Addis Ababa Certified Information Systems Security Professional (CISSP) Tra…

When:
December 16, 2017 @ 5:30 pm – January 14, 2018 @ 9:30 pm
2017-12-16T17:30:00-01:00
2018-01-14T21:30:00-01:00
Where:
Instructor led Online | Video Conference Addis Ababa, Addis Ababa Ethiopia
Instructor led Online | Video Conference Addis Ababa
Addis Ababa Ethiopia
Cost:
$1,054.67
Contact:
Addis Ababa Certified Information Systems Security Professional (CISSP) Tra... @ Instructor led Online | Video Conference  Addis Ababa, Addis Ababa  Ethiopia  |  |  |

Ask us how you can save $100 off the ticketed price

Video Conference Details

Will be sent to you once you register and make the payment

Next class starting

Devember 16, 2017

Training Session Details

There will be 8 online sessions, each session being of 2.5 hours. Every session will have presentation about theory, concepts and technology, followed by Hands-on Lab practice exercises.

Training Dates

Begins December 16, taught over 5 weekends ending Januray 14, 2018
Sat and Sun 6:30 AM – 10:30 AM (US Pacific Time)
Class dates: December 16,17,23,24,30,31,January 6,7,13,14, 2018
Each session will be recorded and the recordings will be shared after each session with students.

About this course

CISSP training Course (Certified Information Systems Security Professional) is the essential credential for a security professional to validate their competencies and skill set to deploy a diverse information security infrastructure for protecting the organization from potential cybersecurity hazards.

The course has been sponsored by (ISC)2, one of world’s leading non-profit organization for providing healthy aids to the field of information security. The certification qualifies a candidate to effectively create, implement and evaluate the cybersecurity tools and technologies used to facilitate the healthy transfer of information across a diverse work environment.

The CISSP has been the first credential in the field of information security to meet the stern requirements of ISO/IEC Standard 17024.

Who should attend?

The CISSP training Course is ideal for those working with the profiles of:

Security Systems Engineer
Security Consultants/Analysts
Security/Network Architect
Security Auditor/Manager

Prerequisites

The candidates must meet the following requirements before taking the CISSP training course:
Have a minimum of five years of direct full-time security professional work experience in the below-mentioned domains:

Access Control
Cryptography
Application Development Security
Operations Security
Information Security Governance and Risk Management
Legal, Regulations, Investigations and Compliance
Business Continuity and Disaster Recovery Planning

Course Outline

The CISSP CBK consists of the following eight domains:

1. Security and Risk Management (Security, Risk, Compliance, Law, Regulations, and Business Continuity)

Legal and regulatory issues
Confidentiality, integrity, and availability concepts
Security governance principles
Compliance
Professional ethics
Business continuity requirements
Personnel security policies
Threat modeling
Risk considerations
Security education, training, and awareness
Security policies, standards, procedures and guidelines

2. Asset Security (Protecting Security of Assets)

Protect privacy
Information and asset classification
Ownership (e.g. data owners, system owners)
Data security controls
Appropriate retention
Handling requirements

3. Security Engineering (Engineering and Management of Security)

Security evaluation models
Security models fundamental concepts
Security architectures, designs, and solution elements vulnerabilities
Security capabilities of information systems
Engineering processes using secure design principles
Web-based systems vulnerabilities
Mobile systems vulnerabilities
Cryptography
Embedded devices and cyber-physical systems vulnerabilities
Site and facility design secure principles
Physical security

4. Communication and Network Security

Secure network architecture design
Secure communication channels
Secure network components
Network attacks

5. Identity and Access Management (Controlling Access and Managing Identity)

Access control attacks
Physical and logical assets control
Identity as a service (e.g. cloud identity)
Identification and authentication of people and devices
Identity and access provisioning lifecycle (e.g. provisioning review)
Third-party identity services (e.g. on-premise)

6. Security Assessment and Testing (Designing, Performing, and Analyzing Security Testing)

Test outputs (e.g. automated, manual)
Security process data (e.g. management and operational controls)
Security architectures vulnerabilities
Security control testing
Assessment and test strategies

7. Security Operations (Foundational Concepts, Investigations, Incident Management, and Disaster Recovery)

Logging and monitoring activities
Investigations support and requirements
Incident management
Provisioning of resources
Foundational security operations concepts
Recovery strategies
Resource protection techniques
Physical security
Preventative measures
Patch and vulnerability management
Change management processes
Business continuity planning and exercises
Personnel safety concerns
Disaster recovery processes and plans

8. Software Development Security (Understanding, Applying, and Enforcing Software Security)

Development environment security controls
Security in the software development lifecycle
Acquired software security impact
Software security effectiveness

FAQ
What is the CISSP Certification Process?

We follow a distinct certification process for CISSP that will help you to face the challenges of the IT world. Hence, you are required to follow the below listed pointers to earn your CISSP certification –

You need to attend one complete batch of CISSP
You are then required to enroll yourself for the CISSP exam
You need to complete the CISSP exam with minimum passing score of 700 out of 1000 points

What is the value of the CISSP certification?

CISSP certification is meant for the next generation of Information Security Leaders therefore it carries immense value. It is an ideal credential for those with proven deep managerial and technical competence, experience, skills and credibility to engineer, design, manage and implement their overall information security program.

What is the intended audience for CISSP?

CISSP training and certification is fit for the following profiles –

Security Consultant
Security Manager
IT Director/Manager
Security Auditor
Security Architect
Security Analyst
Security Systems Engineer
Chief Information Security Officer
Director of Security
Network Architect

What are the career opportunities after doing CISSP?

After attaining CISSP training and certification you can work as –

Information Security Manager
Information Security Analyst
Security Consultant (Computing / Networking / Information Technology)
Senior Security Consultant
Security Architect – IT
Chief Information Security Officer
Information Security Specialist

What is the best method to study for the CISSP?

Enroll for the CISSP training and explore all the following 8 domains of the CISSP Common Body of Knowledge (CBK) to prepare and pass the CISSP exam:

Security and Risk Management
Asset Security
Security Engineering
Communications and Network Security
Identity and Access Management
Security Assessment and Testing
Security Operations
Software Development Security

What all will I get as part of the training?

You will receive the following after enrolling for CISSP training and certification –

Training Delivery
Courseware
Mock Sessions
Course Completion Certificate

Is exam fee included in the course fee?

No, CISSP certification exam fee is not included in the training cost.

What is the format of CISSP exam?

In the CISSP exam, question format of multiple choice and advanced innovative is followed.

Class Size: Maximum 22

Price: $999

Refund Policy

1. There will be no refunds.
2. If a class is not taken for any reason, rescheduled or cancelled, purchase price can be applied toward any published future class of equal or lesser value.