Suite 3808, Liwa Heights, Cluster W, Jumeirah Lake Towers, Dubai, UAE info@keygains-training.com +971 4 577 6810 +971 52 767 8506 08.00 – 18.00

Sunday – Saturday

E-MAIL : info@keygains-training.com

Follow Us

CISSP Certification

Objectives

Our CISSP certification training helps you in understanding major security concepts from (ISC)2 CISSP CBK. Courseware set and taught by our expert CISSP trainers helps you analyze and apply concepts from eight domains of globally approved information security standards. This CISSP training in London introduces you to the basics of IT security and also provides in-depth knowledge about important areas like data privacy, risk management, RAID technology, and security controls to name a few. The importance and value of this certificate in cybersecurity are immeasurable. If you are working in the information security of any organization may it be private, public, or government, the CISSP® certification should be on your top priority list.

Target Audience

  • Security Analysts
  • Security Systems Engineers
  • Anybody who wants to gain knowledge of globally recognized CISSP information security standards
  • Anybody who is looking to clear their CISSP Certification Exam

Course Modules

Module 1: Security and Risk Management

Aligning security and risk to organizational objectives

  • Evaluate and apply security governance principles
  • Implement policies, standards, and procedures
  • Applying compliance

Applying risk management concepts

  • Assessing threats and vulnerabilities
  • Performing risk analysis and control
  • Defining a qualitative and quantitative analysis

Preserving the business

  • Adhering to Business Continuity Management Code of Practice and Specifications
  • Performing a business impact analysis

Investigating legal measures and techniques

  • Reviewing intellectual property, liability and law, and compliance
  • Differentiating traditional computer crime
  • Establish information and asset handling requirements

Module 2: Asset Security

Examining security models and frameworks

  • The Information Security Triad and multi-level models
  • Investigating industry standards: ISO 27001/27002
  • Evaluating security model fundamental concepts

Exploring system and component security concepts

  • Certification and accreditation criteria and models
  • Reviewing mobile system/cloud/IoT vulnerabilities

Protecting information by applying cryptography

  • Detailing symmetric and asymmetric encryption systems
  • Ensuring message integrity through hashing
  • Uncovering threats to cryptographic systems

Safeguarding physical resources

  • Designing environments to resist hostile acts and threats

Module 3: Communication and Network Security

Defining a secure network architecture

  • TCP/IP and other protocol models
  • Protecting from network attacks
  • Reviewing secure network components and communication channels

Examining secure networks and components

  • Identifying wired and wireless technologies
  • Implementing firewalls, secure communications, proxies, and tunnels

Module 4: Identity and Access Management (IAM)

Controlling access to protect assets

  • Defining administrative, technical, and physical controls
  • Implementing centralized and decentralized approaches
  • Investigating biometric and multi-factor authentication
  • Identifying common threats
  • Manage the identity and access provisioning lifecycle

Module 5: Security Assessment and Testing

Designing and conducting security assessment strategies

  • Leveraging the role of testing and auditing to analyze the effectiveness of security controls
  • Differentiating detection and protection systems

Conducting logging and monitoring activities

  • Distinguishing between the roles of internal and external audits
  • Conduct or facilitate security audits

Module 6: Security Operations

Maintaining operational resilience

  • Managing security services effectively
  • Leveraging and supporting investigations and incident response
  • Differentiating detection and protection systems
  • Securely provisioning resources

Developing a recovery strategy

  • Designing a disaster recovery plan
  • Implementing test and maintenance processes
  • Provisioning of resources.

Module 7: Software Development Security

Securing the software development life cycle

  • Applying software development methods and security controls
  • Addressing database security concepts and issues
  • Define and apply secure coding guidelines and standards
  • Reviewing software security effectiveness and security impact

Get Download Brochure





    Program Schedules : Session Starts From

    9th July 2021

    Online Live

    23rd July 2021

    Classroom

    Certification (CISSP Certification)

    Our CISSP certification training helps you in understanding major security concepts from (ISC)2 CISSP CBK. Courseware set and taught by our expert CISSP trainers helps you analyze and apply concepts from eight domains of globally approved information security standards. This CISSP training in London introduces you to the basics of IT security and also provides in-depth knowledge about important areas like data privacy, risk management, RAID technology, and security controls to name a few. The importance and value of this certificate in cybersecurity are immeasurable. If you are working in the information security of any organization may it be private, public, or government, the CISSP® certification should be on your top priority list.

    Open chat
    Open chat