A Quick Glance

  • black-arrow

    Pass the CISSP exam

  • black-arrow

    Gain vital cybersecurity skills

  • black-arrow

    Implement and manage security programs

  • black-arrow

    Prove your security expertise and knowledge

Modern businesses require proven security professionals to help them defend against threats to their data and systems. CISSP (Certified Information Systems Security Professional)-certified professionals have vast knowledge and expertise to design, implement and manage IT security systems.

Our CISSP training is designed to help learners prepare for the CISSP exam, providing a full understanding of the 8 domains of the CISSP CBK which the exam assesses and ensuring delegates are ready to pass confidently.

Who should take this course

  • Security Consultants
  • Security Managers
  • Security Analysts
  • IT Managers
  • Security Directors
  • Network Architects
  • Security Auditors
  • Security Architects
  • Security Systems Engineers
  • Chief Information Security Officers
More

Prerequisites

There are no requirements for this course, but  4-5 years of experience in at least 2 of the 8 CBK domains is required for full CISSP certification.

More

What Will You Learn

  • Prepare for the CISSP exam
  • Understand the 8 domains of the CISSP CBK
  • Understand what is expected of a cybersecurity professional
  • Learn the fundamentals of security management
More

What's included

  Course Overview

Over 5 days, our expert instructors will go through each of the 8 CISSP CBK domains using a theory-based approach teaching all the concepts, tools and knowledge required for the modern cybersecurity professional to do their job effectively, all with the aim of passing the exam and achieving this highly sought-after certification.

More

  Course Content

Security and Risk Management

  • Confidentiality, Integrity, and Availability Concepts
  • Security Governance Principles
  • Compliance
  • Legal and Regulatory Issues
  • Professional Ethics
  • Security Policies, Standards, Procedures, and Guidelines

Asset Security

  • Information and Asset Classification
  • Ownership
  • Protect Privacy
  • Appropriate Retention
  • Data Security Controls
  • Handling Requirements

Security Architecture and Engineering

  • Engineering Processes using Secure Design Principles
  • Security Models Fundamental Concepts
  • Security Evaluation Models
  • Security Capabilities of Information Systems
  • Security Architectures, Designs, and Solution Elements Vulnerabilities
  • Web-based Systems Vulnerabilities
  • Mobile Systems Vulnerabilities
  • Embedded Devices and Cyber-Physical Systems Vulnerabilities
  • Cryptography
  • Site and Facility Design Secure Principles
  • Physical Security

Communication and Network Security

  • Secure Network Architecture Design
  • Secure Network Components
  • Secure Communication Channels
  • Network Attacks

Identity and Access Management (IAM)

  • Physical and Logical Assets Control
  • Identification and Authentication of People and Devices
  • Identity as a Service
  • Third-party Identity Services
  • Access Control Attacks
  • Identity and Access Provisioning Lifecycle

Security Assessment and Testing

  • Assessment and Test Strategies
  • Security Process Data
  • Security Control Testing
  • Test Outputs
  • Security Architectures Vulnerabilities

Security Operations

  • Investigations Support and Requirements
  • Logging and Monitoring Activities
  • Provisioning of Resources
  • Foundational Security Operations Concepts
  • Resource Protection Techniques
  • Incident Management
  • Preventative Measures
  • Patch and Vulnerability Management
  • Change Management Processes
  • Recovery Strategies
  • Disaster Recovery Processes and Plans
  • Business Continuity Planning and Exercises
  • Physical Security
  • Personnel Safety Concerns

Software Development Security

  • Security in the Software Development Lifecycle
  • Development Environment Security Controls
  • Software Security Effectiveness
  • Acquired Software Security Impact
More

CISSP

What is CISSP?

CISSP is a globally approved cybersecurity qualification designed for experienced cybersecurity practitioners.

In 1988, it was recognised that a standardised cybersecurity body which provided certification for the industry was required. In 1989, ISC (International Information Security Certification Consortium) was established, with its first certification, CISSP, being launched in 1994.

CISSP takes as its basis the CBK (Common Body of Knowledge), a collection of skills, practices and techniques which any cyber expert should know in order to do their job effectively.

Our CISSP training provides delegates with the knowledge they need to prepare for the CISSP exam, including a strong understanding of the 8 CISSP domains.



CISSP Certified Information Systems Security Professional Enquiry

 

Enquire Now


----- OR -------

Reach us at +44 1344 961530 or info@pentagonit.co.uk for more information.

About Poole

Poole

Poole is situated on the south coast of England in the county of Dorset. It is also treated as a seaport and a large coastal town. Poole is 33 km east of Dorchester and also joins Bournemouth in the east. In 1997 local Council Borough of Poole was made a unitary authority. It gained its administrative independence from Dorset County Council. According to 2011 Census, Borough had a population of 147,645. This population made it second largest town in Dorset.

Along with Bournemouth and Christchurch, town forms South East Dorset Conurbation. It had a total population of over 465,000.

Human settlement in Poole started back before the Iron Age. Town’s name was earliest recorded in the 12th century when town emerged as an important port. With the introduction of wool trade, this town prospered. The Later city developed significant trade links with North America. During the 18th century, it was one of the busiest ports in Britain. During Second World War, Poole was main departing ports for Normandy landings.

Poole is also a tourist resort that attracts many visitors. Poole is popular due to its natural harbour, incredible history, Lighthouse arts centre and Blue Flag beaches. Royal National LifeBoat Institution headquarters are also located in Poole. Royal Marines have a base in town’s harbour. Poole is also home to Arts University Bournemouth, an important part of Bournemouth University and Bournemouth Symphony Orchestra.

History

During the 19th century, there was a coastal trade to and from Poole. Trade declined rapidly when the railway was built to Hamworthy side of the bridge. People in business were now able to transport goods to and from Poole with the help of rail. In 1872 another railway was built in the middle of the Poole. During 19th century life in Poole improved. In 1887 first public library was opened. In 1890 Poole Park was opened, and in the same year, Parkstone Park was opened.

In novels of Gullivers Travels, Lilliput was the name of the land. According to some information, there was a house called Lilliput. This house existed at beginning of 19th century, and this gave this area a name Lilliput.

Electric trams started running during 1901 through the streets of the Poole, but then buses replaced them. In 1935 last trams ran in Poole.

In 1910 first cinema in Poole was opened. Municipal offices at Poole were built in the year 1932. The population of Poole was 19,000 in the 20th century, but later it grew at a phenomenal rate. Old industries of brick making, brewing and shipbuilding decline during the 20th century. Pottery industry survived somehow. In 1969 Dolphin Centre was opened. Poole general hospital was opened in 1969. In 1974 Poole Lifeboat Museum was opened. In 1978 Arts Centre was opened. Poole became a unitary authority in the year 1997. In the 21st century, Poole has become a Pottery Centre which made it an attractive tourist destination. Today Poole flourishes on Tourism. In 2007 Poole Museum was reopened. Present Population of Poole is 138,000.

 

More