A Quick Glance

  • black-arrow

    Pass the CISSP exam

  • black-arrow

    Gain vital cybersecurity skills

  • black-arrow

    Implement and manage security programs

  • black-arrow

    Prove your security expertise and knowledge

Modern businesses require proven security professionals to help them defend against threats to their data and systems. CISSP (Certified Information Systems Security Professional)-certified professionals have vast knowledge and expertise to design, implement and manage IT security systems.

Our CISSP training is designed to help learners prepare for the CISSP exam, providing a full understanding of the 8 domains of the CISSP CBK which the exam assesses and ensuring delegates are ready to pass confidently.

Who should take this course

  • Security Consultants
  • Security Managers
  • Security Analysts
  • IT Managers
  • Security Directors
  • Network Architects
  • Security Auditors
  • Security Architects
  • Security Systems Engineers
  • Chief Information Security Officers
More

Prerequisites

There are no requirements for this course, but  4-5 years of experience in at least 2 of the 8 CBK domains is required for full CISSP certification.

More

What Will You Learn

  • Prepare for the CISSP exam
  • Understand the 8 domains of the CISSP CBK
  • Understand what is expected of a cybersecurity professional
  • Learn the fundamentals of security management
More

What's included

  Course Overview

Over 5 days, our expert instructors will go through each of the 8 CISSP CBK domains using a theory-based approach teaching all the concepts, tools and knowledge required for the modern cybersecurity professional to do their job effectively, all with the aim of passing the exam and achieving this highly sought-after certification.

More

  Course Content

Security and Risk Management

  • Confidentiality, Integrity, and Availability Concepts
  • Security Governance Principles
  • Compliance
  • Legal and Regulatory Issues
  • Professional Ethics
  • Security Policies, Standards, Procedures, and Guidelines

Asset Security

  • Information and Asset Classification
  • Ownership
  • Protect Privacy
  • Appropriate Retention
  • Data Security Controls
  • Handling Requirements

Security Architecture and Engineering

  • Engineering Processes using Secure Design Principles
  • Security Models Fundamental Concepts
  • Security Evaluation Models
  • Security Capabilities of Information Systems
  • Security Architectures, Designs, and Solution Elements Vulnerabilities
  • Web-based Systems Vulnerabilities
  • Mobile Systems Vulnerabilities
  • Embedded Devices and Cyber-Physical Systems Vulnerabilities
  • Cryptography
  • Site and Facility Design Secure Principles
  • Physical Security

Communication and Network Security

  • Secure Network Architecture Design
  • Secure Network Components
  • Secure Communication Channels
  • Network Attacks

Identity and Access Management (IAM)

  • Physical and Logical Assets Control
  • Identification and Authentication of People and Devices
  • Identity as a Service
  • Third-party Identity Services
  • Access Control Attacks
  • Identity and Access Provisioning Lifecycle

Security Assessment and Testing

  • Assessment and Test Strategies
  • Security Process Data
  • Security Control Testing
  • Test Outputs
  • Security Architectures Vulnerabilities

Security Operations

  • Investigations Support and Requirements
  • Logging and Monitoring Activities
  • Provisioning of Resources
  • Foundational Security Operations Concepts
  • Resource Protection Techniques
  • Incident Management
  • Preventative Measures
  • Patch and Vulnerability Management
  • Change Management Processes
  • Recovery Strategies
  • Disaster Recovery Processes and Plans
  • Business Continuity Planning and Exercises
  • Physical Security
  • Personnel Safety Concerns

Software Development Security

  • Security in the Software Development Lifecycle
  • Development Environment Security Controls
  • Software Security Effectiveness
  • Acquired Software Security Impact
More

CISSP

What is CISSP?

CISSP is a globally approved cybersecurity qualification designed for experienced cybersecurity practitioners.

In 1988, it was recognised that a standardised cybersecurity body which provided certification for the industry was required. In 1989, ISC (International Information Security Certification Consortium) was established, with its first certification, CISSP, being launched in 1994.

CISSP takes as its basis the CBK (Common Body of Knowledge), a collection of skills, practices and techniques which any cyber expert should know in order to do their job effectively.

Our CISSP training provides delegates with the knowledge they need to prepare for the CISSP exam, including a strong understanding of the 8 CISSP domains.



CISSP Certified Information Systems Security Professional Enquiry

 

Enquire Now


----- OR -------

Reach us at +44 1344 961530 or info@pentagonit.co.uk for more information.

About Sunderland

Sunderland

Sunderland also referred as Sunderland A.F.C, Tyne and Wear. It is located on River Wear in England. Sunderland comprises of the neighbouring towns like Washington and Houghton-le-Spring as well as city. Sunderland is referred as UK Parliament Constituency from 1832 to 1950. Sunderland A.F.C is a professional football team.

History

The population of Sunderland was 146,000 during 1901. First electric trams started in Sunderland in 1900. However in the 1940s and 195-s electric trams were replaced by buses. Last trams ran in Sunderland in 1954. Sunderland Technical College was opened in 1901. In 1904 Bede Memorial was raised and in 1907 Commissioners offices were built. In 1907 Empire Theatre was also opened. In 1909 Barnes Park was opened. Backhouse Park in 1923. Thompson Park in 1933. In 1902 Roker Breakwater was built and South Breakwater in 1914.

Boundaries of Borough were extended in 1928 to include Southwick and Fulwell. In 1929 New Wear Bridge has been constructed. A general hospital was opened in 1929. In 1934 was Deep Water Quay was opened. Council started slum clearance in Sunderland in 1930s. New council houses were built to replace the old slums located in Ford Hall, Marley Pots and Leechmere. During Second World War 267 people were killed due to German bombing. About 1000 houses were destroyed, and about 3000 got damaged. In 1967 boundaries of Sunderland were extended to include Silksworth, South Hylton, Herrington, Ryhope and Castletown. In 1969 Sunderland Polytechnic was founded and was made university in 1992. In 1970 civic centre and the new town hall was built. In 1973 new Police station has been constructed.

In 1973 Monkwearmouth Station Museum was opened. In 1974 North East Aircraft Museum was founded and new General Hospital was opened in Sunderland in 1978. Sunderland suffered in the 1930s when third of the men were unemployed. During 1950s Joblessness lowered and in 1980s unemployment returned. In late 20th century, Sunderland’s coal mining declined rapidly. After 1986 no more coal was exported. New industries replaced the old ones. Sunderland is well known for its car making industry. Other industries in Sunderland include electronic engineering, papermaking, mechanical engineering and textiles. Sunderland was made a city in the year 1992. In 1995 Sunderland Library and Arts Centre was opened. In 1997 Stadium of Light was opened and in 1998 National Glass Centre was opened. In 2002 Tyne and Wear Metro was expanded to Sunderland. In the beginning years of 21st century, Sunniside area was regenerated. Sunderland Aquatic Centre was opened in 2008. Now the population of Sunderland is 275,000.

 

More