CISSP - Official Review Seminar

Course

In London

Price on request

Description

  • Type

    Course

  • Location

    London

  • Start date

    Different dates available

This 5-day Review Seminar is globally recognised as the ideal educational tool to help you attain the prestigious and highly sought after CISSP certification.               

Facilities

Location

Start date

London
See map
EC2N

Start date

Different dates availableEnrolment now open

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

Subjects

  • IT
  • IT Security
  • Security
  • Network Training
  • Network
  • Access
  • Materials

Course programme

Description
1This 5-day Review Seminar is globally recognised as the ideal educational tool to help you attain the prestigious and highly sought after CISSP certification.

Who is this course suitable for?
The London based seminar will comprehensively detail the 10 domains of the CBK, providing the ideal opportunity to engage in lively group discussion, panel debate on current initiatives and Q&A sessions.
What does this course cover?
Most information security professionals specialise in only one or two of the CBK domains and typically have varying degrees of knowledge in the other eight or nine. In-depth knowledge of all 10 domains are required to pass the exam.

For this reason we have developed this intensive, five-day review seminar that will refresh your knowledge and broaden your understanding of all 10 CISSP CBK domains.

The Seminar provides:
· A complete overview of the scope of the CISSP CBK;
· A comprehensive review and discussion of the topics, subtopics, and sub-topics of the CISSP CBK domains;
· Extensive knowledge-based materials and presentations developed by (ISC)² -authorised instructors and subject matter experts;
· A self-assessment consisting of 100 questions that test your knowledge of the CISSP CBK;
· A personal critique of your results to help you focus on the topic where you need more study;
· A comprehensive student guide that addresses all materials covered by the course
The course instructors are friendly, reliable and enthusiastic individuals, carefully selected to meet the requirements of any given region. They will deliver the CBK Review Seminar with a professional and dedicated approach, engaging themselves in topics of discussion during the seminar.

During the course, you will learn:

The 10 Domains of the CISSP CBK:
Information Security and Risk
· Identification of an organisation's information assets and the development, documentation, and implementation of policies, standards, procedures, and guidelines.
a. Governance
b. Organisational Behaviour
c. Security Awareness, Training and Education
d. Risk Management
e. Ethics
Access Control
· A collection of mechanisms that work together to create a security architecture to protect the assets of the information system.
a. Information Classification
b. Access Control Categories, Types and Threats
c. Identity and Access Management
d. IDS and IPS
Cryptography
· The principles, means, and methods of disguising information to ensure its integrity, confidentiality and authenticity.
a. Encryption Systems
b. Message Integrity Controls
c. Digital Signatures
d. Encryption Management
e. Cryptanalysis and Attacks
Physical (Environmental) Security
· Protection techniques for the entire facility, including all of the information system resources.
a. Site Location and Layered Defense
b. Building Infrastructure Protection
c. Physical Control Types
Security Architecture and Design
· Concepts, principles, structures, and standards used to design, monitor, and secure operating systems, equipment, networks, applications and controls used to enforce various levels of availability, integrity, and confidentiality.
a. Components and Principles
b. Security Models and Architecture Theory
c. Security Evaluations Methods and Criteria
Business Continuity and Disaster Recovery Planning
· Addresses the preservation of the business in the event of outages to normal business operations.
a. Project Scope Development and Planning
b. Business Impact Analysis
c. Emergency Assessment
d. Business Continuity and Recovery Strategy
e. Implementation
Telecommunications and Network Security
· Includes network structures, transmission methods, transport formats, security measures, and authentication.
a. Network Types and Architectures
b. Wireless Transmission Technologies
c. Network Protocols and Attacks
d. Traditional and VOIP Telephony
Application Security
· Outlines the environment where software is designed and developed and explains the critical role software plays in providing security to the information system.
a. System Life Cycle Security
b. Application Environment and Security Controls
c. Databases
d. System Threats and Vulnerabilities
e. Malicious Code
Operations Security
· Used to identify the controls over hardware, media, and operators and adminstrators with access privileges to any of these resources.
a. Resource Protection
b. Physical Access Control
c. Continuity of Operations
d. Change Control Management
e. Security Administrator Privileges
Legal, Regulations, Compliance and Investigations
· Addresses computer crime laws and regulations, investigative measures and techniques, and forensic evidence gathering.
a. Major Legal Systems
b. Information System and Internet Legal Concepts
c. Intellectual Property
d. Investigation
e. Computer Forensics
Are there entry requirements?
If you plan to build a career in information security - one of today's most visible professions - and if you have at least four full years of experience in information security, or three years and an university degree, then CISSP certification should be your next career goal.
What's included?
Our package includes lunch and refreshments, and full course materials.

Although the course is non-residential, we offer help finding appropriate hotels, close to the training venue. To take advantage of this offer, drop us an email after you book your course.
Additional info
Please note: the exam is not taken during this training course. It needs to be booked & paid for directly with the exam board, please contact us for more details.

CISSP - Official Review Seminar

Price on request