Information Systems Security (SF)
Course Code:
TGS-2023035649
Duration:
5 Days
Delivery Mode:
Instructor-led Training (ILT)
Start Date:
25 Nov 2024
End Date:
29 Nov 2024
Fees:
$3,270.00

(Before Funding)

This 5-day cybersecurity course (CISSP), will enhance your knowledge by addressing the essential elements of the eight domains that comprise the Common Body of Knowledge (CBK)® for information systems security professionals. The course takes a job-related approach to the security process and provides a framework to prepare for the CISSP (Certified Information Systems Security Professional) certification. By defining the eight security domains that make up the CBK, the course helps establish industry standards for information systems security professionals. The skills and knowledge you gain will help you master these domains, ensuring your credibility and success in the field. As the most esteemed and prestigious security certification, CISSP training is a benchmark for all IT professionals.

Course Outline

Lesson 1: Security and Risk Management

  • Security Governance Principles
  • Compliance
  • Professional Ethics
  • Security Documentation
  • Risk Management
  • Threat Modeling
  • Business Continuity Plan Fundamentals
  • Acquisition Strategy and Practice
  • Personnel Security Policies
  • Security Awareness and Training
Lesson 2: Asset Security

  • Asset Classification
  • Privacy Protection
  • Asset Retention
  • Data Security Controls
  • Secure Data Handling
Lesson 3: Security Engineering

  • Security in the Engineering Lifecycle
  • System Component Security
  • Security Models
  • Controls and Countermeasures in Enterprise Security
  • Information System Security Capabilities
  • Design and Architecture Vulnerability Mitigation
  • Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
  • Cryptography Concepts
  • Cryptography Techniques
  • Site and Facility Design for Physical Security
  • Physical Security Implementation in Sites and Facilities
Lesson 4: Communications & Network Security

  • Network Protocol Security
  • Network Components Security
  • Communication Channel Security
  • Network Attack Mitigation
Lesson 5: Identity & Access Management

  • Physical and Logical Access Control
  • Identification, Authentication, and Authorization
  • Identity as a Service
  • Authorization Mechanisms
  • Access Control Attack Mitigation
Lesson 6: Security Assessment & Testing

  • System Security Control Testing
  • Software Security Control Testing
  • Security Process Data Collection
  • Audits
Lesson 7: Security Operations

  • Security Operations Concepts
  • Physical Security
  • Personnel Security
  • Logging and Monitoring
  • Preventive Measures
  • Resource Provisioning and Protection
  • Patch and Vulnerability Management
  • Change Management
  • Incident Response
  • Investigations
  • Disaster Recovery Planning
  • Disaster Recovery Strategies
  • Disaster Recovery Implementation
Lesson 8: Security in the Software Development Life Cycle

  • Security Principles in the System Lifecycle
  • Security Principles in the Software Development Lifecycle
  • Database Security in Software Development
  • Security Controls in the Development Environment
  • Software Security Effectiveness Assessment

Course Fee (inclusive of 9% GST)

Criteria Individual Company Sponsored (Non-SME) Company Sponsored (SME)
Full Course Fee
$3,270.00
SG Citizens aged 21 – 39 years old / PRs aged 21 years old and above
$981.00
$981.00
$381.00
SG Citizens age 40 years old and above
$381.00
$381.00
$381.00
Course Prerequisite
Prospective participants must have at least 5 years of full-time experience in two or more of the 10 domains of (ISC)2 Common Body of Knowledge (CBK) which is generally accepted as the industry’s best practices for information security.
Important Notes
All Trainees must take note of the following:
  1. Must attend at least 75% of the course before being eligible to take the assessments.
  2. Dynamic QR Code Attendance Taking:a. Scan the QR Code that will be displayed by the Trainer on each session. Use your SingPass App to scan and submit your attendance. If you fail to do so, you will be deemed absent from that session. b. The QR Code is only accessible on: • Morning Session: between 9.00 am to 1.00 pm. • Afternoon Session: between 2.00 pm to 6.00 pm. c. Please take the attendance one at a time as the system can only register you one by one.
  3. Sign daily on the Attendance Sheet as a backup if any technical glitch happens.
  4. Submit Course Evaluation by the end of each module to help us improve the course and your future learning experience with us.
The course completion requirements for this course as follow:
  1. Attended at least 75% of the course.
  2. Declared as competent during the assessments.
Who Should Attend?
This course is recommended to experienced IT Security-related practitioners, Auditors, Consultants, Investigators; Network/Security analysts and engineers; Network administrators; Information security specialists; and risk management professionals who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career.   This course is also intended for IT professionals seeking to enhance their careers and gain credibility as information security specialists.

Why ITEL?

  • Diverse Range of IT Courses

    We offer a diverse range of IT courses tailored to student needs. Our curriculum covers foundational to advanced topics, ensuring comprehensive learning. We stay updated with industry trends to deliver relevant courses.

  • Skilled & Experienced Instructors

    We are proud to have a team of highly skilled and experienced instructors. Our instructors are industry professionals with in-depth knowledge and expertise across various IT domains.

  • Practical & Hands-on Exercises

    Our courses feature hands-on exercises, projects, and simulations to build practical skills. Students gain confidence by applying knowledge to real-world scenarios.

Course Enquiry for Information Systems Security (SF)

"*" indicates required fields

I want to find out more about:
Where did you hear of ITEL?*
*Note: If you chose Others, kindly provide more information in the Remarks/Comments/Questions box.
Consent*
Newsletter Subscription
This field is for validation purposes and should be left unchanged.