course-image

CISSP Certification Training

DATE

Yet to be Determind

LOCATION

Accra

Why Attend?

CISSP Certification Training

course-obj_img Course Objectives

  • black-circle_img This Course Objective Hasn't Been Provided Yet

course-obj_img Target Audience

Security analysts, security architects, IT managers, chief information security officers, security consultants, security managers, and individuals who fulfill the requirements set by ISC2 can attend CISSP Certification Training. 

Introduction

Topics

  • · Course Introduction

Security and Risk Management

Topics

  • · Security and Risk Management
  • · Information Security Management
  • · Security Controls
  • · Information Security Management and Governance
  • · Goals, Mission, and Objectives
  • · Engage and support virtual teams
  • · Due Care
  • · Security Policy
  • · Compliance
  • · Computer Crimes
  • · Legal Systems
  • · Intellectual Property (IP) Law
  • · Privacy
  • · General Data Protection Regulation
  • · Security
  • · Risk Analysis
  • · Types of Risk Analysis
  • · Security Control Assessment
  • · Threat Modeling
  • · Supply-Chain Risk Management
  • · Third-Party Management
  • · Business Continuity Planning
  • · Business Continuity Planning Phases
  • · Managing Personnel Security
  • · Security Awareness Training
  • · Program Effectiveness Evaluation

Asset Security

  • · Asset Security
  • · Information Classification
  • · Data Classification
  • · Data Life Cycle
  • · Data Management
  • · Different Roles
  • · Data Remanence
  • · Privacy
  • · States of Data
  • · Data Loss Prevention

Security Engineering 

  • Introduction
  • · Security Engineering
  • · Security Architecture
  • · Security Models
  • · Evaluation Criteria
  • · System Security
  • · CPU
  • · Memory
  • · Security Mode
  • · Cloud Computing
  • · IOT
  • · Industrial Control System (ICS)
  • · Cryptography
  • · Encryption Methods
  • · DES
  • · Asymmetric Cryptography
  • · Public Key Infrastructure
  • · Cryptanalysis
  • · Key Management
  • · Critical Path Analysis
  • · Site Location
  • · Fire
  • · HVAC

Communication and Network Security

  • · Introduction
  • · Network Architecture and Design
  • · IP Addressing
  • · Network Protocols
  • · Transmission Media
  • · Firewall
  • · Intrusion Detection System and Intrusion Prevention System
  • · Network Access Control (NAC)
  • · Content Delivery Network (CDN)
  • · Networks
  • · Software-Defined Networking (SDN)
  • · Remote Access
  • · Internet Security Protocol (IPsec)
  • · Voice over Internet Protocol (VoIP)
  • · Phreaking
  • · Secure Access Protocols
  • · Wireless Technologies
  • · Network Attacks

Identity and Access Management

  • · Identity and Access Management
  • · Identity Management
  • · Biometrics
  • · Passwords
  • · Tokens
  • · Memory Cards and Smart Cards
  • · Access and Authorization Concepts
  • · Identity Management Implementation
  • · Kerberos
  • · Access Control Types
  • · Access Control Models
  • · Access Control Tools and Techniques
  • · Accountability
  • · Access Control Monitoring
  • · Identity Proofing
  • · Markup Languages
  • · Identity as a Service (IDaaS)

Security Assessment and Testing

  • · Security Assessment and Testing
  • · Security Assessment
  • · Vulnerability Assessment
  • · Penetration Testing
  • · Audits
  • · Log Management
  • · Synthetic Transaction and Real Transaction
  • · Testing
  • · Software Testing
  • · Interface
  • · Key Performance Indicators (KPI)

Security operations

  • · Security Operations
  • · Investigation
  • · Forensic Investigation
  • · Evidence
  • · Electronic Discovery
  • · Incident Management
  • · Security Operations Management
  • · Identity and Access Management
  • · Assets
  • · Malware
  • · Management
  • · Recovery and Backup
  • · Disaster Recovery
  • · Perimeter Security

Software Development Security

  • Software Development Security
  • Importance of Software Development Security
  • Programming Concepts
  • Systems Development Life Cycle
  • Application Program Interface
  • Software Security and Assurance
  • Database and Data Warehouse Environments
  • Knowledge Management
  • Web Application Environment
  • Security Threats and Attacks

This course hasn't been scheduled yet, however you can request for In-House training

Join Our Community