A Quick Glance

  • black-arrow

    Pass the CISSP exam

  • black-arrow

    Gain vital cybersecurity skills

  • black-arrow

    Implement and manage security programs

  • black-arrow

    Prove your security expertise and knowledge

Modern businesses require proven security professionals to help them defend against threats to their data and systems. CISSP (Certified Information Systems Security Professional)-certified professionals have vast knowledge and expertise to design, implement and manage IT security systems.

Our CISSP training is designed to help learners prepare for the CISSP exam, providing a full understanding of the 8 domains of the CISSP CBK which the exam assesses and ensuring delegates are ready to pass confidently.

Who should take this course

  • Security Consultants
  • Security Managers
  • Security Analysts
  • IT Managers
  • Security Directors
  • Network Architects
  • Security Auditors
  • Security Architects
  • Security Systems Engineers
  • Chief Information Security Officers
More

Prerequisites

There are no requirements for this course, but  4-5 years of experience in at least 2 of the 8 CBK domains is required for full CISSP certification.

More

What Will You Learn

  • Prepare for the CISSP exam
  • Understand the 8 domains of the CISSP CBK
  • Understand what is expected of a cybersecurity professional
  • Learn the fundamentals of security management
More

What's included

  Course Overview

Over 5 days, our expert instructors will go through each of the 8 CISSP CBK domains using a theory-based approach teaching all the concepts, tools and knowledge required for the modern cybersecurity professional to do their job effectively, all with the aim of passing the exam and achieving this highly sought-after certification.

More

  Course Content

Security and Risk Management

  • Confidentiality, Integrity, and Availability Concepts
  • Security Governance Principles
  • Compliance
  • Legal and Regulatory Issues
  • Professional Ethics
  • Security Policies, Standards, Procedures, and Guidelines

Asset Security

  • Information and Asset Classification
  • Ownership
  • Protect Privacy
  • Appropriate Retention
  • Data Security Controls
  • Handling Requirements

Security Architecture and Engineering

  • Engineering Processes using Secure Design Principles
  • Security Models Fundamental Concepts
  • Security Evaluation Models
  • Security Capabilities of Information Systems
  • Security Architectures, Designs, and Solution Elements Vulnerabilities
  • Web-based Systems Vulnerabilities
  • Mobile Systems Vulnerabilities
  • Embedded Devices and Cyber-Physical Systems Vulnerabilities
  • Cryptography
  • Site and Facility Design Secure Principles
  • Physical Security

Communication and Network Security

  • Secure Network Architecture Design
  • Secure Network Components
  • Secure Communication Channels
  • Network Attacks

Identity and Access Management (IAM)

  • Physical and Logical Assets Control
  • Identification and Authentication of People and Devices
  • Identity as a Service
  • Third-party Identity Services
  • Access Control Attacks
  • Identity and Access Provisioning Lifecycle

Security Assessment and Testing

  • Assessment and Test Strategies
  • Security Process Data
  • Security Control Testing
  • Test Outputs
  • Security Architectures Vulnerabilities

Security Operations

  • Investigations Support and Requirements
  • Logging and Monitoring Activities
  • Provisioning of Resources
  • Foundational Security Operations Concepts
  • Resource Protection Techniques
  • Incident Management
  • Preventative Measures
  • Patch and Vulnerability Management
  • Change Management Processes
  • Recovery Strategies
  • Disaster Recovery Processes and Plans
  • Business Continuity Planning and Exercises
  • Physical Security
  • Personnel Safety Concerns

Software Development Security

  • Security in the Software Development Lifecycle
  • Development Environment Security Controls
  • Software Security Effectiveness
  • Acquired Software Security Impact
More

CISSP

What is CISSP?

CISSP is a globally approved cybersecurity qualification designed for experienced cybersecurity practitioners.

In 1988, it was recognised that a standardised cybersecurity body which provided certification for the industry was required. In 1989, ISC (International Information Security Certification Consortium) was established, with its first certification, CISSP, being launched in 1994.

CISSP takes as its basis the CBK (Common Body of Knowledge), a collection of skills, practices and techniques which any cyber expert should know in order to do their job effectively.

Our CISSP training provides delegates with the knowledge they need to prepare for the CISSP exam, including a strong understanding of the 8 CISSP domains.



CISSP Certified Information Systems Security Professional Enquiry

 

Enquire Now


----- OR -------

Reach us at +44 1344 961530 or info@pentagonit.co.uk for more information.

About Warwick

Warwick is the region urban of Warwickshire, England. The town dishonesties upon the River Avon, 11 miles (18 km) south of Coventry and fair west of Lamington Spa and Whitnash with which it is touched. At the 2011 United Kingdom review, it had a populace of 31,345.

There was human action at Warwick as early as the Neolithic period, and continuous occupancy since the 6th century. It was a Saxon burh in the 9th century, Warwick Castle was recognised in 1068 as part of the Norman conquest of England. Warwick School rights to be the eldest boys' school in the country. The earldom of Warwick was formed in 1088, and the early restrained the town in the feudal period and constructed city walls, of which Eastgate and Westgate endure. The castle industrial into a stone stronghold and then a country house and is today a general tourist attraction.

Governance:

Population growth has led to Warwick flattering combined to its larger neighbouring town Lamington Spa with which its procedures a small city. The two cities are now along with Kenilworth and Whitnash. These are managed as part of Warwick District. Warwickshire County Council leftovers based in Warwick itself.

Warwick is signified in Parliament as part of the Warwick and Leamington electorate. It has been detained by the Conservative Party since the 2010 general election; since then, Chris White has been the constituency's Member of Assembly. From the 1945 general election until 1997 the electorate elected a Traditional MP. In 1997 a Labour MP was chosen and retained the seat until 2010 when White was chosen.

 

Geography:

Antiquarian William Dugdale wrote in the 17th century that Warwick was stand up upon a rocky climb from every side, and in a dry and fertile soil, consuming rich and pleasant fields on the south part and woodland on the north. Two issues have pretentious Warwick's constructed environment: the Great Fire of 1694 and the lack of industrialisation. The fire demolished much of the town, and the next transformation was mainly in one style. In the 19th century, when other cities were fast rising during the Industrial Rebellion, Warwick did not know the same development. Part of the reason Warwick did not grow as a centre of the industry was that the town did not lie on significant roads and the River Avon was not manoeuvrable as far as Warwick.

Culture:

Warwick crowds annual centenaries reaching from the Spoken Word to Classical and Modern Music to a Folk Festival and a Victorian Evening, detained in late November or early December. St. Mary's Church crowds a series of Early Music performances, and the Bridge House Theatre hosts the Music-in-Round performances. Warwick Chamber of Trade assistances to endorse the town for companies, inhabitants and traders. The city is also well-known for Warwick Castle, the building of which instigated in 1068. The city centre is also recognised for its significant building and covers a combination of Tudor and 17th-century buildings. In topical years several high-profile national and international businesses have set up large office developments in and around Warwick, notably National Grid plc. And IBM.

More