Consult our trainings :
CISSP, IS security, certification preparation Training
- Participants / Prerequisite
This training details security concepts for obtaining CISSP certification. It will prepare you to take the exam by covering the entire Common Body of Knowledge (CBK), the shared core security knowledge defined by the International Information Systems Security Certification Consortium (ISC)².
- Information system security.
- The why of CISSP certification.
- Overview of the scope covered by the CBK.
- Security management practices. Writing policies, directives, procedures, and standards for security.
- The security awareness program, management practices, risk management, etc.
- Operations security: Preventive, detective, and corrective measures, roles and responsibilities of those involved.
- Best practices, security when hiring, etc.
- Architecture and security models: System architecture, theoretical informational security models.
- System evaluation methods, operational security modes, etc.
- Access control systems and methodologies. Categories and types of access controls.
- Access to data and systems, intrusion prevention systems (IPS) and intrusion detection systems (IDS).
- Audit trails, threats and attacks related to access control, etc.
- Cryptography. Concepts, symmetrical and asymmetrical cryptography.
- Hash functions, public key infrastructure, etc.
- Security of application and system developments. Databases, data warehouses.
- The development cycle, object-oriented programming, expert systems, artificial intelligence, etc.
- Telecom and network security. Basic concepts, TCP/IP model, network and security equipment.
- Security protocols, attacks on networks, data backups, wireless technologies, VPNs, etc.
- Continuity of operations and disaster recovery plan.
- Business continuity plan, disaster recovery plan.
- Emergency measures, training and awareness program, crisis communications, exercises and tests, etc.
- Law, investigations, and ethics: Civil, criminal, and administrative law, intellectual property.
- Legal framework of investigations, evidence admissibility rules, etc.
- Physical security. Threats and vulnerabilities related to the environment of a place, scope of security.
- Layout requirements, site monitoring, staff protection, etc.