A Quick Glance

  • black-arrow

    Pass the CISSP exam

  • black-arrow

    Gain vital cybersecurity skills

  • black-arrow

    Implement and manage security programs

  • black-arrow

    Prove your security expertise and knowledge

Modern businesses require proven security professionals to help them defend against threats to their data and systems. CISSP (Certified Information Systems Security Professional)-certified professionals have vast knowledge and expertise to design, implement and manage IT security systems.

Our CISSP training is designed to help learners prepare for the CISSP exam, providing a full understanding of the 8 domains of the CISSP CBK which the exam assesses and ensuring delegates are ready to pass confidently.

Who should take this course

  • Security Consultants
  • Security Managers
  • Security Analysts
  • IT Managers
  • Security Directors
  • Network Architects
  • Security Auditors
  • Security Architects
  • Security Systems Engineers
  • Chief Information Security Officers
More

Prerequisites

There are no requirements for this course, but  4-5 years of experience in at least 2 of the 8 CBK domains is required for full CISSP certification.

More

What Will You Learn

  • Prepare for the CISSP exam
  • Understand the 8 domains of the CISSP CBK
  • Understand what is expected of a cybersecurity professional
  • Learn the fundamentals of security management
More

What's included

  Course Overview

Over 5 days, our expert instructors will go through each of the 8 CISSP CBK domains using a theory-based approach teaching all the concepts, tools and knowledge required for the modern cybersecurity professional to do their job effectively, all with the aim of passing the exam and achieving this highly sought-after certification.

More

  Course Content

Security and Risk Management

  • Confidentiality, Integrity, and Availability Concepts
  • Security Governance Principles
  • Compliance
  • Legal and Regulatory Issues
  • Professional Ethics
  • Security Policies, Standards, Procedures, and Guidelines

Asset Security

  • Information and Asset Classification
  • Ownership
  • Protect Privacy
  • Appropriate Retention
  • Data Security Controls
  • Handling Requirements

Security Architecture and Engineering

  • Engineering Processes using Secure Design Principles
  • Security Models Fundamental Concepts
  • Security Evaluation Models
  • Security Capabilities of Information Systems
  • Security Architectures, Designs, and Solution Elements Vulnerabilities
  • Web-based Systems Vulnerabilities
  • Mobile Systems Vulnerabilities
  • Embedded Devices and Cyber-Physical Systems Vulnerabilities
  • Cryptography
  • Site and Facility Design Secure Principles
  • Physical Security

Communication and Network Security

  • Secure Network Architecture Design
  • Secure Network Components
  • Secure Communication Channels
  • Network Attacks

Identity and Access Management (IAM)

  • Physical and Logical Assets Control
  • Identification and Authentication of People and Devices
  • Identity as a Service
  • Third-party Identity Services
  • Access Control Attacks
  • Identity and Access Provisioning Lifecycle

Security Assessment and Testing

  • Assessment and Test Strategies
  • Security Process Data
  • Security Control Testing
  • Test Outputs
  • Security Architectures Vulnerabilities

Security Operations

  • Investigations Support and Requirements
  • Logging and Monitoring Activities
  • Provisioning of Resources
  • Foundational Security Operations Concepts
  • Resource Protection Techniques
  • Incident Management
  • Preventative Measures
  • Patch and Vulnerability Management
  • Change Management Processes
  • Recovery Strategies
  • Disaster Recovery Processes and Plans
  • Business Continuity Planning and Exercises
  • Physical Security
  • Personnel Safety Concerns

Software Development Security

  • Security in the Software Development Lifecycle
  • Development Environment Security Controls
  • Software Security Effectiveness
  • Acquired Software Security Impact
More

CISSP

What is CISSP?

CISSP is a globally approved cybersecurity qualification designed for experienced cybersecurity practitioners.

In 1988, it was recognised that a standardised cybersecurity body which provided certification for the industry was required. In 1989, ISC (International Information Security Certification Consortium) was established, with its first certification, CISSP, being launched in 1994.

CISSP takes as its basis the CBK (Common Body of Knowledge), a collection of skills, practices and techniques which any cyber expert should know in order to do their job effectively.

Our CISSP training provides delegates with the knowledge they need to prepare for the CISSP exam, including a strong understanding of the 8 CISSP domains.



CISSP Certified Information Systems Security Professional Enquiry

 

Enquire Now


----- OR -------

Reach us at +44 1344 961530 or info@pentagonit.co.uk for more information.

About London

Capital of the most populous city of England, London, is located on River Thames in the south east island of Great Britain. London came into being as Londonium in AD 43 when the Romans invaded it. However, it lasted only for 18 years before being burnt down by Queen Boudica. Londonium, prospered in AD 100 as the capital of the Roman province of Brittania. After the collapse of the Romans in the 5th Century, London was no more a capital city. However, passing through different ages, London had become the largest town of England by the 11th Century. In the modern times, London shot to fame becoming the world's biggest city during 1831 to 1925.

 Tourism

 London, known to be one of the best tourist spots the worldover, is ranked the most visited city in 2015 with over 65 million visitors. It also ranks among the top places in the world as far as cross-border spending is concerned. The total expenditure is estimated at US$20.23 billion as in 2015. Tourism is one of London's prime industries. It employed around 350,000 full-time workers in 2003, and the city accounts for 54% of all inbound visitor spending in the UK. As of 2016, London is the world top city destination as ranked by TripAdvisor users

In 2015, the top most-visited attractions in UK were all in London. The top 10 most visited attractions were:

  • Tate Modern
  • The British Museum
  • Tower of London
  • The National Gallery
  • Southbank Centre
  • Victoria and Albert Museum (South Kensington)
  • Natural History Museum (South Kensington)
  • Science Museum
  • Somerset House
  • National Portrait Gallery

The number of hotel rooms which has been growing every year stood at 138,769 in 2015.

Transport

 Airports

  • London Heathrow Airport
  • Gatwick Airport
  • Stansted Airport
  • London City Airport
  • London Southend Airport

 Rail

  • The London Underground, or the Tube, is the oldest and second longest metro system in the world.
  • The Docklands Light Railway  which opened in 1987 is a local metro system. It makes use of small  tram-type vehicles which happen to serve the Docklands, Greenwich and 

Education

Primary and Secondary

The majority of primary as well as high schools are controlled by London boroughs. So are the  further-education colleges in London. Some are also  state-funded. London is also having a number of private schools and colleges.

Tertiary Education

London is known as a  centre of higher education teaching and research. According to studies and research, London has the maximum number of higher education institutes in Europe. London was ranked as having the greatest concentration of top class universities in the world for the years 2015-16. London has an international student population of around 110,000 which is deemed to be larger than any other city in the world. Pricewaterhouse Coopers report termed London as the global capital of higher education.

 

More