ORSYS formation
CONTACT - +33 (0)1 49 07 73 73
CONTACT - 📞 +33 (0)1 49 07 73 73    drapeau francais   drapeau anglais

Consult our trainings :

CISSP, IS security, certification preparation Training

Hands-on course
Best
Duration : 5 days
Ref : CIS
Price  2020 : Contact us
  • Program
  • Participants / Prerequisite
  • Intra/Tailored
Program

This training details security concepts for obtaining CISSP certification. It will prepare you to take the exam by covering the entire Common Body of Knowledge (CBK), the shared core security knowledge defined by the International Information Systems Security Certification Consortium (ISC)².

Certification

To take the certification exam, you must register on the ISC2 website and submit an eligibility packet.
PROGRAM

IS security and the (ISC)²'s CBK

  • Information system security.
  • The why of CISSP certification.
  • Overview of the scope covered by the CBK.

Security management and operations security.

  • Security management practices. Writing policies, directives, procedures, and standards for security.
  • The security awareness program, management practices, risk management, etc.
  • Operations security: Preventive, detective, and corrective measures, roles and responsibilities of those involved.
  • Best practices, security when hiring, etc.

Architecture, security models, and access control

  • Architecture and security models: System architecture, theoretical informational security models.
  • System evaluation methods, operational security modes, etc.
  • Access control systems and methodologies. Categories and types of access controls.
  • Access to data and systems, intrusion prevention systems (IPS) and intrusion detection systems (IDS).
  • Audit trails, threats and attacks related to access control, etc.

Cryptography and development security

  • Cryptography. Concepts, symmetrical and asymmetrical cryptography.
  • Hash functions, public key infrastructure, etc.
  • Security of application and system developments. Databases, data warehouses.
  • The development cycle, object-oriented programming, expert systems, artificial intelligence, etc.

Telecom and network security

  • Telecom and network security. Basic concepts, TCP/IP model, network and security equipment.
  • Security protocols, attacks on networks, data backups, wireless technologies, VPNs, etc.

Continuity of business, laws, ethics, and physical security.

  • Continuity of operations and disaster recovery plan.
  • Business continuity plan, disaster recovery plan.
  • Emergency measures, training and awareness program, crisis communications, exercises and tests, etc.
  • Law, investigations, and ethics: Civil, criminal, and administrative law, intellectual property.
  • Legal framework of investigations, evidence admissibility rules, etc.
  • Physical security. Threats and vulnerabilities related to the environment of a place, scope of security.
  • Layout requirements, site monitoring, staff protection, etc.
Participants / Prerequisite

» Participants

IS security manager or any other person who plays a role in IS security policy.

» Prerequisite

Basic knowledge of networks and operating systems as well as information security. Basic knowledge of auditing and business continuity standards.
Intra/Tailored

Contact Informations

By checking this box, I certify that I have read and accepted the conditions for the use of my data regarding the General Data Protection Regulation (GDPR).
You can at any time modify the use of your data and exercise your rights by sending an email to rgpd@orsys.fr
By checking this box, I agree to receive commercial and promotional communications from ORSYS Training*. You can unsubscribe at any time by using the link included in our communications.

Book your place

Submit your request

Time schedule

Generally, courses take place from 9:00 to 12:30 and from 14:00 to 17:30.
However, on the first day attendees are welcomed from 8:45, and there is a presentation of the session between 9:15 and 9:30.
The course itself begins at 9:30. For the 4- or 5-day hands-on courses, the sessions finish at 15:30 on the last day
linkedin orsys
twitter orsys
it! orsys
instagram orsys
pinterest orsys
facebook orsys
youtube orsys