A Quick Glance

  • black-arrow

    Pass the CISSP exam

  • black-arrow

    Gain vital cybersecurity skills

  • black-arrow

    Implement and manage security programs

  • black-arrow

    Prove your security expertise and knowledge

Modern businesses require proven security professionals to help them defend against threats to their data and systems. CISSP (Certified Information Systems Security Professional)-certified professionals have vast knowledge and expertise to design, implement and manage IT security systems.

Our CISSP training is designed to help learners prepare for the CISSP exam, providing a full understanding of the 8 domains of the CISSP CBK which the exam assesses and ensuring delegates are ready to pass confidently.

Who should take this course

  • Security Consultants
  • Security Managers
  • Security Analysts
  • IT Managers
  • Security Directors
  • Network Architects
  • Security Auditors
  • Security Architects
  • Security Systems Engineers
  • Chief Information Security Officers
More

Prerequisites

There are no requirements for this course, but  4-5 years of experience in at least 2 of the 8 CBK domains is required for full CISSP certification.

More

What Will You Learn

  • Prepare for the CISSP exam
  • Understand the 8 domains of the CISSP CBK
  • Understand what is expected of a cybersecurity professional
  • Learn the fundamentals of security management
More

What's included

  Course Overview

Over 5 days, our expert instructors will go through each of the 8 CISSP CBK domains using a theory-based approach teaching all the concepts, tools and knowledge required for the modern cybersecurity professional to do their job effectively, all with the aim of passing the exam and achieving this highly sought-after certification.

More

  Course Content

Security and Risk Management

  • Confidentiality, Integrity, and Availability Concepts
  • Security Governance Principles
  • Compliance
  • Legal and Regulatory Issues
  • Professional Ethics
  • Security Policies, Standards, Procedures, and Guidelines

Asset Security

  • Information and Asset Classification
  • Ownership
  • Protect Privacy
  • Appropriate Retention
  • Data Security Controls
  • Handling Requirements

Security Architecture and Engineering

  • Engineering Processes using Secure Design Principles
  • Security Models Fundamental Concepts
  • Security Evaluation Models
  • Security Capabilities of Information Systems
  • Security Architectures, Designs, and Solution Elements Vulnerabilities
  • Web-based Systems Vulnerabilities
  • Mobile Systems Vulnerabilities
  • Embedded Devices and Cyber-Physical Systems Vulnerabilities
  • Cryptography
  • Site and Facility Design Secure Principles
  • Physical Security

Communication and Network Security

  • Secure Network Architecture Design
  • Secure Network Components
  • Secure Communication Channels
  • Network Attacks

Identity and Access Management (IAM)

  • Physical and Logical Assets Control
  • Identification and Authentication of People and Devices
  • Identity as a Service
  • Third-party Identity Services
  • Access Control Attacks
  • Identity and Access Provisioning Lifecycle

Security Assessment and Testing

  • Assessment and Test Strategies
  • Security Process Data
  • Security Control Testing
  • Test Outputs
  • Security Architectures Vulnerabilities

Security Operations

  • Investigations Support and Requirements
  • Logging and Monitoring Activities
  • Provisioning of Resources
  • Foundational Security Operations Concepts
  • Resource Protection Techniques
  • Incident Management
  • Preventative Measures
  • Patch and Vulnerability Management
  • Change Management Processes
  • Recovery Strategies
  • Disaster Recovery Processes and Plans
  • Business Continuity Planning and Exercises
  • Physical Security
  • Personnel Safety Concerns

Software Development Security

  • Security in the Software Development Lifecycle
  • Development Environment Security Controls
  • Software Security Effectiveness
  • Acquired Software Security Impact
More

CISSP

What is CISSP?

CISSP is a globally approved cybersecurity qualification designed for experienced cybersecurity practitioners.

In 1988, it was recognised that a standardised cybersecurity body which provided certification for the industry was required. In 1989, ISC (International Information Security Certification Consortium) was established, with its first certification, CISSP, being launched in 1994.

CISSP takes as its basis the CBK (Common Body of Knowledge), a collection of skills, practices and techniques which any cyber expert should know in order to do their job effectively.

Our CISSP training provides delegates with the knowledge they need to prepare for the CISSP exam, including a strong understanding of the 8 CISSP domains.



CISSP Certified Information Systems Security Professional Enquiry

 

Enquire Now


----- OR -------

Reach us at +44 1344 961530 or info@pentagonit.co.uk for more information.

About Bolton

The name Bolton originates from bothl-tun with the name Boelton being first used in 1185 AD. The town acquired different names such as Bothelton  and  Boulton, and finally Bolton (1307). The towns motto means “overcome difficulties”.

Bolton is located in North West England. Since the 14th century it was one of the largest and most productive centers of cotton spinning in the world due to the settlement of Flemish weavers. It reached its zenith in the beginning of the 20th century. However, towards the fag end of the 20th century, the scenario changed. The cotton industry came to an end virtually if not physically.

The various smaller towns and villages around Bolton form the Metropolitan Borough of Bolton.

History

Bolton, part of Lancashire, came up as a small settlement in the moorland and was known as Bolton le Moors. At the time of the English Civil War, it was a political outpost in a staunchly Royalist region. This resulted in an attack by 3,000 Royalist troops led by Prince Rupert of the Rhine in 1644. 1,600 residents were killed and 700 taken prisoners in what came to be known as the Bolton Massacre.

Transport

Bolton is connected by local road as well as national routes. The A6  is a major north–south trunk road that passes to the west. The A666 dual carriageway, is an offshoot from the M61/M60 motorway interchange. The M61 has three dedicated stops.

Bolton is served by a network of local buses  coordinated by Transport for Greater Manchester. The bus station on Moor Lane was scheduled to be replaced by a new interchange in the town centre  by the end of 2014, at a cost of £48 million.

Bolton Interchange  was served by Virgin West Coast trains passing through Manchester Piccadilly station. Managed by Northern, the station is part of a town-centre transport interchange. It provides services to many stations  are operated by  TransPennine Express and Northern trains.

Sports

Bolton is home to various sports such as Football, Hockey and Cricket. Bolton Wanderers F.C. play football in the English League club. The Bolton Wanderers was formed in 1874 and they played at Burnden Park for 102 years. In 1997, it moved to the Reebok Stadium. The club has won four FA Cups, the last one being in 1958. The club has 73 seasons in the top division of the English league – most by any team.

Bolton Hockey Club has men and women in its teams and there are junior as well as regular teams with more than 120 playing members. The town also has two local cricket leagues, the Bolton Cricket League, and the Bolton Cricket Association.

 

More