Certified Information System Security Professional (CISSP) CBK Review Training Course

Primary tabs

Course Language

This course is delivered in Polish or English.

Course Code

cissprev

Duration Duration

35 hours (usually 5 days including breaks)

Requirements Requirements

To attend the CISSP CBK Review you do not need to have the prerequisite experience for the examination. It is available to anyone working in the field of IT and Information Security and aims to give you a thorough understanding of Information Security even if you do not intend to sit the examination.

If you intend to go on to the examination:

CISSP candidates:

Must have a minimum of five years of direct full-time security professional work experience in two or more of the ten domains of the (ISC)2® CISSP CBK®, or four years of direct full-time security professional work experience in two or more of the ten domains of the CISSP CBK with a college degree.

Associate of (ISC)2 for CISSP:

Associate of (ISC)2 status is available to those knowledgeable in key areas of industry concepts but lacking the work experience. As a candidate, you may take the CISSP examination and subscribe to the (ISC)2 Code of Ethics, however to earn the CISSP credential you will have to acquire the necessary years of professional experience required, provide proof and be endorsed by a member of (ISC)2 in good standing. If you are working towards this credential, you will have a maximum of six years from your exam pass date to acquire the necessary five years of professional experience. For more information please refer to: www.isc2.org

Overview Overview

A CISSP is an information assurance professional who defines the architecture, design, management and/or controls that assure the security of business environments. The vast breadth of knowledge and the experience it takes to pass the exam is what sets a CISSP apart. The credential demonstrates a globally recognized level of competence provided by the (ISC)2® CBK®, which covers critical topics in security today, including cloud computing, mobile security, application development security, risk management and more.

This course helps you review the 10 domains of the information security practices. It also serves as a strong learning tool for mastering concepts and topics related to all aspects of information systems security.

Objectives:

  • To review of the main topics of CISSP CBK (Common Body of Knowledge).
  • To prepare for a CISSP examination

Course Outline Course Outline

Access Control

Security architecture that protects the assets of your systems:

  • Concepts, methodologies and techniques
  • Effectiveness
  • Attacks

Telecommunications & Network Security

Network structures, transmission methods, transport formats and security measures that provide availability, integrity and confidentiality:

  • Network architecture and design
  • Communication channels
  • Network components
  • Network attacks

Information Security Governance & Risk Management

Identifying an organisation’s information assets, and the development, documentation and implementation of policies, standards, procedures and guidelines:

  • Security governance and policy
  • Information classification and ownership
  • Contractual agreements and procurement processes
  • Risk management concepts
  • Personnel security
  • Security education, training and awareness
  • Certification and accreditation

Software Development Security

The controls found in systems and applications software, and their development:

  • Systems Development Life Cycle (SDLC)
  • Application environment and security controls
  • Effectiveness of application security

Cryptography

The principles, means and methods of disguising information; to ensure its integrity, confidentiality and authenticity:

  • Encryption concepts
  • Digital signatures
  • Cryptanalytic attacks
  • Public Key Infrastructure (PKI)
  • Information hiding alternatives

Security Architecture & Design

The concepts, principles, structures and standards used to design, implement, monitor, and secure, operating systems, equipment, networks and applications:

  • Fundamental concepts of security models
  • Capabilities of information systems (e.g. memory protection, virtualization)
  • Countermeasure principles
  • Vulnerabilities and threats (e.g. cloud computing, aggregation, data flow control)

Security Operations (formerly 'Operations Security')

Controls over hardware, media and operators with access privileges:

  • Resource protection
  • Incident response
  • Attack prevention and response
  • Patch and vulnerability management

Business Continuity & Disaster Recovery Planning

How to maintain business in the face of major disruptions:

  • Business impact analysis
  • Recovery strategy
  • Disaster recovery process
  • Provide training

Legal, Regulations, Investigations and Compliance

Computer crime laws, investigation and how to gather evidence:

  • Legal issues
  • Investigations
  • Forensic procedures
  • Compliance requirements/procedures

Physical (Environmental) Security

How to protect your business's resources and sensitive information:

  • Site / facility design considerations
  • Perimeter security
  • Internal security
  • Facilities security

Guaranteed to run even with a single delegate!
Public Classroom Public Classroom
Participants from multiple organisations. Topics usually cannot be customised
From 8521PLN
(68)
Private Classroom Private Classroom
Participants are from one organisation only. No external participants are allowed. Usually customised to a specific group, course topics are agreed between the client and the trainer.
From 8521PLN
Request quote
Private Remote Private Remote
The instructor and the participants are in two different physical locations and communicate via the Internet
From 24820PLN
Request quote
SelfStudy SelfStudy
Self-study courses allow you to learn at your own pace on your own time. There is no live instructor involved. The participants use recorded video, quizzes and reading at their own convenience.
Price not set yet
Register Interest

The more delegates, the greater the savings per delegate. Table reflects price per delegate and is used for illustration purposes only, actual prices may differ.

