
Refine Your Search
...
...
Training Partner:
Training Partner:
Program Type
Banking and Finance
Training Category
Signature Programs
Program Duration
6 days
Language
English
About Program
This training program for the CISSP Certification, a pinnacle journey for cybersecurity professionals aiming to validate their expertise and ascend in their careers. Over six days, encompassing 66 hours of immersive instruction, this program demystifies the CISSP certification, ensuring participants are exam-ready with a deep understanding of all eight domains of cybersecurity. From security and risk management principles to intricate details of security engineering and software development security, you will gain insights into asset security, dive into the complexities of security engineering, and explore the nuances of communication and network security. The program also emphasizes the importance of identity and access management, security assessment and testing, security operations, and much more. The LDR414 program employs various training methodologies including lectures and simulation tests for professional certifications exams, ensuring a dynamic and engaging learning experience. By the end of this program, you will be prepared to take significant leadership roles in cybersecurity, developing a holistic understanding of information security best practices, frameworks, and strategies to protect organizations from cyber threats. Join us in shaping the future of cybersecurity leadership.
Program Goals
Acquire knowledge and strategies to confidently tackle the CISSP® certification exam, focusing on the latest 2024 exam updates.
Master the principles of security governance, compliance, legal and regulatory issues, including GDPR and supply chain risk management concepts.
Gain insights into data and asset classification, ownership, and data security principles including privacy, DRM, and data destruction methods.
Explore secure design principles, security models, and controls for safeguarding enterprise assets and software, emphasizing virtualization, cloud computing, and IoT security.
Develop a deep understanding of network architecture, including the OSI model, TCP/IP protocols, network devices, and secure network design and implementation.
Learn to manage access controls, identity services, and authentication mechanisms, ensuring secure access to resources and data.
Acquire the ability to conduct comprehensive security control testing, vulnerability assessments, and penetration testing to identify and address security gaps.
Enhance skills in incident response, forensics, logging, monitoring, and the management of security operations for effective threat detection and response.
Understand the importance of securing the software development lifecycle, including the application of secure coding practices, software assessment, and the use of DevSecOps for security integration.
Prepare to take on significant leadership roles in cybersecurity by developing a holistic understanding of information security best practices, frameworks, and strategies to protect organizations from cyber threats.
Join us for an unforgettable journey of exceptional learning
Program Agenda
In Class Training
Overview of the 8 Domains
Domain 1: Security and Risk Management
Domain 2: Asset Security
Domain 3: Security Engineering
Domain 4: Communication and Network Security
Domain 5: Identity and Access Management (IAM)
Domain 6: Security Assessment and Testing
Domain 7: Security Operations
Domain 8: Software Development Security
Domain 1: Security and Risk Management
Confidentiality, integrity, availability, authenticity, and non-repudiation
Security governance principles
Compliance
Supply Chain Risk Management (SCRM) concepts.
Legal and regulatory Issues
General Data Protection Regulation (GDPR)
California Consumer Privacy Act
Software Bill of Materials (SBOM)
Ethics
Policies, standards, procedures, and guidelines
Risk management concepts.
Product tampering and counterfeits
Threat modeling
Security champions
Gamification
Security Operations Center (SOC) reports
Education, training, and awareness
In Class Training
Domain 2: Asset Security
Data and asset classification
Tangible and intangible assets
Data owners
System owners
Business/Mission owners
Privacy
Data processors
Data remanence
Limitation on collection of sensitive data
Digital Rights Management (DRM)
Data retention
Data destruction
Data Loss Prevention (DLP)
Cloud Access Security Broker (CASB)
Baselines
Scoping and Tailoring
omain 3: Security Engineering (Part 1)
Secure design principles
Security models
Controls and countermeasures
Virtualization
Microservices
Containerization
Serverless
Trusted Platform Module (TPM)
Industrial Control Systems (ICS)
Embedded systems
Database security
Cloud computing
Secure Access Service Edge (SASE)
Supervisory Control and Data Acquisition (SCADA)
eXtensible Markup Language (XML)
OWASP
he Internet of Things
In Class Training
Facility design considerations
Physical security
Domain 4: Communication and Network Security
Voiceover IP
Content distribution networks
Virtual routing and forwarding
Virtual domain
Network Functions Virtualization (NFV)
Remote meeting technology
Telecommuting
Port isolation
VLANs
Software-defined networks
Micro-segmentation
Virtual eXtensible Local Area Network (VXLAN)
Software-Defined Wide Area Network (SD-WAN)
In Class Training
Domain 5: Identity and Access Management (IAM)
Physical and logical access
Credential management systems
Just-In-Time (JIT)
SSO
LDAP
Multi-factor authentication
Password-less authentication
Biometrics
Accountability
Session management
SAML
Credential management
Third-party identity services
On-premises, cloud, and hybrid identity
Provisioning
In Class Training
Security testing strategies
Internal and third-party audits
Operational, criminal, civil, and regulatory investigations
eDiscovery
Incident management
Firewalls
IDS and IPS
Honeypots and honeynets
Vulnerability management
Change management processes.
Recovery strategies
Disaster recovery processes
Disaster recovery plans
In Class Training
Domain 8: Software Development Security
Software capability maturity models
Change management
DevOps
DevSecOps
Scaled Agile Framework (SAFe)
Software Component/Composition Analysis (SCA)
Interactive Application Security Test (IAST)
Continuous Integration/Continuous Delivery (CI/CD)
Security Orchestration, Automation, and Response (SOAR)
Security vulnerabilities
Secure coding
Code repositories
Programming interfaces
Software-defined security
Security of Application Programming Interfaces (APIs)
Venture into a whole new realm of knowledge
Application Process: Your Journey Starts Here
The admissions team will carefully review all elements of your application. The selection process will take up to eight weeks from the date of submission of a completed application.
Step 1
Online application and video interview
Step 2
Pre-selection and decision
Step 3
Interview with acceptance
Step 4
Admission Committee
Step 5
Final decision
Investing In Your Future
Find Out More
Enhance your capabilities with programs specifically designed to fit your goals.
Discover our program offerings
Inquiry?
If you have any questions about our programs or application procedures, we are here to help.
Contact Us