Certified Information Systems Security Professional (CISSP) in CybersecuritySecurity and Safety

In any city around the world 00447455203759 Course Code: AC/2024/31

Course Description

Course Duration: Five Training Days
Course Language: Arabic or English
Include:
Scientific material with TAB
Workshops
Reception and farewell at the airport
Daily lunch
Coffee Break

Introduction
The CISSP certification by International Information Systems Security Certification Consortium, known as (ISC)2 ranks among the most sought-after credentials in the industry. Earning your CISSP demonstrates that you’re experienced in IT security and capable of designing, implementing, and monitoring a cybersecurity program.
This training is for experienced security professionals looking to advance their careers. CISSP credential holders are decision-makers who possess the expert knowledge and technical skills necessary to develop, guide and manage security standards, policies and procedures within their organizations.
The course will help participants assess and empower experienced security professionals with the expertise, knowledge, and credentials necessary to play key roles in enhancing cybersecurity and information security within their organizations while also advancing their own careers in the process.

Objectives
 By the end of this


comprehensive understanding of security principles, risk management, access control, software development security, and more.
Prepare effectively for the CISSP certification exam, equipping participants with the knowledge and confidence to succeed in their certification journey.
Develop expertise in designing robust security programs, managing incidents, and recovering from security breaches while adhering to legal and regulatory requirements.
Gain proficiency in identity and access management, ensuring secure authentication, authorization, and identity lifecycle management.
Acquire skills in security operations, including monitoring, incident response, and compliance, while comprehending secure software development practices for building resilient applications.

Who Should Attend?
Chief information security officer
Cybersecurity auditor
Security administrator
Information systems security officer
IT security engineer
Data governance manager
Senior security consultant
Information assurance analyst

Course Outline
unite1:
A.    Introduction to CISSP and Security Concepts
Security domains and their interrelationships
Security governance and risk management
Data classification and handling


B.    Security and Risk Management


Introduction to security management principles
Risk assessment and management
Security governance and policies

unite2:
Senior security consultant
Information assurance analyst
 
Course Outline
5 days course
Day 1
Day 2
Day 3
Day 4
Day 5
A.    Asset Security - Security Architecture and Engineering


Asset classification and ownership
Data handling and retention policies
Privacy protection and data security
Secure disposal of assets
Security models and frameworks
System and network architecture security
Secure design principles and controls
Security in the software development lifecycle


 
B.    Communication and Network Security


Network protocols and secure communication
Network architecture and segmentation
Secure remote access and VPNs
Wireless network security

unite3:
A.    Identity and Access Management (IAM)


IAM concepts and principles
Authentication methods and mechanisms
Authorization and access control
Identity and access provisioning


B.    Security Assessment Testing


Vulnerability assessment and management
Penetration testing methodologies
Security control testing and auditing
Incident response and management

unite4:
A.    Software Development Security


Secure software development lifecycle (SDLC)
Code review and testing techniques
Security implications of third-party software
Secure coding practices


B.    Security Operations


Security operations and monitoring
Incident response and recovery procedures
Business continuity and disaster recovery planning
Logging and monitoring best practices
 

unite5:
A.    Security Operations Best Practices


Security controls and countermeasures
Security awareness and training programs
Collaboration with law enforcement and external agencies
Security operations metrics and reporting


B.    Review and Exam Preparation
Review of key concepts of the course
Mock CISSP practice exams
Exam strategies and tips