A Quick Glance

  • black-arrow

    Pass the CISSP exam

  • black-arrow

    Gain vital cybersecurity skills

  • black-arrow

    Implement and manage security programs

  • black-arrow

    Prove your security expertise and knowledge

Modern businesses require proven security professionals to help them defend against threats to their data and systems. CISSP (Certified Information Systems Security Professional)-certified professionals have vast knowledge and expertise to design, implement and manage IT security systems.

Our CISSP training is designed to help learners prepare for the CISSP exam, providing a full understanding of the 8 domains of the CISSP CBK which the exam assesses and ensuring delegates are ready to pass confidently.

Who should take this course

  • Security Consultants
  • Security Managers
  • Security Analysts
  • IT Managers
  • Security Directors
  • Network Architects
  • Security Auditors
  • Security Architects
  • Security Systems Engineers
  • Chief Information Security Officers
More

Prerequisites

There are no requirements for this course, but  4-5 years of experience in at least 2 of the 8 CBK domains is required for full CISSP certification.

More

What Will You Learn

  • Prepare for the CISSP exam
  • Understand the 8 domains of the CISSP CBK
  • Understand what is expected of a cybersecurity professional
  • Learn the fundamentals of security management
More

What's included

  Course Overview

Over 5 days, our expert instructors will go through each of the 8 CISSP CBK domains using a theory-based approach teaching all the concepts, tools and knowledge required for the modern cybersecurity professional to do their job effectively, all with the aim of passing the exam and achieving this highly sought-after certification.

More

  Course Content

Security and Risk Management

  • Confidentiality, Integrity, and Availability Concepts
  • Security Governance Principles
  • Compliance
  • Legal and Regulatory Issues
  • Professional Ethics
  • Security Policies, Standards, Procedures, and Guidelines

Asset Security

  • Information and Asset Classification
  • Ownership
  • Protect Privacy
  • Appropriate Retention
  • Data Security Controls
  • Handling Requirements

Security Architecture and Engineering

  • Engineering Processes using Secure Design Principles
  • Security Models Fundamental Concepts
  • Security Evaluation Models
  • Security Capabilities of Information Systems
  • Security Architectures, Designs, and Solution Elements Vulnerabilities
  • Web-based Systems Vulnerabilities
  • Mobile Systems Vulnerabilities
  • Embedded Devices and Cyber-Physical Systems Vulnerabilities
  • Cryptography
  • Site and Facility Design Secure Principles
  • Physical Security

Communication and Network Security

  • Secure Network Architecture Design
  • Secure Network Components
  • Secure Communication Channels
  • Network Attacks

Identity and Access Management (IAM)

  • Physical and Logical Assets Control
  • Identification and Authentication of People and Devices
  • Identity as a Service
  • Third-party Identity Services
  • Access Control Attacks
  • Identity and Access Provisioning Lifecycle

Security Assessment and Testing

  • Assessment and Test Strategies
  • Security Process Data
  • Security Control Testing
  • Test Outputs
  • Security Architectures Vulnerabilities

Security Operations

  • Investigations Support and Requirements
  • Logging and Monitoring Activities
  • Provisioning of Resources
  • Foundational Security Operations Concepts
  • Resource Protection Techniques
  • Incident Management
  • Preventative Measures
  • Patch and Vulnerability Management
  • Change Management Processes
  • Recovery Strategies
  • Disaster Recovery Processes and Plans
  • Business Continuity Planning and Exercises
  • Physical Security
  • Personnel Safety Concerns

Software Development Security

  • Security in the Software Development Lifecycle
  • Development Environment Security Controls
  • Software Security Effectiveness
  • Acquired Software Security Impact
More

CISSP

What is CISSP?

CISSP is a globally approved cybersecurity qualification designed for experienced cybersecurity practitioners.

In 1988, it was recognised that a standardised cybersecurity body which provided certification for the industry was required. In 1989, ISC (International Information Security Certification Consortium) was established, with its first certification, CISSP, being launched in 1994.

CISSP takes as its basis the CBK (Common Body of Knowledge), a collection of skills, practices and techniques which any cyber expert should know in order to do their job effectively.

Our CISSP training provides delegates with the knowledge they need to prepare for the CISSP exam, including a strong understanding of the 8 CISSP domains.



CISSP Certified Information Systems Security Professional Enquiry

 

Enquire Now


----- OR -------

Reach us at +44 1344 961530 or info@pentagonit.co.uk for more information.

About Plymouth

Plymouth

Plymouth is a city located on the south coast of Devon, England. Plymouth is 37 miles south-west of Exeter and 190 miles west south- west of London between river Plym and Tamar's mouths.

Throughout Industrial Revolution, Plymouth grew as commercial shipping port handling imports and passengers from America. Plymouth port also export local minerals like copper, lime, china, clay, tin and arsenic. Neighbouring town Devonport became Royal Naval Shipbuilding and dockyard town. In 1928 Plymouth achieved city status. In mid-2015, the city is home to 262,700 which makes it 30th most populous area in the United Kingdom. Plymouth is the second largest in Southwest after Bristol. Plymouth City Council governs Plymouth, and it is represented by three MP’s. The economy of Plymouth is influenced by seafaring and shipbuilding including ferry links to Spain and Brittany. In Western Europe large operational naval base HMNB Devonport is located. Plymouth is home to Plymouth University.

History

Plymouth had a population of 107,000 in the year 1901. In 1914 the two towns Devonport and Stonehouse were merged with Plymouth. Slum clearance started in Plymouth after World War 1. Slum housing was stopped and replaced by council housing in Swilly and New Prospect. By 1928, new 802 houses were built. In 1920 motor buses started in Plymouth and then got replaced by trams. Due to dockyard in Second World War Plymouth was a prime target for bombing. Around 3754 houses were damaged, and more than 8000 were severely damaged. Later slums were replaced with better flats and houses. Later in the 20th century, various houses were built at South way and Egg Buckland. In Plympton and Plymstock many private houses have been constructed. In the 21st century, Plymouth is flourishing. Drakes Circus shopping was remade in 2006, and now the population of Plymouth is 240,000.

Education

The University of Plymouth has enrolled around 23,155 students as of 2015 and 2016. It has 3000 staff and income of around £160 million. Main courses in it include business, marine biology, marine engineering, shipping and much more. The University of St Mark and St John was also known as Marjon or Marjons have expertise in teacher training. These universities offer various training courses across the country as well as abroad. This city is also home to two other large colleges. City College of Plymouth provides courses from basic to foundation degree for various students. Plymouth College of Art offers courses on media. It is only one of the four independent colleges of art and design in the UK.

There are 71 state primary phase schools in Plymouth and 13 state secondary schools. Plymouth has eight special schools, three selective state grammar schools and independent school.

This city is also home to Royal Naval Engineering College that was opened in 1880 in Keyham. It was renamed Dockyard Technical College in 1959. Later training was shifted to the University of Southampton. Marine Biological Association of UK is also located in Plymouth.

More