Information Systems Security (SF) [CISSP]

This 5-day cyber security course (CISSP) backed by (ISC²)will expand upon your knowledge addressing the essential elements of the eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals.

Course Fee (with GST)

Full Course Fees: $3240

Self-Sponsored
SG Citizen/PR aged ≥ 21 years: $972
SG Citizen aged ≥ 40 years: $324

Co-Sponsored (SME)
SG Citizen/PR aged ≥ 21 years: $324
SG Citizen aged ≥ 40 years: $324

Co-Sponsored (MNC)
SG Citizen/PR aged ≥ 21 years: $972
SG Citizen aged ≥ 40 years: $324

Overview

Course reference number: TGS-2023021373

This 5-day cyber security course (CISSP) backed by (ISC²)will expand upon your knowledge addressing the essential elements of the eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process, while providing a framework to prepare for the CISSP (Certified Information Security Systems Professional) security certification. By defining eight security domains that comprise a CBK, industry standards for the information systems security professionals have established. The skills and knowledge you gain in this course will help you master the eight CISSP domains and ensure your credibility and success within the information systems security field. Being the most esteemed and prestige security certification, the CISSP training is a benchmark for all IT professionals.

Prerequisites

Prospective participants must have at least 5 years of full-time experience in two or more of the 10 domains of (ISC)2 Common Body of Knowledge (CBK) which is generally accepted as the industry’s best practices for information security.

Who Should Attend?

This course is recommended to experienced IT Security-related practitioners, Auditors, Consultants, Investigators; Network/Security analysts and engineers; Network administrators; Information security specialists; and risk management professionals who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career.

This course is also intended for IT professionals seeking to enhance their careers and gain credibility as information security specialists.

Course Outline

  • Security Governance Principles
  • Compliance
  • Professional Ethics
  • Security Documentation
  • Risk Management
  • Threat Modeling
  • Business Continuity Plan Fundamentals
  • Acquisition Strategy and Practice
  • Personnel Security Policies
  • Security Awareness and Training
  • Asset Classification
  • Privacy Protection
  • Asset Retention
  • Data Security Controls
  • Secure Data Handling
  • Security in the Engineering Lifecycle
  • System Component Security
  • Security Models
  • Controls and Countermeasures in Enterprise Security
  • Information System Security Capabilities
  • Design and Architecture Vulnerability Mitigation
  • Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
  • Cryptography Concepts
  • Cryptography Techniques
  • Site and Facility Design for Physical Security
  • Physical Security Implementation in Sites and Facilities
  • Network Protocol Security
  • Network Components Security
  • Communication Channel Security
  • Network Attack Mitigation
  • Physical and Logical Access Control
  • Identification, Authentication, and Authorization
  • Identity as a Service
  • Authorization Mechanisms
  • Access Control Attack Mitigation
  • System Security Control Testing
  • Software Security Control Testing
  • Security Process Data Collection
  • Audits
  • Security Operations Concepts
  • Physical Security
  • Personnel Security
  • Logging and Monitoring
  • Preventative Measures
  • Resource Provisioning and Protection
  • Patch and Vulnerability Management
  • Change Management
  • Incident Response
  • Investigations
  • Disaster Recovery Planning
  • Disaster Recovery Strategies
  • Disaster Recovery Implementation
  • Security Principles in the System Lifecycle
  • Security Principles in the Software Development Lifecycle
  • Database Security in Software Development
  • Security Controls in the Development Environment
  • Software Security Effectiveness Assessment

Get Pricing and Brochure

More Like This

Get the course Brochure & Pricing

Our course consultant will contact you within 1 working day

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Get in touch with our consultant