A Quick Glance

  • black-arrow

    Pass the CISSP exam

  • black-arrow

    Gain vital cybersecurity skills

  • black-arrow

    Implement and manage security programs

  • black-arrow

    Prove your security expertise and knowledge

Modern businesses require proven security professionals to help them defend against threats to their data and systems. CISSP (Certified Information Systems Security Professional)-certified professionals have vast knowledge and expertise to design, implement and manage IT security systems.

Our CISSP training is designed to help learners prepare for the CISSP exam, providing a full understanding of the 8 domains of the CISSP CBK which the exam assesses and ensuring delegates are ready to pass confidently.

Who should take this course

  • Security Consultants
  • Security Managers
  • Security Analysts
  • IT Managers
  • Security Directors
  • Network Architects
  • Security Auditors
  • Security Architects
  • Security Systems Engineers
  • Chief Information Security Officers
More

Prerequisites

There are no requirements for this course, but  4-5 years of experience in at least 2 of the 8 CBK domains is required for full CISSP certification.

More

What Will You Learn

  • Prepare for the CISSP exam
  • Understand the 8 domains of the CISSP CBK
  • Understand what is expected of a cybersecurity professional
  • Learn the fundamentals of security management
More

What's included

  Course Overview

Over 5 days, our expert instructors will go through each of the 8 CISSP CBK domains using a theory-based approach teaching all the concepts, tools and knowledge required for the modern cybersecurity professional to do their job effectively, all with the aim of passing the exam and achieving this highly sought-after certification.

More

  Course Content

Security and Risk Management

  • Confidentiality, Integrity, and Availability Concepts
  • Security Governance Principles
  • Compliance
  • Legal and Regulatory Issues
  • Professional Ethics
  • Security Policies, Standards, Procedures, and Guidelines

Asset Security

  • Information and Asset Classification
  • Ownership
  • Protect Privacy
  • Appropriate Retention
  • Data Security Controls
  • Handling Requirements

Security Architecture and Engineering

  • Engineering Processes using Secure Design Principles
  • Security Models Fundamental Concepts
  • Security Evaluation Models
  • Security Capabilities of Information Systems
  • Security Architectures, Designs, and Solution Elements Vulnerabilities
  • Web-based Systems Vulnerabilities
  • Mobile Systems Vulnerabilities
  • Embedded Devices and Cyber-Physical Systems Vulnerabilities
  • Cryptography
  • Site and Facility Design Secure Principles
  • Physical Security

Communication and Network Security

  • Secure Network Architecture Design
  • Secure Network Components
  • Secure Communication Channels
  • Network Attacks

Identity and Access Management (IAM)

  • Physical and Logical Assets Control
  • Identification and Authentication of People and Devices
  • Identity as a Service
  • Third-party Identity Services
  • Access Control Attacks
  • Identity and Access Provisioning Lifecycle

Security Assessment and Testing

  • Assessment and Test Strategies
  • Security Process Data
  • Security Control Testing
  • Test Outputs
  • Security Architectures Vulnerabilities

Security Operations

  • Investigations Support and Requirements
  • Logging and Monitoring Activities
  • Provisioning of Resources
  • Foundational Security Operations Concepts
  • Resource Protection Techniques
  • Incident Management
  • Preventative Measures
  • Patch and Vulnerability Management
  • Change Management Processes
  • Recovery Strategies
  • Disaster Recovery Processes and Plans
  • Business Continuity Planning and Exercises
  • Physical Security
  • Personnel Safety Concerns

Software Development Security

  • Security in the Software Development Lifecycle
  • Development Environment Security Controls
  • Software Security Effectiveness
  • Acquired Software Security Impact
More

CISSP

What is CISSP?

CISSP is a globally approved cybersecurity qualification designed for experienced cybersecurity practitioners.

In 1988, it was recognised that a standardised cybersecurity body which provided certification for the industry was required. In 1989, ISC (International Information Security Certification Consortium) was established, with its first certification, CISSP, being launched in 1994.

CISSP takes as its basis the CBK (Common Body of Knowledge), a collection of skills, practices and techniques which any cyber expert should know in order to do their job effectively.

Our CISSP training provides delegates with the knowledge they need to prepare for the CISSP exam, including a strong understanding of the 8 CISSP domains.



CISSP Certified Information Systems Security Professional Enquiry

 

Enquire Now


----- OR -------

Reach us at +44 1344 961530 or info@pentagonit.co.uk for more information.

About Coventry

Coventry is a metropolitan area in the West Midlands, England. Historically part of Warwickshire, Coventry is the 9th largest city in England and the 12th largest in the United Kingdom. It is the second largest city in the West Midlands region, after Birmingham, with a populace of 345,385 in 2015. Coventry is 95 much north-west of central London, 19 miles east-south-east of Birmingham, 24 miles south-west of Leicester and 11 miles north of Warwick. Coventry Cathedral was constructed after the annihilation of the 14th-century cathedral church of Saint Michael by the German Luftwaffe in the Coventry Blitz of 14 November 1940. Coventry motor companies have donated meaningfully to the British motor industry. The city has two universities, Coventry University in the City Centre and the University of Warwick on the southern outskirts.

Areas of Interest:

Cathedral:

St. Michael's Church is Coventry's best-known landmark and visitor place. The 14th-century church was hugely demolished by German bombing during the Second World War, part only the outer walls and spire. At 300 feet above, the spire of St. Michael's is appealed to be the third tallest church spire in England, after Salisbury and Norwich. Due to the architectural design, it lived the destruction of the rest of the cathedral. The new Coventry Cathedral was opened in 1962 next to the ruins of the old. It was reproduced by Sir Basil Spence. The cathedral covers the tapestry Christ in Glory by Graham Sutherland.

Cultural Institution:

The Herbert Art Gallery and Museum is one of the largest cultural organisations in Coventry. Another visitor attraction in the City Centre is the Coventry Transport Museum, which has the main group of British-made road vehicles in the world. The museum established a refurbishment in 2004 which comprised the creation of a new arrival as part of the city's Phoenix Initiative project. It was a finalist for the 2005 Gulbenkian Prize. About four miles from the City Centre and just outside Coventry in Baginton is the Lunt Fort, a reconstructed Roman fort on its original site. The Midland Air Museum is located just within the border of Coventry on land head-to-head to Coventry Airport and near Baginton.

Red Major Improvements endure renewing the City Centre. The Phoenix Initiative, which was deliberated by MJP Architects, stretched the final shortlist for the 2004 RIBA Stirling Prize and has now gained a total of 16 separate awards. It was available in the book ‘Phoenix: Architecture/Art/Regeneration' in 2004. Further major developments are potentially afoot, chiefly the Swanswell Project, which is envisioned to deepen Swanswell Pool and link it to Coventry Canal Basin, joined with the creation of an urban marina and a wide Parisian-style avenue. A possible second phase of the Phoenix Inventiveness is also in the offing, though both of these plans are still on the drawing-board. On 16 December 2007, IKEA's first city-centre store in the UK was opened, in Coventry.

More