Information Systems Security (SF) [CISSP]

This 5-day cyber security course (CISSP) backed by (ISC²)will expand upon your knowledge addressing the essential elements of the eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals.

Course Fee (with 9% GST)

Full Course Fees: $3,270

Self-Sponsored
SG Citizen/PR aged ≥ 21 years: $981
SG Citizen aged ≥ 40 years: $381

Co-Sponsored (SME)
SG Citizen/PR aged ≥ 21 years: $381
SG Citizen aged ≥ 40 years: $381

Co-Sponsored (MNC)
SG Citizen/PR aged ≥ 21 years: $981
SG Citizen aged ≥ 40 years: $381

Overview

Course reference number: TGS-2023021373

This 5-day cyber security course (CISSP) backed by (ISC²)will expand upon your knowledge addressing the essential elements of the eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process, while providing a framework to prepare for the CISSP (Certified Information Security Systems Professional) security certification. By defining eight security domains that comprise a CBK, industry standards for the information systems security professionals have established. The skills and knowledge you gain in this course will help you master the eight CISSP domains and ensure your credibility and success within the information systems security field. Being the most esteemed and prestige security certification, the CISSP training is a benchmark for all IT professionals.

Prerequisites

Prospective participants must have at least 5 years of full-time experience in two or more of the 10 domains of (ISC)2 Common Body of Knowledge (CBK) which is generally accepted as the industry’s best practices for information security.

IMportant notes

All Trainees must take note of the following:
  1. Must attend at least 75% of the course before being eligible to take the assessments.
  2. Dynamic QR Code Attendance Taking:
    a. Scan the QR Code that will be displayed by the Trainer on each session. Use your SingPass App to scan and submit your attendance. If you fail to do so, you will be deemed absent from that session.
    b. The QR Code is only accessible on:
    • Morning Session: between 9.00 am to 1.00 pm.
    • Afternoon Session: between 2.00 pm to 6.00 pm.
    c. Please take the attendance one at a time as the system can only register you one by one.
  3. Sign daily on the Attendance Sheet as a backup if any technical glitch happens.
  4. Submit Course Evaluation by the end of each module to help us improve the course and your future learning experience with us.
The course completion requirements for this course as follow:
  1. Attended at least 75% of the course.
  2. Declared as competent during the assessments.

Who Should Attend?

This course is recommended to experienced IT Security-related practitioners, Auditors, Consultants, Investigators; Network/Security analysts and engineers; Network administrators; Information security specialists; and risk management professionals who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career.

This course is also intended for IT professionals seeking to enhance their careers and gain credibility as information security specialists.

Course Outline

  • Security Governance Principles
  • Compliance
  • Professional Ethics
  • Security Documentation
  • Risk Management
  • Threat Modeling
  • Business Continuity Plan Fundamentals
  • Acquisition Strategy and Practice
  • Personnel Security Policies
  • Security Awareness and Training
  • Asset Classification
  • Privacy Protection
  • Asset Retention
  • Data Security Controls
  • Secure Data Handling
  • Security in the Engineering Lifecycle
  • System Component Security
  • Security Models
  • Controls and Countermeasures in Enterprise Security
  • Information System Security Capabilities
  • Design and Architecture Vulnerability Mitigation
  • Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
  • Cryptography Concepts
  • Cryptography Techniques
  • Site and Facility Design for Physical Security
  • Physical Security Implementation in Sites and Facilities
  • Network Protocol Security
  • Network Components Security
  • Communication Channel Security
  • Network Attack Mitigation
  • Physical and Logical Access Control
  • Identification, Authentication, and Authorization
  • Identity as a Service
  • Authorization Mechanisms
  • Access Control Attack Mitigation
  • System Security Control Testing
  • Software Security Control Testing
  • Security Process Data Collection
  • Audits
  • Security Operations Concepts
  • Physical Security
  • Personnel Security
  • Logging and Monitoring
  • Preventative Measures
  • Resource Provisioning and Protection
  • Patch and Vulnerability Management
  • Change Management
  • Incident Response
  • Investigations
  • Disaster Recovery Planning
  • Disaster Recovery Strategies
  • Disaster Recovery Implementation
  • Security Principles in the System Lifecycle
  • Security Principles in the Software Development Lifecycle
  • Database Security in Software Development
  • Security Controls in the Development Environment
  • Software Security Effectiveness Assessment

Get Pricing and Brochure

More Like This

Get the course Brochure & Pricing

Our course consultant will contact you within 1 working day

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Get in touch with our consultant