Master the essential cybersecurity skills with our 5-day customized CISSP certification preparation.
Duration: 5 days
Become a cybersecurity expert with our most comprehensive CISSP training course!
Optimize your chances of obtaining CISSP certification with our intensive 5-day training course delivered by an experienced and recognized trainer.
Take advantage of our expertise to acquire the knowledge and skills needed by any future Information Systems Security Manager (ISSM).
We offer you the choice between online sessions via our dedicated platform or face-to-face in-company sessions for maximum flexibility.
Don’t hesitate to contact us for a personalized offer!
Training program
IS security and the (ISC)² CBK
- Information systems security.
- Why CISSP certification?
- Presentation of the scope covered by the CBK.
Safety management and operational safety
- Safety management practices.
Drafting of safety policies, directives, procedures and standards. - Safety awareness program, management practices, risk management, etc.
- Operational safety: preventive, detective and corrective measures, roles and responsibilities of those involved.
- Best practices, safety when hiring staff, etc.
Architecture, security models and access control
- Security architecture and models: system architecture, theoretical models of information security.
- Methods for evaluating systems, operational safety modes, etc.
- Access control systems and methodologies.
- Access control categories and types.
- Data and system access, intrusion prevention systems (IPS) and intrusion detection systems (IDS).
- Audit logs, threats and attacks related to access control, etc.
Cryptography and development security
- Cryptography.
Concepts, symmetrical and asymmetrical cryptography. - Hash functions, public key infrastructure, etc.
- Application and system development security.
Databases and data warehouses. - The development cycle, object-oriented programming, expert systems, artificial intelligence, etc.
Telecom and network security
- Network and telecom security.
Basic concepts, TCP/IP model, network and security equipment. - Security protocols, network attacks, data backup, wireless technologies, VPN…
Business continuity, law, ethics and physical security
Business continuity and disaster recovery.
- Business continuity plan, disaster recovery plan.
- Emergency measures, training and awareness programs, crisis communication, drills and tests.
- Law, investigations and ethics: civil, criminal and administrative law, intellectual property.
- The legal framework for investigations, rules governing the admissibility of evidence, etc.
- Physical security.
Threats and vulnerabilities linked to a site’s environment, security perimeter. - Requirements for layout, surveillance, personnel protection, etc.