CISSP: Certified Information Systems Security Professional (Lifetime Access)
CISSP stands for Certified Information Systems Security Professional. It is the premium cybersecurity certification from (ISC)2, being used as a measurement in IT security to demonstrate elite knowledge information systems security.
CISSP was the first information security credential to meet the strict criteria of ISO/IEC Standard 17024.
Why should I take CISSP?
CISSP increases your credibility in IT security, it allows you to strength your skills and knowledge of cybersecurity, as well as focusing on practical application of the knowledge and tools that you use. The 2017 Global Information Security Workforce Study reported that (ISC)2 members have 35% higher salaries than non-members, so being a part of a globally recognised community will provide you with distinction and esteem that few other qualifications can offer.
Who is the CISSP course suited to?
CISSP is suitable for aspiring or current IT security experts, including:
- IT and network security professionals who need to improve their practical skills and attain a professional qualification.
- IT engineers and professionals who would like to specialise in IT security.
- IT consultants who want to be able to offer their clients a better service.
- Individuals who want to cross-train into a new career in IT security.
Key Learning Points
- The principles of access control and how they can be strengthened and applied to keep unauthorised users out of a system.
- Telecommunications and network systems that need to be hardened to prevent data loss or theft.
- The role that information governance and risk management play in raising security standards, and how they need to be applied to corporate information systems.
- The importance of secure software architecture and design to help ensure that in-house systems protect data and resources.
- Using cryptography to protect data in transit and prevent unauthorised access of files without the correct encryption keys.
- Using security architecture and design principles to limit data access and potential angles of attack.
- Monitoring, auditing and improving operations security to keep systems secure at the point of access.
- Designing and implementing business continuity and disaster recovery plans to help re-establish operations as quickly as possible following a serious outage.
- Legal obligations of data security and obligations that must be fulfilled in the event of a criminal investigation.
- Physical and environmental security considerations, like preventing theft of computer hardware or potential fire risks.
ADVANTAGES OF THIS COURSE
- Fully prepare for the CISSP certification exam once you have reached the (ISC)2 specified prerequisites
- 56% of jobs in cyber security contracting require CISSP
- One of the top 15 paying certifications for 2017
- Security and Risk Management
- Asset Security
- Security Engineering
- Communication and Network Security
- Identity and Access Management
- Security Assessment Testing
- Security Operations
- Software Development Security
|1 gigahertz (GHz)|
|Internet Explorer 8 or above
Safari 6 or above