A Quick Glance

  • black-arrow

    Pass the CISSP exam

  • black-arrow

    Gain vital cybersecurity skills

  • black-arrow

    Implement and manage security programs

  • black-arrow

    Prove your security expertise and knowledge

Modern businesses require proven security professionals to help them defend against threats to their data and systems. CISSP (Certified Information Systems Security Professional)-certified professionals have vast knowledge and expertise to design, implement and manage IT security systems.

Our CISSP training is designed to help learners prepare for the CISSP exam, providing a full understanding of the 8 domains of the CISSP CBK which the exam assesses and ensuring delegates are ready to pass confidently.

Who should take this course

  • Security Consultants
  • Security Managers
  • Security Analysts
  • IT Managers
  • Security Directors
  • Network Architects
  • Security Auditors
  • Security Architects
  • Security Systems Engineers
  • Chief Information Security Officers
More

Prerequisites

There are no requirements for this course, but  4-5 years of experience in at least 2 of the 8 CBK domains is required for full CISSP certification.

More

What Will You Learn

  • Prepare for the CISSP exam
  • Understand the 8 domains of the CISSP CBK
  • Understand what is expected of a cybersecurity professional
  • Learn the fundamentals of security management
More

What's included

  Course Overview

Over 5 days, our expert instructors will go through each of the 8 CISSP CBK domains using a theory-based approach teaching all the concepts, tools and knowledge required for the modern cybersecurity professional to do their job effectively, all with the aim of passing the exam and achieving this highly sought-after certification.

More

  Course Content

Security and Risk Management

  • Confidentiality, Integrity, and Availability Concepts
  • Security Governance Principles
  • Compliance
  • Legal and Regulatory Issues
  • Professional Ethics
  • Security Policies, Standards, Procedures, and Guidelines

Asset Security

  • Information and Asset Classification
  • Ownership
  • Protect Privacy
  • Appropriate Retention
  • Data Security Controls
  • Handling Requirements

Security Architecture and Engineering

  • Engineering Processes using Secure Design Principles
  • Security Models Fundamental Concepts
  • Security Evaluation Models
  • Security Capabilities of Information Systems
  • Security Architectures, Designs, and Solution Elements Vulnerabilities
  • Web-based Systems Vulnerabilities
  • Mobile Systems Vulnerabilities
  • Embedded Devices and Cyber-Physical Systems Vulnerabilities
  • Cryptography
  • Site and Facility Design Secure Principles
  • Physical Security

Communication and Network Security

  • Secure Network Architecture Design
  • Secure Network Components
  • Secure Communication Channels
  • Network Attacks

Identity and Access Management (IAM)

  • Physical and Logical Assets Control
  • Identification and Authentication of People and Devices
  • Identity as a Service
  • Third-party Identity Services
  • Access Control Attacks
  • Identity and Access Provisioning Lifecycle

Security Assessment and Testing

  • Assessment and Test Strategies
  • Security Process Data
  • Security Control Testing
  • Test Outputs
  • Security Architectures Vulnerabilities

Security Operations

  • Investigations Support and Requirements
  • Logging and Monitoring Activities
  • Provisioning of Resources
  • Foundational Security Operations Concepts
  • Resource Protection Techniques
  • Incident Management
  • Preventative Measures
  • Patch and Vulnerability Management
  • Change Management Processes
  • Recovery Strategies
  • Disaster Recovery Processes and Plans
  • Business Continuity Planning and Exercises
  • Physical Security
  • Personnel Safety Concerns

Software Development Security

  • Security in the Software Development Lifecycle
  • Development Environment Security Controls
  • Software Security Effectiveness
  • Acquired Software Security Impact
More

CISSP

What is CISSP?

CISSP is a globally approved cybersecurity qualification designed for experienced cybersecurity practitioners.

In 1988, it was recognised that a standardised cybersecurity body which provided certification for the industry was required. In 1989, ISC (International Information Security Certification Consortium) was established, with its first certification, CISSP, being launched in 1994.

CISSP takes as its basis the CBK (Common Body of Knowledge), a collection of skills, practices and techniques which any cyber expert should know in order to do their job effectively.

Our CISSP training provides delegates with the knowledge they need to prepare for the CISSP exam, including a strong understanding of the 8 CISSP domains.



CISSP Certified Information Systems Security Professional Enquiry

 

Enquire Now


----- OR -------

Reach us at +44 1344 961530 or info@pentagonit.co.uk for more information.

About Reading

Located in Berkshire, Reading is a large and historically significant town. It was an important center of trade as well as religion in the medieval period. The Reading Abbey, still has its  12th century abbey gateway and significant ruins intact. Due to the English Civil War the town was damaged severely, causing a significant loss in trade. Reading also played an important role in the Revolution of 1688. It is where the revolution's only significant military action was took place. The Great Western Railway , the brewing business, baking and seed growing all happened in 19th century. Now,Reading boasts of being a  major commercial centre, that involves information technology and insurance. Reading   has, despite its nearness to London, a net inward traveler flow.

 

Reading came up as a settlement way  back in the 8th century. It had become the largest town in Berkshire by 1525 and had a population of around 5000 in the early 17th Century. It was in the 18th century that major iron works in the town came up and the city saw the growth of the brewing business for which Reading is known till date. It was in the 19th century that Reading saw the growth of manufacturing business also.

Economy

Reading is a vital commercial centre in the Thames Valley and Southern England. It is home to the headquarters of many British companies and UK offices of foreign multinationals. It is also a  major retail centre. Daily Reading has an inflow of 30,000 commuters as compared to 24,000 departures. Large companies such as  Microsoft and Oracle  have their headquarters in Reading. Other businesses in Reading are Prudential, PepsiCo and Wrigley. In 2007, an independent poll placed Reading 16th in a league table of best performing retail centres in the UK.

Culture

Reading is known for its Reading Beer Festival which was first held in 1994 and is now known to be one of the largest beer festivals in the UK. It takes place at King's Meadow for the five days immediately preceding the May Day bank holiday every year.  Reading Pride also takes place at Reading, an annual LGBTA festival in Kings Meadow.

 

Museums

The Museum of Reading  contains galleries that showcase the history of Reading . The museum is also home to the excavations of Calleva Atrebatum. It also houses a full-size replica of the Bayeux Tapestry, an art collection, and galleries relating to Huntley and Palmers.

Located in East Reading, The Museum of English Rural Life,is dedicated to the changing face of rural England. It also has collections of public value. It is not only owned but also managed by the University of Reading. The Ure Museum of Greek Archaeology, the Cole Musum of Zoology and the Harris Botanic Gardens are also under the same management. All these museums can be found on the university's Whiteknights Campus.

There is also a small Riverside Museum at Blake's Lock which tells one about Reading's two rivers, the Thames and the Kennet. The Museum of Berkshire Aviation  houses a collection of aircraft and other aviation accessories.

 

 

More