A Quick Glance

  • black-arrow

    Pass the CISSP exam

  • black-arrow

    Gain vital cybersecurity skills

  • black-arrow

    Implement and manage security programs

  • black-arrow

    Prove your security expertise and knowledge

Modern businesses require proven security professionals to help them defend against threats to their data and systems. CISSP (Certified Information Systems Security Professional)-certified professionals have vast knowledge and expertise to design, implement and manage IT security systems.

Our CISSP training is designed to help learners prepare for the CISSP exam, providing a full understanding of the 8 domains of the CISSP CBK which the exam assesses and ensuring delegates are ready to pass confidently.

Who should take this course

  • Security Consultants
  • Security Managers
  • Security Analysts
  • IT Managers
  • Security Directors
  • Network Architects
  • Security Auditors
  • Security Architects
  • Security Systems Engineers
  • Chief Information Security Officers
More

Prerequisites

There are no requirements for this course, but  4-5 years of experience in at least 2 of the 8 CBK domains is required for full CISSP certification.

More

What Will You Learn

  • Prepare for the CISSP exam
  • Understand the 8 domains of the CISSP CBK
  • Understand what is expected of a cybersecurity professional
  • Learn the fundamentals of security management
More

What's included

  Course Overview

Over 5 days, our expert instructors will go through each of the 8 CISSP CBK domains using a theory-based approach teaching all the concepts, tools and knowledge required for the modern cybersecurity professional to do their job effectively, all with the aim of passing the exam and achieving this highly sought-after certification.

More

  Course Content

Security and Risk Management

  • Confidentiality, Integrity, and Availability Concepts
  • Security Governance Principles
  • Compliance
  • Legal and Regulatory Issues
  • Professional Ethics
  • Security Policies, Standards, Procedures, and Guidelines

Asset Security

  • Information and Asset Classification
  • Ownership
  • Protect Privacy
  • Appropriate Retention
  • Data Security Controls
  • Handling Requirements

Security Architecture and Engineering

  • Engineering Processes using Secure Design Principles
  • Security Models Fundamental Concepts
  • Security Evaluation Models
  • Security Capabilities of Information Systems
  • Security Architectures, Designs, and Solution Elements Vulnerabilities
  • Web-based Systems Vulnerabilities
  • Mobile Systems Vulnerabilities
  • Embedded Devices and Cyber-Physical Systems Vulnerabilities
  • Cryptography
  • Site and Facility Design Secure Principles
  • Physical Security

Communication and Network Security

  • Secure Network Architecture Design
  • Secure Network Components
  • Secure Communication Channels
  • Network Attacks

Identity and Access Management (IAM)

  • Physical and Logical Assets Control
  • Identification and Authentication of People and Devices
  • Identity as a Service
  • Third-party Identity Services
  • Access Control Attacks
  • Identity and Access Provisioning Lifecycle

Security Assessment and Testing

  • Assessment and Test Strategies
  • Security Process Data
  • Security Control Testing
  • Test Outputs
  • Security Architectures Vulnerabilities

Security Operations

  • Investigations Support and Requirements
  • Logging and Monitoring Activities
  • Provisioning of Resources
  • Foundational Security Operations Concepts
  • Resource Protection Techniques
  • Incident Management
  • Preventative Measures
  • Patch and Vulnerability Management
  • Change Management Processes
  • Recovery Strategies
  • Disaster Recovery Processes and Plans
  • Business Continuity Planning and Exercises
  • Physical Security
  • Personnel Safety Concerns

Software Development Security

  • Security in the Software Development Lifecycle
  • Development Environment Security Controls
  • Software Security Effectiveness
  • Acquired Software Security Impact
More

CISSP

What is CISSP?

CISSP is a globally approved cybersecurity qualification designed for experienced cybersecurity practitioners.

In 1988, it was recognised that a standardised cybersecurity body which provided certification for the industry was required. In 1989, ISC (International Information Security Certification Consortium) was established, with its first certification, CISSP, being launched in 1994.

CISSP takes as its basis the CBK (Common Body of Knowledge), a collection of skills, practices and techniques which any cyber expert should know in order to do their job effectively.

Our CISSP training provides delegates with the knowledge they need to prepare for the CISSP exam, including a strong understanding of the 8 CISSP domains.



CISSP Certified Information Systems Security Professional Enquiry

 

Enquire Now


----- OR -------

Reach us at +44 1344 961530 or info@pentagonit.co.uk for more information.

About Wrexham

Wrexham                                   

Wrexham is the largest town located in the north of Wales and also an educational, commercial, administrative, commercial and retail centre. Wrexham is located between lower Dee valley alongside England border and Weish Mountains. Historically it is the part of Denbighshire, the town became part of Clwyd in 1974, and since 1996 it has been the centre of Wrexham County Borough. According to 2011 census, Wrexham had a population of 61,603 which made it a fourth largest urban area in Wales.

History

Council purchased Parciau in the year 1907, and it later turned into a Public Park. In 1910 first cinema in Wrexham was opened. The population of Wrexham continued to grow drastically. In 1901 population was 14,966 and by 1931 it reached 18,567. The population of Wrexham crossed 40,000 for the first time in the year 1981. First-time electricity was generated in the year 1900 in Wrexham. In 1907 electric trams replaced horse-drawn trams and in 1927 they were replaced by buses.

In 1913-1917 Garden Village was built in Wrexham. In the 1920s and 1930s Wrexham council started working for slum clearance. At that time new council house estate has been constructed at Action Park. Other council estates were built at Maes Y Dre and Spring Lodge in 1930s. In 1965 boundaries of Wrexham was extended. In the 1930s at Queens Park, council estate was built. Another was established at Bryn Offa. Action Park estate was extended in the 1960s.

In 1911 Gresford Collery was opened. An explosion and fire accident at Gresford Collery in 1934 killed 261 miners, and three rescuers also died. In late 20th century, traditional industries declined in Wrexham. Coal mining almost ended. Gresford Collary closed in 1973. In 1986 Bersham Collery was closed. New industries came into existence in Wrexham including Pharmaceuticals, engineering, chemicals, electronics and food processing. During Second World War, a big ordnance factory was built at Wrexham, and it was converted into industrial estate after 1945. In 1983 Bersham Heritage Centre was opened. In 1985 Maelor Hospital was opened. The swimming pool was constructed in 1970. In 1998 it was refurbished and renamed as Waterworld Leisure Complex. In 1999 two new shopping centres were opened in Wrexham named Henblas Square and Island Green. First Wrexham Science Festival was held in 1998. In the 21st century, Wrexham is still a developing city. In 2002 Border Retail Park was opened. In 2008 Meadow Shopping Centre was opened. Now Wrexham has a population of 43000.

More