Number of Delegates Public Classroom Private Classroom Private Remote
1 8521PLN 8521PLN 24820PLN
2 7316PLN 7216PLN 15365PLN
3 6914PLN 6780PLN 12213PLN
4 6713PLN 6563PLN 10638PLN
Cannot find a suitable date? Choose Your Course Date >>
Too expensive? Suggest your price

Related Categories


Course Discounts

Course Venue Course Date Course Price [Remote/Classroom]
Design Patterns in C# Wrocław, ul.Ludwika Rydygiera 2a/22 Wed, 2016-06-29 09:00 1865PLN / 1392PLN
Visual Basic for Applications (VBA) for Analysts Poznan, Garbary Mon, 2016-07-04 09:00 1912PLN / 1278PLN
Debian Administration Poznan, Garbary Mon, 2016-07-04 09:00 3157PLN / 2083PLN
Agile Project Management with Scrum Szczecin Wed, 2016-07-06 09:00 1746PLN / 1361PLN
A Practical Guide to Successful Pricing Strategies Poznan, Garbary Wed, 2016-07-06 09:00 1427PLN / 1093PLN
SQL language in MSSQL Poznan, Garbary Thu, 2016-07-07 09:00 1568PLN / 1142PLN
Excel and VBA Programming for Audit and Finance Professionals Warszawa, ul. Złota 3/11 Mon, 2016-07-11 09:00 1913PLN / 1441PLN
Forecasting with R Poznan, Garbary Thu, 2016-07-14 09:00 2188PLN / 1527PLN
Introduction to Selenium Wrocław, ul.Ludwika Rydygiera 2a/22 Thu, 2016-07-14 09:00 768PLN / 539PLN
Machine Learning Fundamentals with R Warszawa, ul. Złota 3/11 Mon, 2016-07-18 09:00 2523PLN / 1828PLN
Building Web Apps using the MEAN stack Szczecin Mon, 2016-07-18 09:00 5538PLN / 3351PLN
Administracja bazą danych Microsoft SQL Server 2012 Toruń, ul. Żeglarska 10/14 Mon, 2016-07-18 09:00 2509PLN / 1653PLN
Apache Tomcat Administration Kraków Mon, 2016-07-18 09:00 1713PLN / 1438PLN
Effective working with spreadsheet in Excel Gdańsk Tue, 2016-07-19 09:00 768PLN / 652PLN
ITIL®: Intermediate Lifecycle Stream: Service Strategy (SS) Kraków Tue, 2016-07-19 09:00 4338PLN / 3116PLN
Microsoft Access - download the data Poznan, Garbary Wed, 2016-07-20 09:00 1117PLN / 856PLN
Debian Administration Olsztyn, ul. Kajki 3/1 Mon, 2016-07-25 09:00 3157PLN / 2167PLN
Python Programming Warszawa, ul. Złota 3/11 Mon, 2016-08-01 09:00 5790PLN / 3753PLN
Data Analysis with Oracle 11g - workshop Warszawa, ul. Złota 3/11 Mon, 2016-08-01 09:00 4350PLN / 3012PLN
Web Application Development in PHP Warszawa, ul. Złota 3/11 Wed, 2016-08-03 09:00 2688PLN / 2022PLN
Zapewnienie jakości oprogramowania – przegląd metodyk Warszawa, ul. Złota 3/11 Tue, 2016-08-09 09:00 2735PLN / 1863PLN
Oracle 11g - Programming with PL / SQL II Wrocław, ul.Ludwika Rydygiera 2a/22 Wed, 2016-08-10 09:00 2363PLN / 1785PLN
Stress management Warszawa, ul. Złota 3/11 Thu, 2016-08-18 09:00 2112PLN / 1212PLN
Programming in WPF 4.5 Warszawa, ul. Złota 3/11 Mon, 2016-09-05 09:00 2359PLN / 1355PLN
BPMN 2.0 for Business Analysts Wrocław, ul.Ludwika Rydygiera 2a/22 Tue, 2016-09-27 09:00 3110PLN / 2337PLN
Visual Basic for Applications (VBA) in Excel - Advanced Białystok, ul. Malmeda 1 Mon, 2016-11-14 09:00 1689PLN / 1413PLN

Upcoming Courses

VenueCourse DateCourse Price [Remote/Classroom]
LublinMon, 2016-07-18 09:0010638PLN / 6812PLN
RzeszówMon, 2016-07-18 09:0010638PLN / 6812PLN
Warszawa, ul. Złota 3/11Mon, 2016-07-18 09:0010638PLN / 6595PLN
Bydgoszcz, ul. Dworcowa 94Mon, 2016-07-18 09:0010638PLN / 6670PLN
KrakówMon, 2016-07-18 09:0010638PLN / 6878PLN

Some of our clients