(ISC)2 CISSP® CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL INTRODUCTION

During this fast-paced, two-day session, you will cover the eight domains of the (ISC)2 CISSP CBK. This fact-filled course will assist in your review of the CBK topics and deepen your knowledge of information security. Each day of the presentation is divided into various domains of the CBK. These domains will cover essential topics such as current security challenges, problem resolution, application security, network security, infrastructure planning, legal considerations, international privacy, investigations, and forensics among other topics.

The instructor will utilize (ISC)2 course materials to guide you through the most pertinent information to understand prior to taking the examination or enhancing your current CISSP credential. The two-day session will conclude with a practice exam.

Presentation:The facilitator will explain content to participants using PowerPoint to guide the presentation. Multiple examples will be used to clarify points.

Short Lecture/Discussion:The facilitator will engage participants in conversation by asking questions and encouraging them to respond. Participants will be encouraged to provide examples from their experience.

Computers: The course will not require the course participants to have laptops or computer devices during the class presentation.

Trainer: TBA
Max participants: 50
Cost: $1600

This is a Two Day Course
October 7-8, 2019

Course Objectives

This course covers security computing essentials and innovations from a high level and introduces many topics that may be immediately applied in the workplace. Topics include:

  • Planning better security in the enterprise
  • Differentiating newer types of security in applications
  • Differentiating newer types of security in networks
  • Differentiating newer types of security in cloud computing
  • Understanding types of cloud deployment models and hosting options
  • Determining how IT-based organizational roles are helpful with transitioning and managing IT operations
  • Identifying vendor roles, responsibilities, and organizational skill requirements
  • Understanding privacy and compliance across geographic boundaries and jurisdictions
  • Monitoring strategies for information systems security
  • Understanding future trends

The CISSP Introduction is ideal for those working in positions such as, but not limited to:

Security Consultant Security Analyst
Security Manager Security Systems Engineer
IT Director/Manager Chief Information Security Officer
Security Auditor Director of Security
Security Architect Network Architect
Programmers

Requisite Skills

  • Participants should have demonstrated competency in security management on a large, enterprise-wide scale.
  • Participants should possess skills in project management, risk management, creating and delivering a security awareness program, and managing a business continuity planning program.
  • Also, a participant should have a far more well-rounded and complete comprehension of information security than other popular management credentials.
  • Participants should have knowledge of architecture and solving issues with chief security architects or analysts, or work as independent consultants (or in similar capacities), enhancing functionality between the C-suite and upper managerial level and the implementation of a security program.
  • The participant generally either consults on, develops, designs, or analyzes an organization’s overall security plan.

After Completing This Course, the Participant Will Be Able To:

  • Identify key terminology and associated definitions related to cloud technology. Be able to establish a common terminology for use within your team or workgroup.
  • Understand the legal and contractual considerations, security implications, and privacy and compliance regulations as they apply to system security implementation.
  • Build a business case for security adoption, and be able to determine with business units the benefits of the cloud and cloud migration strategies.
  • Identify, understand, and construct basic security components.
  • Identify security-relevant functions within information technology systems and relationships between security functions resident within multiple systems in the environment.
  • Generate comprehensive sets of security requirements and allocate security function responsibility between multiple systems or system components

Course Outline

Day 1: Certified Information Systems Security Professional CBK® Introduction

  • Course Introduction
  • Domain 1: New and existing practices in Security and Risk Management
  • Domain 2: New and existing practices in Asset Security
  • Domain 3: New and existing practices in Security Engineering
  • Domain 4: New and existing practices in Communication and Network Security

Day 2: Certified Information Systems Security Professional CBK® Introduction

  • Domain 5: New and existing practices in Identity and Access Management
  • Domain 6: New and existing practices in Security Assessment and Testing
  • Domain 7: New and existing practices in Security Operations
  • Domain 8: New and existing practices in Software Development Security
  • Wrap-up Quiz and Discussion

Agenda

Monday Oct 7, 2019

Start 10:00
Lunch 12:15 – 13:00 (Lunch is provided)
Break 14:35 – 14:45
End 17:00

Tuesday Oct 8, 2019

Start 10:00
Lunch 12:15 – 13:00 (Lunch is provided)
Break 14:35 – 14:45
End 17:00

Meet the Trainer

Trainers TBA

Trainer details TBA.