A Quick Glance

  • black-arrow

    Pass the CISSP exam

  • black-arrow

    Gain vital cybersecurity skills

  • black-arrow

    Implement and manage security programs

  • black-arrow

    Prove your security expertise and knowledge

Modern businesses require proven security professionals to help them defend against threats to their data and systems. CISSP (Certified Information Systems Security Professional)-certified professionals have vast knowledge and expertise to design, implement and manage IT security systems.

Our CISSP training is designed to help learners prepare for the CISSP exam, providing a full understanding of the 8 domains of the CISSP CBK which the exam assesses and ensuring delegates are ready to pass confidently.

Who should take this course

  • Security Consultants
  • Security Managers
  • Security Analysts
  • IT Managers
  • Security Directors
  • Network Architects
  • Security Auditors
  • Security Architects
  • Security Systems Engineers
  • Chief Information Security Officers
More

Prerequisites

There are no requirements for this course, but  4-5 years of experience in at least 2 of the 8 CBK domains is required for full CISSP certification.

More

What Will You Learn

  • Prepare for the CISSP exam
  • Understand the 8 domains of the CISSP CBK
  • Understand what is expected of a cybersecurity professional
  • Learn the fundamentals of security management
More

What's included

  Course Overview

Over 5 days, our expert instructors will go through each of the 8 CISSP CBK domains using a theory-based approach teaching all the concepts, tools and knowledge required for the modern cybersecurity professional to do their job effectively, all with the aim of passing the exam and achieving this highly sought-after certification.

More

  Course Content

Security and Risk Management

  • Confidentiality, Integrity, and Availability Concepts
  • Security Governance Principles
  • Compliance
  • Legal and Regulatory Issues
  • Professional Ethics
  • Security Policies, Standards, Procedures, and Guidelines

Asset Security

  • Information and Asset Classification
  • Ownership
  • Protect Privacy
  • Appropriate Retention
  • Data Security Controls
  • Handling Requirements

Security Architecture and Engineering

  • Engineering Processes using Secure Design Principles
  • Security Models Fundamental Concepts
  • Security Evaluation Models
  • Security Capabilities of Information Systems
  • Security Architectures, Designs, and Solution Elements Vulnerabilities
  • Web-based Systems Vulnerabilities
  • Mobile Systems Vulnerabilities
  • Embedded Devices and Cyber-Physical Systems Vulnerabilities
  • Cryptography
  • Site and Facility Design Secure Principles
  • Physical Security

Communication and Network Security

  • Secure Network Architecture Design
  • Secure Network Components
  • Secure Communication Channels
  • Network Attacks

Identity and Access Management (IAM)

  • Physical and Logical Assets Control
  • Identification and Authentication of People and Devices
  • Identity as a Service
  • Third-party Identity Services
  • Access Control Attacks
  • Identity and Access Provisioning Lifecycle

Security Assessment and Testing

  • Assessment and Test Strategies
  • Security Process Data
  • Security Control Testing
  • Test Outputs
  • Security Architectures Vulnerabilities

Security Operations

  • Investigations Support and Requirements
  • Logging and Monitoring Activities
  • Provisioning of Resources
  • Foundational Security Operations Concepts
  • Resource Protection Techniques
  • Incident Management
  • Preventative Measures
  • Patch and Vulnerability Management
  • Change Management Processes
  • Recovery Strategies
  • Disaster Recovery Processes and Plans
  • Business Continuity Planning and Exercises
  • Physical Security
  • Personnel Safety Concerns

Software Development Security

  • Security in the Software Development Lifecycle
  • Development Environment Security Controls
  • Software Security Effectiveness
  • Acquired Software Security Impact
More

CISSP

What is CISSP?

CISSP is a globally approved cybersecurity qualification designed for experienced cybersecurity practitioners.

In 1988, it was recognised that a standardised cybersecurity body which provided certification for the industry was required. In 1989, ISC (International Information Security Certification Consortium) was established, with its first certification, CISSP, being launched in 1994.

CISSP takes as its basis the CBK (Common Body of Knowledge), a collection of skills, practices and techniques which any cyber expert should know in order to do their job effectively.

Our CISSP training provides delegates with the knowledge they need to prepare for the CISSP exam, including a strong understanding of the 8 CISSP domains.



CISSP Certified Information Systems Security Professional Enquiry

 

Enquire Now


----- OR -------

Reach us at +44 1344 961530 or info@pentagonit.co.uk for more information.

About Stoke-on-Trent

Stoke-on-Trent is a city in Staffordshire, England. It ranges from 36 square miles. Stoke is polycentric, having been molded by an association of six towns in the early 20th period. It reached its name from Stoke-upon-Trent, where the railway station and the town hall are situated. The four other payments are Burslem, Tunstall, Longton and Fenton.

Geography:

Stoke-on-Trent is situated about half-way between Birmingham and Manchester. It links the town and area of Newcastle-under-Lyme. The city located on the higher hill of the River Trent at the south-west foothills of the Pennines, ranging from 106 to 213 meters (350 to 700 ft.) above sea level. The city is measured to be the southernmost end of the Pennines, restricted by the plains of the Midlands to the south, counting the Cheshire Plain deceitful west of Newcastle. The Peak District National Park lies straight to the east and comprises part of the Staffordshire Moorlands District, as well as parts of Derbyshire, Greater Manchester and West and South Yorkshire.

Climate:

Stoke-on-Trent, as with all of the United Kingdom, practices a temperate nautical weather, missing in weather limits. The local area is comparatively raised due to its nearness to the Pennines, subsequent in cooler temperatures year round likened to the nearby Cheshire Plain. However, on calm, clear nights this is frequently upturned as cold air drainage reasons a temperature overturn to occur. As such, the Stoke-on-Trent and Newcastle area are not vulnerable to plain frosts. The nearest Met Office weather station is Keele University, about four miles west of the city centre.

The absolute high temperature is 32.9 °C (91.2 °F), logged in August 1990, although more classically the average warmest day of the year should be 27.0 °C (80.6 °F). In total, just under fourteen days should report a temperature of 25.1 °C (77.2 °F) or above.

Demography:

Based on the 2001 survey, the total population of the city was 240,63. This was a warning of 3.5% since 1991. 51.3% of the population is female. 96.3% of the population of Stoke-on-Trent were instinctive in the UK. 94.8% of the population recognised themselves as white, 2.6% as Asian British Pakistani, 0.5% Asian British Indian and 0.3% as Black Afro Caribbean. Concerning faith, 74.7% labelled themselves as Christian, 3.2% Muslim and 13.4% had no religion. In the same survey, 19.9% were recognised as under 15; 21.0% were over 60. A total of 24.2% of non-pensioner families were logged as having no working grownups. In 2011 the population had amplified to 249,000. It is the first time that the city's population has full-grown since it drawn at 276,639 in 1931.

More