Information Systems Security (SF) (Synchronous e-learning) - ITEL

Information Systems Security (SF) (Synchronous e-learning)

Cybersecurity

Clientele

Information Systems Security (SF) (Synchronous e-learning)

Course Overview

This 5-day cybersecurity course (CISSP), will enhance your knowledge by addressing the essential elements of the eight domains that comprise the Common Body of Knowledge (CBK)® for information systems security professionals. The course takes a job-related approach to the security process and provides a framework to prepare for the CISSP (Certified Information Systems Security Professional) certification. By defining the eight security domains that make up the CBK, the course helps establish industry standards for information systems security professionals. The skills and knowledge you gain will help you master these domains, ensuring your credibility and success in the field. As the most esteemed and prestigious security certification, CISSP training is a benchmark for all IT professionals.

Learning Outcomes

This course will equip cybersecurity professionals with the knowledge, skills, and abilities to lead an organization’s information security program.

Who Should Attend?

This course is recommended to experienced IT Security-related practitioners, Auditors, Consultants, Investigators; Network/Security analysts and engineers; Network administrators; Information security specialists; and risk management professionals who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career.   This course is also intended for IT professionals seeking to enhance their careers and gain credibility as information security specialists.

Course Prerequisite

Prospective participants must have at least 5 years of full-time experience in two or more of the 10 domains of (ISC)2 Common Body of Knowledge (CBK) which is generally accepted as the industry’s best practices for information security.

Potential Roles

CISO, Security Architect, Security Manager, Security Consultant, and Security Auditor

Course Outline

Lesson 1: Security and Risk Management
  • Security Governance Principles
  • Compliance
  • Professional Ethics
  • Security Documentation
  • Risk Management
  • Threat Modeling
  • Business Continuity Plan Fundamentals
  • Acquisition Strategy and Practice
  • Personnel Security Policies
  • Security Awareness and Training
Lesson 2: Asset Security
  • Asset Classification
  • Privacy Protection
  • Asset Retention
  • Data Security Controls
  • Secure Data Handling
Lesson 3: Security Engineering
  • Security in the Engineering Lifecycle
  • System Component Security
  • Security Models
  • Controls and Countermeasures in Enterprise Security
  • Information System Security Capabilities
  • Design and Architecture Vulnerability Mitigation
  • Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
  • Cryptography Concepts
  • Cryptography Techniques
  • Site and Facility Design for Physical Security
  • Physical Security Implementation in Sites and Facilities
Lesson 4: Communications & Network Security
  • Network Protocol Security
  • Network Components Security
  • Communication Channel Security
  • Network Attack Mitigation
Lesson 5: Identity & Access Management
  • Physical and Logical Access Control
  • Identification, Authentication, and Authorization
  • Identity as a Service
  • Authorization Mechanisms
  • Access Control Attack Mitigation
Lesson 6: Security Assessment & Testing
  • System Security Control Testing
  • Software Security Control Testing
  • Security Process Data Collection
  • Audits
Lesson 7: Security Operations
  • Security Operations Concepts
  • Physical Security
  • Personnel Security
  • Logging and Monitoring
  • Preventive Measures
  • Resource Provisioning and Protection
  • Patch and Vulnerability Management
  • Change Management
  • Incident Response
  • Investigations
  • Disaster Recovery Planning
  • Disaster Recovery Strategies
  • Disaster Recovery Implementation
Lesson 8: Security in the Software Development Life Cycle
  • Security Principles in the System Lifecycle
  • Security Principles in the Software Development Lifecycle
  • Database Security in Software Development
  • Security Controls in the Development Environment
  • Software Security Effectiveness Assessment

Course Fee (inclusive of 9% GST)

Individual
Criteria Price inclusive of GST

Full Course Fee

$3,270.00

Singapore Citizens (SCs) and Permanent Residents (PRs)
Funding Up to 50% of course fees

$1,770.00

SCs aged ≥ 40 years old ( SkillsFuture Mid-career Enhanced Subsidy )
Funding Up to 70% of course fees

$1,170.00

Criteria Price inclusive of GST

Full Course Fee

$3,270.00

Singapore Citizens (SCs) and Permanent Residents (PRs)
Funding Up to 50% of course fees

$1,770.00

SCs aged ≥ 40 years old ( SkillsFuture Mid-career Enhanced Subsidy )
Funding Up to 70% of course fees

$1,170.00

Criteria Price inclusive of GST

Full Course Fee

$3,270.00

Singapore Citizens (SCs) and Permanent Residents (PRs)
Funding Up to 50% of course fees

$1,170.00

SCs aged ≥ 40 years old ( SkillsFuture Mid-career Enhanced Subsidy )
Funding Up to 70% of course fees

$1,170.00

SkilsFuture Credit

SSG-funded courses are eligible for SkillsFuture Credit. Singaporeans over the age of 25 can use their Skillsfuture credit to register in courses.

Post-Secondary Education Account (PSEA)

All Singaporeans aged under 31 are eligible to use their PSEA account for the following course.

