specific hourly criteria.

Exam Info & Requirements

  • Exam Format: The CISSP exam uses Computerized Adaptive Testing (CAT) for all English exams, adjusting the difficulty based on the candidate’s performance.
  • Duration and Question Count: The test comprises 125 to 175 questions and must be completed within four hours.
  • Experience Requirements: Candidates must have a minimum of five years of full-time work experience in two or more of the eight domains of the CISSP.
  • Educational Waivers: A four-year college degree or an additional credential from the (ISC)2 approved list may satisfy up to one year of the required experience.
  • Accreditation: The CISSP certification is ANSI/ISO/IEC Standard 17024 accredited and recognized by the U.S. Department of Defense under DoD 8570.13.

FAQs

  • Accreditation: All our courses are accredited by the respective certification organizations.
  • Completion Certificate: Yes, we provide a Course Completion Certificate for all training courses.
  • Group Discounts: We offer group discounts—reach out to us at hello@kspacetc.com to inquire.
  • Course Clarifications: Our expert trainers are available to help with any course-related questions. Contact us at hello@kspacetc.com.
  • After Enrollment: You’ll receive course access credentials via email within 24 hours of purchase.
  • In-House/Corporate Training: Yes, we deliver in-house and corporate training. Inquire at hello@Kspacetc.com.
  • Customized Training: Our subject matter experts can customize existing courses or create new ones based on your company’s needs.
  • Delivery Methods: Choose from online on-demand, virtual instructor-led, classroom, or onsite/corporate training.
  • More Questions? Feel free to reach out to us at hello@Kspacetc.com for any additional information.

Course Participant Data

Billing details

Consent and Statements

  • Yes please, I would like to receive a newsletter with new content and offers.
Price (USD) $299.00
  • Course name
    Certified Information Systems Security Professional - CISSP Instructor Led Course.
  • Info
    Duration: 14 Sessions
    Session Duration: 3 Hrs Per Session
    Format : Virtual Instructor Led Training (VILT)
    Certificate: Yes
    Language: English
    Time: GMT +3
  • Contact
    KnowledgeSpace Team
    hello@kspacetc.com
    Tel: +254 111 33 22 22

Classes Schedule

  • Every Monday
    18:00 - 21:00
  • Every Tuesday
    18:00 - 21:00
  • Every Wednesday
    18:00 - 21:00
  • Every Thursday
    18:00 - 21:00
  • Every Friday
    18:00 - 21:00

Thank You for Booking with Us!

Your booking was successful. To confirm it, please select the payment method and make the payment.

X