Certified Information System Security Professional (CISSP) (SF)

NTUC LearningHub


Course introduction

The CISSP certification is the ideal credential for those with proven deep technical and managerial skills, experience, and credibility to design, engineer, implement, and manage their overall information security program to protect organizations from growing sophisticated attacks. Backed by (ISC)², the globally recognized, not-for-profit organization dedicated to advancing the information security field, the CISSP was the first credential in the field of information security to meet the stringent requirements of ISO/IEC Standard 17024.



Course Benefits


After completing this course, students will be able to gain from a comprehensive, up-to-date and global common body of knowledge that ensures security leaders have about new threats, technologies, regulations, standards, and practices, including domain knowledge of security in the following areas:  

  • Security and Risk Management
  • Asset Security
  • Security Engineering
  • Communications and Network Security
  • Identity and Access Management
  • Security Assessment and Testing
  • Security Operations
  • Software Development Security 



Course Pre-Requisites


No credit or certification pre-requisite is required to attend this course or to sit for the official CISSP Exam.
However, to earn CISSP credential participants must satisfy one of the following criteria:

  • Degree Holder:
    • 4 years of direct full-time security professional work experience in two or more of the 8 domains of the (ISC)2® CISSP CBK®
  • Non-Degree Holder:
    • Min. of 5 years of direct full-time security professional work experience in two or more of the 8 domains of the (ISC)2® CISSP CBK®
If you don't meet the above criteria, you may still take this course and sit for the official CISSP exam. Once you pass the exam, you can become (ISC)2 Associate. Maintain your associate status through earning 15 Continuing Professional Education (CPE) credits each year and paying an Annual Maintenance Fee (AMF) of USD 35.

Once you have achieved the professional experience requirements for CISSP, you can begin the Endorsement Process to convert your status from Associate of (ISC)² to CISSP. You are given up to 6 years to gain the 5 years CISSP experience required.



Target Audience


The CISSP is ideal for those working in positions such as, but not limited to:

  • Security Consultant
  • Security Analyst
  • Security Auditor
  • Security Systems Engineer
  • Security Manager
  • Security Architect
  • Network Architect
  • IT Director / Manager
  • Director of Security
  • Chief Information Security Officer



Course Outline


Security and Risk Management

  • Confidentiality, integrity, and availability concepts 
  • Security governance principles/ Compliance
  • Legal and regulatory issues/ Professional ethic
  • Security policies, standards, procedures and guidelines
Asset Security
  • Information and asset classification/ Ownership
  • Protect privacy/ Appropriate retention
  • Data security controls/ Handling requirements
  • Security Engineering (Engineering and Management of Security)
  • Engineering processes using secure design principles
  • Security models fundamental concepts/ Security evaluation models
  • Security capabilities of information systems
  • Security architectures, designs, and solution elements vulnerabilities
  • Web-based systems vulnerabilities/ Mobile systems vulnerabilities
Security Engineering
  • Engineering processes using secure design principles
  • Security models fundamental concepts
  • Security evaluation models/ Security capabilities of information systems
  • Security architectures, designs, and solution elements vulnerabilities
  • Web-based systems vulnerabilities/ Mobile systems vulnerabilities
  • Embedded devices and cyber-physical systems vulnerabilities
  • Cryptography/ Site and facility design secure principles
Communication and Network Security
  • Secure network architecture design/ Secure network components
  • Secure communication channels/ Network attacks
Identity and Access Management
  • Physical and logical assets control
  • Identification and authentication of people and devices
  • Identity as a service/ Third-party identity services
  • Access control attacks/ Identity and access provisioning lifecycle
Security Assessment and Testing
  • Assessment and test strategies/ Security process data
  • Security control testing/ Test outputs
  • Security architectures vulnerabilities
Security Operations
  • Investigations support and requirements/ Logging and monitoring activities
  • Provisioning of resources/ Foundational security operations concepts
  • Resource protection techniques/ Incident management
  • Preventative measures/ Patch and vulnerability management
  • Change management processes/ Recovery strategies
  • Disaster recovery processes and plans
  • Business continuity planning and exercises/ Physical security
  • Personnel safety concerns
Software Development Security
  • Security in the software development lifecycle
  • Development environment security controls
  • Software security effectiveness
  • Acquired software security impact


COURSE DURATION
  • 5 Days / 39.75 Hours



Available Course Sessions


Please click here to stay updated on upcoming sessions.



Trainer Profile


NTUC Learninghub Pte Ltd (Executive Arm of NTUC LearningHub)

NTUC LearningHub® employs industry experienced and vendor certified instructors. These instructors are required to achieve sufficient qualifications before leading a class. In addition, we work with partners to deliver the latest course materials and computer facilities so that students can learn critical skills and prepare for the examinations.



 

Top