CISSP: Certified Information Systems Security Professional

5.0
1 review
  • Amazing experience by far and I loved the course. It was a nice place where I was constantly pushed to limits and it helped grow into a better and skilled person.
    |

Course

Online

£ 250 VAT inc.

Description

  • Type

    Course

  • Methodology

    Online

  • Duration

    1 Year

  • Start date

    Different dates available

Master the fundamentals of information systems security and build a career in the burgeoning IT security sector. Overseen by the Information Systems Security Certification Consortium (ISSCC), the Certified Information Systems Security Professional qualification is a globally recognised badge of excellence. The CISSP course ensures that students acquire all the knowledge and skills they need to complete the certification exam and become a proven IT security expert. This course is best suited to: IT and network security professionals who need to improve their practical skills and attain a professional qualification.. IT engineers and professionals who would like to specialise in IT security.. IT consultants who want to be able to offer their clients a better service.. Individuals who want to cross-train into a new career in IT security.. Using a series of instructor led videos and self-study manuals, the CISSP: Certified Information Systems Security Professional course is delivered online using the learning platform. Course contents are available anyplace anytime, allowing participants to study whenever and wherever is most convenient, or to refer to them to help with challenges in their day-to-day jobs. Learners can test their knowledge and understanding of each module as they progress using the supplied flash cards and educational games; there are also numerous scenarios in each module that students can replicate to improve their understanding. End of unit tests and quizzes ensure students have fully grasped the concepts behind information systems security before moving on to the next task. Students can discuss topics with other learners using the social networking facilities, adding another valuable learning tool by which to further improve knowledge and skills.

Facilities

Location

Start date

Online

Start date

Different dates availableEnrolment now open
Different dates availableEnrolment now open
Different dates availableEnrolment now open
Different dates availableEnrolment now open
Different dates availableEnrolment now open
Different dates availableEnrolment now open

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

5.0
  • Amazing experience by far and I loved the course. It was a nice place where I was constantly pushed to limits and it helped grow into a better and skilled person.
    |
0%
4.5
excellent

Course rating

Recommended

Centre rating

Emily

5.0
22/02/2018
What I would highlight: Amazing experience by far and I loved the course. It was a nice place where I was constantly pushed to limits and it helped grow into a better and skilled person.
What could be improved: .
Would you recommend this course?: No
*All reviews collected by Emagister & iAgora have been verified

Subjects

  • Network Training
  • Systems
  • Network
  • Information Systems
  • Access

Course programme

Over the course of ten modules students will be introduced to a number of security provisions that can be applied to protect enterprise class systems against cyberattack or negligence. Learners are taken through each concept and then given the opportunity to test their knowledge using a series of practical examples. During the course students will cover: The principles of access control and how they can be strengthened and applied to keep unauthorised users out of a system.. Telecommunications and network systems that need to be hardened to prevent data loss or theft.. The role that information governance and risk management play in raising security standards, and how they need to be applied to corporate information systems.. The importance of secure software architecture and design to help ensure that in-house systems protect data and resources.. Using cryptography to protect data in transit and prevent unauthorised access of files without the correct encryption keys.. Using security architecture and design principles to limit data access and potential angles of attack.. Monitoring, auditing and improving operations security to keep systems secure at the point of access.. Designing and implementing business continuity and disaster recovery plans to help re-establish operations as quickly as possible following a serious outage.. Legal obligations of data security and obligations that must be fulfilled in the event of a criminal investigation.. Physical and environmental security considerations, like preventing theft of computer hardware or potential fire risks..

CISSP: Certified Information Systems Security Professional

£ 250 VAT inc.