This is an example of a simple banner

Training: Certified Information Systems Security Professional – CISSP

Ref. ISC-CISSP
Duration:
5
 days
Exam:
Optional
Level:
Advanced

Certified Information Systems Security Professional training - CISSP

Expand your knowledge of information security

This course teaches the concepts of information security and industry best practices, covering the eight domains of the official CISSP CBK (Common Body of Knowledge).
You will gain knowledge in information security that will enhance your ability to successfully implement and manage security programs in any organization or governmental entity.

We prepare you for the CISSP exam: Certified Information Systems Security Professional

This 5-day training effectively prepares you for the CISSP (Certified Information Systems Security Professional) exam. This course will cover, among other topics, security and risk management, security engineering, and the evaluation of the effectiveness of existing security measures.

Participant profiles

  • Anyone whose position requires CISSP certification
  • Individuals who want to advance within their current computer security careers or migrate to a related career

Objectives

  • Security and Risk Management
  • Asset Security
  • Security Engineering
  • Communications and Network Security
  • Identity and Access Management
  • Security Assessment and Testing
  • Security Operations
  • Software Development Security

Prerequisites

  • Minimum of five years of experience working in IT Infrastructures and Cybersecurity

Course content

Module 1: Security and Risk Management (e.g., Security, Risk, Compliance, Law, Regulation, Business Continuity)

  • Understand and apply the concepts of confidentiality, integrity, and availability
  • Apply security governance principles
  • Compliance
  • Understand legal and regulatory issues that relate to information security in a global context
  • Develop and implement documented security policies, standards, procedures, and guidelines
  • Understand business continuity requirements
  • Contribute to personnel security policies
  • Understand and apply risk management concepts
  • Understand and apply threat modeling
  • Integrate security risk factors into acquisition strategy and practice
  • Establish and manage security education, training, and awareness

Module 2: Asset Security (Protecting Security of Assets)

  • Classify information and support resources
  • Determine and maintain ownership
  • Protect privacy
  • Ensure proper retention
  • Determine data security controls
  • Establish handling requirements

Module 3: Security Engineering (Engineering and Management of Security)

  • Implement and manage an engineering lifecycle using security design principles
  • Understand fundamental concepts of security models
  • Select controls and countermeasures based on information security standards
  • Understand information system security capabilities
  • Assess and mitigate vulnerabilities in security architectures, designs, and solution elements
  • Assess and mitigate vulnerabilities in web systems
  • Assess and mitigate vulnerabilities in mobile systems
  • Assess and mitigate vulnerabilities in embedded devices and cyber-physical systems
  • Apply cryptography
  • Apply secure principles to site and facility design
  • Design and implement facility security

Module 4: Communications and Network Security (Designing and Protecting Network Security)

  • Apply secure design principles to network architecture
  • Secure network components
  • Design and establish secure communication channels
  • Prevent or mitigate network attacks

Module 5: Identity and Access Management (Access Control and Identity Management)

  • Control physical and logical access to assets
  • Manage identification and authentication of people and devices
  • Integrate Identity as a Service (IDaaS)
  • Integrate third-party identity services
  • Implement and manage authorization mechanisms
  • Prevent or mitigate access control attacks
  • Manage the identity and access provisioning lifecycle

Module 6: Security Assessment and Testing (Designing, Performing, and Analyzing Security Testing)

  • Design and validate assessment and testing strategies
  • Perform security control testing
  • Collect security process data
  • Conduct or facilitate internal and external audits

Module 7: Security Operations (e.g., Foundational Concepts, Investigations, Incident Management, Disaster Recovery)

  • Understand and support investigations
  • Understand the requirements for investigation types
  • Conduct logging and monitoring activities
  • Secure resource provisioning through configuration management
  • Understand and apply foundational security operations concepts
  • Employ resource protection techniques
  • Incident response
  • Operate and maintain preventive measures
  • Implement and support patch and vulnerability management
  • Participate and understand change management processes
  • Implement recovery strategies
  • Implement disaster recovery processes
  • Test disaster recovery plans
  • Participate in business continuity planning
  • Implement and manage physical security
  • Participate in personnel security

Module 8: Software Development Security (Understanding, Applying, and Enforcing Software Security)

  • Understand and apply security in the software development lifecycle
  • Apply security controls in the development environment
  • Assess the effectiveness of software security
  • Assess the security of software acquisition

Documentation

  • Digital courseware included

Exam

  • This course prepares you to the CISSP: Certified Information Systems Security Professional exam. If you wish to take this exam, please contact our secretariat who will let you know the cost of the exam and will take care of all the necessary administrative procedures for you

Complementary courses

Additional information

CISSP Certification: A Key Step for Security Professionals

The CISSP certification is one of the most prestigious certifications in information security. It validates the expertise of professionals capable of designing, implementing, and managing advanced security programs. This article will explain how to obtain the CISSP certification, why it is crucial for your career, and how to recertify it.

How to Obtain the CISSP Certification?

