$95 – $1,995

Certified Information Systems Security Professional (CISSP) Training Sydney

Actions and Detail Panel

$95 – $1,995

Event Information

Share this event

Date and Time

Location

Location

ICC Sydney

14 Darling Drive

Sydney, NSW 2000

Australia

View Map

Event description
Become a cybersecurity expert with this comprehensive CISSP Training Course.

About this Event


		Certified Information Systems Security Professional (CISSP) Training Sydney image

		Certified Information Systems Security Professional (CISSP) Training Sydney image

Certified Information Systems Security Professional Course

Become a cybersecurity expert with this comprehensive CISSP Training Course.

Learn about the eight domains of the (ISC)2 Common Body of Knowledge.

You will receive 5 complete days of course instruction from a Tier 1 trainer when you attend this course along with the following material:

  1. Official (ISC)2 CISSP Study Guide
  2. Official (ISC)2 Practice Tests

Course content

The 8 domains of the CISSP Common Body of Knowledge, upgraded in 2021, are covered in this course. The course covers every theme in the new CBK and includes complete preparation for the CISSP exam.

1. Introduction

Welcome and Administration

Course Overview

Review and Revision Techniques

The Exam

On the Day of the Exam

Exam Technique

After the Exam

2. Security and Risk Management

Understand, adhere to, and promote professional ethics

Evaluate and apply security concepts

Evaluate and apply security governance principles

Determine compliance and other requirements

Understand legal and regulatory issues that pertain to information security in a holistic context

Understand requirements for investigation types

Develop, document, and implement security policy, standards, procedures, and guidelines

Identify, analyze, and prioritize Business Continuity (BC) requirements

Contribute to and enforce personnel security policies and procedures

Understand and apply risk management concepts

Understand and apply threat modeling concepts and methodologies

Apply Supply Chain Risk Management (SCRM) concepts

Establish and maintain a security awareness, education, and training program

3. Asset Security

Identify and classify information and assets

Establish information and asset handling requirements

Provision resources securely

Manage data lifecycle

Ensure appropriate asset retention

Determine data security controls and compliance requirements

4. Security Architecture and Engineering

Research, implement and manage engineering processes using secure design principles

Understand the fundamental concepts of security models

Select controls based upon systems security requirements

Understand security capabilities of Information Systems

Assess and mitigate the vulnerabilities of security architectures, design and solution elements

Select and determine cryptographic solutions

Understand methods of cryptanalytic attacks

Apply security principles to site and facility design

Design site and facility security controls

5. Communications and Network Security

Assess and implement secure design principles in network architectures

Secure network components

Implement secure communication channels according to design

6. Identity and Access Management

Control physical and logical access to assets

Manage identification and authentication of people, devices, and services

Federated identity with a third-party service

Implement and manage authorization mechanisms

Manage the identity and access provisioning lifecycle

Implement authentication systems

7. Security Assessment and Testing

Design and validate assessment, test, and audit strategies

Conduct security control testing

Collect security process data

Analyze test output and generate reports

Conduct or facilitate security audits

8. Security Operations

Understand and comply with investigations

Conduct logging and monitoring activities

Perform Configuration Management

Apply foundational security operations concepts

Apply resource protection

Conduct incident management

Operate and maintain detective and preventative measures

Implement and support patch and vulnerability management

Understand and participate in change management processes

Implement recovery strategies

Implement Disaster Recovery (DR) processes

Test Disaster Recovery Plans (DRPs)

Participate in Business Continuity (BC) planning and exercises

Implement and manage physical security

Address personnel safety and security concerns

9. Software Development Security

Understand and integrate security in the Software Development Life Cycle (SDLC)

Identify and apply security controls in development ecosystems

Assess the effectiveness of software security

Assess security impact of acquired software

Define and apply secure coding guidelines and standards

10. Summary and Wrap-up

Exam practice questions

CISSP Exam

The Computer Adaptive Testing (CAT) technique is used during the CISSP exam.

Pearson Vue administers the CISSP examination on behalf of (ISC)2. The exam must be registered online. Please contact Pearson Vue for exam dates and information on how to register for an exam.

NOTE: The cost of the CISSP exam is not included in the course price. Exams must be registered with Pearson Vue directly.

Fee Structure

$95 per person (Early bird discount price)

$1995 per person (Final Price)

Share with friends

Date and Time

Location

ICC Sydney

14 Darling Drive

Sydney, NSW 2000

Australia

View Map

Save This Event

Event Saved