Course Dates

Course Dates Mode of Delivery Duration
Online Live Learning (OLL)
5 Days
Online Live Learning (OLL)
5 Days
Online Live Learning (OLL)
5 Days
Online Live Learning (OLL)
5 Days
Online Live Learning (OLL)
5 Days

SSG Funding Requirements

All Trainees must take note of the following:

  1. Must attend at least 75% of the course before being eligible to take the assessments.
  2. Dynamic QR Code Attendance Taking:
    a. Scan the QR Code that will be displayed by the Trainer on each session. Use your SingPass App to scan and submit your attendance. If you fail to do so, you will be deemed absent from that session.
    b. The QR Code is only accessible on:
    – Morning Session: between 9.00 am to 1.00 pm.
    – Afternoon Session: between 2.00 pm to 6.00 pm.
    Please take the attendance one at a time as the system can only register you one by one.
  3. Sign daily on the Attendance Sheet as a backup if any technical glitch happens.
  4. Submit Course Evaluation by the end of each module to help us improve the course and your future learning experience with us.

Certification

Upon meeting at least 75% attendance and passing the assessment(s), participants will receive a Certificate of Completion by ITEL

Course Code: TGS-2019502890
Course Support Period: 1 Jun 2019 – 20 Feb 2027

Note: All certificate images are for illustrative purposes only and may be subject to change at the discretion of ITEL.

e-Statement of Attainment (SOA) from SkillsFuture Singapore (SSG)

Upon meeting attendance requirements and passing the assessment(s), participants will receive an e-Statement of Attainment (SOA) from SkillsFuture Singapore (SSG).

External Certification Exam

Students may take the optional exam to earn the ISC2 certification.

FAQs

Who is this course for?

The Information Systems Security (ISS) is ideal for experienced security practitioners, managers and executives interested in proving their knowledge across a wide array of security practices and principles, including those in the following positions:

  • Chief Information Security Officer
  • Chief Information Officer
  • Director of Security
  • IT Director/Manager
  • Security Systems Engineer
  • Security Analyst
  • Security Manager
  • Security Auditor
  • Security Architect
  • Security Consultant
  • Network Architect

To qualify for this cybersecurity certification, you must pass the exam and have at least five years of cumulative, paid work experience in two or more of the eight domains of the ISC2 CISSP Exam Outline. The CISSP exam voucher is a separate purchase and is not included in the course.

The CISSP exam outline provides details on the eight domains covered by the examination.

 

CISSP Domains

Domain 1. Security and Risk Management

Domain 2. Asset Security

Domain 3. Security Architecture and Engineering

Domain 4. Communication and Network Security

Domain 5. Identity and Access Management (IAM)

Domain 6. Security Assessment and Testing

Domain 7. Security Operations

Domain 8. Software Development Security

Learner's Testimonials

Early registrations are encouraged.  

Information Systems Security (SF) (Synchronous e-learning)

Online Live Learning (OLL)

5 Days

From S$ $1,770.00 (After Eligible SSG Subsidies) 

Download Information Systems Security (SF) [OLL] Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Big Data Analytics (SF) Brochure (Testing)

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download CompTIA Security+ (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Data Science and Machine Learning (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Microsoft Certified Solutions Associate (MCSA) – 20742 (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Microsoft Certified Solutions Associate (MCSA) – 20741 (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Microsoft Certified Solutions Associate (MCSA) – 20740 (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Business Analysis Professional (SF) (Synchronous E-Learning) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Microsoft Azure Security Technologies (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Implementing SQL Database Administration (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download VMware Vsphere: Install, Configure, Manage (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Design Mobile Applications on Android OS Platform (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download CompTIA Network+ (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download CompTIA Cloud Essentials+ (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Big Data Analytics (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Network Defender (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download ITIL® Foundation Certificate in Service Management (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Project Management (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Windows Server 2019 Administration (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Cloud Technology Solutions Architect Associate (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Security Analysis and Penetration Testing (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Microsoft Certified: Azure Fundamentals (AZ-900) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Microsoft Certified Azure Network Engineer Associate (AZ-700) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Cyber Threat Intelligence Analyst (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Cyber Forensics Investigator (SF) [OLL] Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Cyber Security Incident Handling and Response (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Certified Ethical Hacker (CEH) (SF) [OLL] Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Certified Ethical Hacker (CEH) (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download (SCTP) Advanced Certificate in Cyber Security Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download (SCTP) Higher Certificate in Network Administration Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Strategic Cyber Security Leadership (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Cisco Certified Network Associate (CCNA) (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Course Listing Download Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Cisco Certified Network Associate Download Course Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List
Course Enquiry for Information Systems Security (SF) (Synchronous e-learning)

"*" indicates required fields

This field is for validation purposes and should be left unchanged.
I want to find out more about:*
Where did you hear of ITEL?*
*Note: If you chose Others, kindly provide more information in the Remarks/Comments/Questions box.
Consent*
Newsletter Subscription