Course Description
Course Duration: Five Training Days
Course Language: Arabic or English
Include:
Scientific material with TAB
Workshops
Reception and farewell at the airport
Daily lunch
Coffee Break
Introduction
The CISSP certification by International Information Systems Security Certification Consortium, known as (ISC)2 ranks among the most sought-after credentials in the industry. Earning your CISSP demonstrates that you’re experienced in IT security and capable of designing, implementing, and monitoring a cybersecurity program.
This training is for experienced security professionals looking to advance their careers. CISSP credential holders are decision-makers who possess the expert knowledge and technical skills necessary to develop, guide and manage security standards, policies and procedures within their organizations.
The course will help participants assess and empower experienced security professionals with the expertise, knowledge, and credentials necessary to play key roles in enhancing cybersecurity and information security within their organizations while also advancing their own careers in the process.
Objectives
By the end of this
comprehensive understanding of security principles, risk management, access control, software development security, and more.
Prepare effectively for the CISSP certification exam, equipping participants with the knowledge and confidence to succeed in their certification journey.
Develop expertise in designing robust security programs, managing incidents, and recovering from security breaches while adhering to legal and regulatory requirements.
Gain proficiency in identity and access management, ensuring secure authentication, authorization, and identity lifecycle management.
Acquire skills in security operations, including monitoring, incident response, and compliance, while comprehending secure software development practices for building resilient applications.
Who Should Attend?
Chief information security officer
Cybersecurity auditor
Security administrator
Information systems security officer
IT security engineer
Data governance manager
Senior security consultant
Information assurance analyst
Course Outline
unite1:
A. Introduction to CISSP and Security Concepts
unite1:
A. Introduction to CISSP and Security Concepts
Security domains and their interrelationships
Security governance and risk management
Data classification and handling
B. Security and Risk Management
Introduction to security management principles
Risk assessment and management
Security governance and policies
unite2:
Senior security consultant
Information assurance analyst
Course Outline
5 days course
Day 1
Day 2
Day 3
Day 4
Day 5
A. Asset Security - Security Architecture and Engineering
Asset classification and ownership
Data handling and retention policies
Privacy protection and data security
Secure disposal of assets
Security models and frameworks
System and network architecture security
Secure design principles and controls
Security in the software development lifecycle
B. Communication and Network Security
Network protocols and secure communication
Network architecture and segmentation
Secure remote access and VPNs
Wireless network security
unite3:
A. Identity and Access Management (IAM)
IAM concepts and principles
Authentication methods and mechanisms
Authorization and access control
Identity and access provisioning
B. Security Assessment Testing
Vulnerability assessment and management
Penetration testing methodologies
Security control testing and auditing
Incident response and management
unite4:
A. Software Development Security
Secure software development lifecycle (SDLC)
Code review and testing techniques
Security implications of third-party software
Secure coding practices
B. Security Operations
Security operations and monitoring
Incident response and recovery procedures
Business continuity and disaster recovery planning
Logging and monitoring best practices
unite5:
A. Security Operations Best Practices
Security controls and countermeasures
Security awareness and training programs
Collaboration with law enforcement and external agencies
Security operations metrics and reporting
B. Review and Exam Preparation
Review of key concepts of the course
Mock CISSP practice exams
Exam strategies and tips