What are the objectives of this course?
The CISSP course will provide you with the knowledge to manage, operate, develop and plan an effective network security infrastructure in an enterprise environment.
- The principles of access control and how they can be strengthened and applied to keep unauthorised users out of a system.
- Telecommunications and network systems that need to be hardened to prevent data loss or theft.
- The role that information governance and risk management play in raising security standards and how they need to be applied to corporate information systems.
- The importance of secure software architecture and design to help ensure that in-house systems protect data and resources.
- Using cryptography to protect data in transit and prevent unauthorised access of files without the correct encryption keys.
- Using security architecture and design principles to limit data access and potential angles of attack.
- Monitoring, auditing and improving operations security to keep systems secure at the point of access.
- Designing and implementing business continuity and disaster recovery plans to help re-establish operations as quickly as possible following a serious outage.
- Legal obligations of data security and obligations that must be fulfilled in the event of a criminal investigation.
- Physical and environmental security considerations
Who is it intended for?
This course is for IT professionals who need to improve their practical skills and attain a professional qualification or those who would like to specialise in IT security.
Students must have at least five years of recent full-time professional work experience in at least 2 of the 8 domains of CISSP:
- Security and Risk Management
- Asset Security
- Security Engineering
- Communications and Network Security
- Identity and Access Management
- Security Assessment and Testing
- Security Operations
- Software Development Security
What marks this course apart?
When students have taken the CISSP course they are then able to sit the examination through the International Information Systems Security Certification Consortium (ISC)². Once you have completed this exam you will be able to function in roles such as security architect, security analyst and security systems engineer.
What happens after requesting information?
Once you have enquired you will be contacted by one of our specialist careers advisors who will be able to provide you with any further information you require.
This school offers programs in:
Last updated November 28, 2016