Obtaining the CISSP certification requires meeting several criteria. First and foremost, you must have at least five years of experience in two of the eight domains of the Common Body of Knowledge (CBK), covering aspects such as risk management, network security, and cryptography.

Steps to Obtain the Certification

To prepare, it is highly recommended to attend a CISSP security training provided by accredited organizations. The exam, consisting of 150 questions, covers areas such as risk management, security engineering, and access management. If the candidate does not have the required experience, they can achieve Associate of (ISC)² status while completing their years of experience.

Finally, candidates must adhere to the (ISC)² Code of Ethics, ensuring ethical behavior in the practice of security.

Why Pursue CISSP?

The CISSP certification is a benchmark in the field of information security. It demonstrates to employers that you have mastered the advanced techniques necessary to protect information systems from cyberattacks.

International Recognition

The certification is globally recognized and often required for positions such as Chief Information Security Officer, cybersecurity consultant, or security auditor. This makes it a major asset for advancing your career.

Career Advantages

In addition to validating your skills, the CISSP gives you access to a network of certified professionals and exclusive resources to keep your knowledge up to date. It is an investment that can significantly enhance your career prospects.

How to Recertify CISSP?

Recertification is mandatory every three years to maintain the validity of the CISSP. To do so, you must accumulate 120 Continuing Professional Education (CPE) credits during this period.

Accumulating CPE Credits

Credits can be earned by attending conferences, taking additional training, or publishing articles on information security. If you do not reach 120 credits, you can also retake the exam.

What Does CISSP Demonstrate?

The CISSP certification demonstrates advanced mastery of information security concepts. It proves that you are capable of managing risks, designing secure architectures, and implementing robust security protocols.

Proof of Competence for Employers

For an employer, hiring a professional certified with CISSP is a guarantee of competence and reliability. It shows that you are capable of protecting information systems against current and future threats.

In summary, the CISSP certification is a major asset for anyone seeking to advance in the field of cybersecurity. It offers significant career opportunities and international recognition of your skills.

Prix de l'inscription
CHF 4'650.-
Inclus dans ce cours
  • Training provided by an industry expert
  • Digital documentation and materials
  • Achievement Badge
Mois actuel

lun17Fév(Fév 17)09:00ven21(Fév 21)17:00VirtuelConfirméVirtual Etiquettes de sessionISC-CISSP

lun17Fév(Fév 17)09:00ven21(Fév 21)17:00Genève, Route des Jeunes 35, 1227 CarougeConfirmé Etiquettes de sessionISC-CISSP

lun10Mar(Mar 10)09:00ven14(Mar 14)17:00VirtuelVirtual Etiquettes de sessionISC-CISSP

lun10Mar(Mar 10)09:00ven14(Mar 14)17:00Lausanne, Avenue Mon repos 24, 1005 Lausanne Etiquettes de sessionISC-CISSP

lun05Mai(Mai 5)09:00ven09(Mai 9)17:00VirtuelVirtual Etiquettes de sessionISC-CISSP

lun05Mai(Mai 5)09:00ven09(Mai 9)17:00Genève, Route des Jeunes 35, 1227 Carouge Etiquettes de sessionISC-CISSP

lun30Juin(Juin 30)09:00ven04juil(juil 4)17:00VirtuelVirtual Etiquettes de sessionISC-CISSP

lun30Juin(Juin 30)09:00ven04juil(juil 4)17:00Lausanne, Avenue Mon repos 24, 1005 Lausanne Etiquettes de sessionISC-CISSP

lun25Aoû(Aoû 25)09:00ven29(Aoû 29)17:00VirtuelVirtual Etiquettes de sessionISC-CISSP

lun25Aoû(Aoû 25)09:00ven29(Aoû 29)17:00Genève, Route des Jeunes 35, 1227 Carouge Etiquettes de sessionISC-CISSP

lun20Oct(Oct 20)09:00ven24(Oct 24)17:00VirtuelVirtual Etiquettes de sessionISC-CISSP

lun20Oct(Oct 20)09:00ven24(Oct 24)17:00Lausanne, Avenue Mon repos 24, 1005 Lausanne Etiquettes de sessionISC-CISSP

lun15Déc(Déc 15)09:00ven19(Déc 19)17:00VirtuelVirtual Etiquettes de sessionISC-CISSP

lun15Déc(Déc 15)09:00ven19(Déc 19)17:00Genève, Route des Jeunes 35, 1227 Carouge Etiquettes de sessionISC-CISSP

Contact

ITTA
Route des jeunes 35
1227 Carouge, Suisse

Opening hours

Monday to Friday
8:30 AM to 6:00 PM
Tel. 058 307 73 00

Contact-us

ITTA
Route des jeunes 35
1227 Carouge, Suisse

Make a request

Contact

ITTA
Route des jeunes 35
1227 Carouge, Suisse

Opening hours

Monday to Friday, from 8:30 am to 06:00 pm.

Contact us

Your request