You are on page 1of 8

Information Security Strategic Solutions

(ISSS)

CISSP – CLASSROOM BANGALORE


DECEMBER
Information Security Strategic Solutions
(ISSS)

Contents
CISSP.......................................................................................................................3
Trainer......................................................................................................................3
Information Security Strategic Solutions.......................................................................3
About The Workshop..................................................................................................3
Exam and Certification................................................................................................4
Workshop Benefits.....................................................................................................4
Who Should Attend.....................................................................................................5
Workshop Outline.......................................................................................................6
Security and Risk Management (Security, Risk, Compliance, Law, Regulations, and
Business Continuity)................................................................................................6
Asset Security (Protecting Security of Assets).............................................................6
Security Engineering (Engineering and Management of Security)...................................6
Communication and Network Security (Designing and Protecting Network Security).........6
Security Assessment and Testing (Designing, Performing, and Analyzing Security
Testing).................................................................................................................7
Security Operations (Foundational Concepts, Investigations, Incident Management,
and Disaster Recovery)............................................................................................7
Software Development Security (Understanding, Applying, and Enforcing Software
Security)................................................................................................................7
Schedule................................................................................................................8
Delivery Mode.........................................................................................................8
Location.................................................................................................................8
Fee Structure:.........................................................................................................8
CISSP Training.....................................................................................................8
Contact Information:.............................................................................................8
Information Security Strategic Solutions
(ISSS)

CISSP
Certified Information Systems Security Professional (CISSP) is an independent
information security certification governed by the International Information
Systems Security Certification Consortium (ISC2). The CISSP curriculum covers
subject matter in a variety of Information Security topics. The CISSP examination
is based on what ISC2 terms the Common Body of Knowledge (CBK) which is a
collection of topics relevant to information security professionals around the world.
The CISSP CBK establishes a common framework of information security terms and
principles that allow information security professionals worldwide to discuss debate
and resolve matters pertaining to the profession with a common understanding.

Trainer
The training is delivered by Subramaniam. S (Subbu), and he carry an extensive
experience of 20 years on Information Security. He is certified on CISSP, CEH,
ISO27001 LA, Cloud Computing, Prince 2 and ITIL.

He is the trainer and consultant for United Nations Support Base, Valencia, Spain
and Brindisi, Italy, Ministry of Interior, KSA, and The Executive Council, Dubai.

He has delivered more than 150 CISSP trainings across the world. He will be more
than happy to accompany you to your journey towards CISSP certification.

Information Security Strategic Solutions


ISSS has started its mission to engage people in Information Security to Defend
and Prevent the attacks on the cyber security world, by consulting and training.

We are partnered with,

1. EXIN
2. PECB
3. EC council

To spread the skills required to fight cyberattacks in the world.

We are located and operating out of Chennai, India and Dubai, UAE.

About The Workshop


IT infrastructure or technology solutions alone cannot protect an organization's
critical information assets. People are the key to a secure organization. Trained

and certified security professionals provide confidence to business partners and


customers that the organization is serious about information security management.
Information Security Strategic Solutions
(ISSS)

The CISSP certification identifies individuals as security experts who have the
technical ability, understanding and experience to implement effective security
practices. This 4 day workshop will help participants prepare for the CISSP
certification exam from ISC2.

Exam and Certification

The CISSP Examination is conducted by ISC2 in 6 different languages at over 238


locations across Americas, Asia-Pacific, Europe, Middle East, Africa and Japan.
Participants can register online with ISC2 for the certification exam at their
preferred location.

The examination is a 3 hour online consisting of 150 multiple choice questions


requiring a passing score of 70% which is a scaled score of 700 points on a 1000
points score to successfully clear the certification.

Workshop Benefits
Credibility is the key advantage of acquiring the CISSP certification which requires

 Experience - possessing the required number of years experience


 Preparation - understanding the various concepts of the 8 security domains
outlined in the CISSP CBK
 Application - validating education and/or experience
 Examination - appearing and clearing the certification exam
 Code of Ethics - committing to and abiding by principles and guidelines set forth
by (ISC)²
 Endorsement Process - attesting eligibility requirements by an existing
 CISSP

Benefits of CISSP certification to the professional

 Standardized, vendor-neutral, certification program in information security


 Provides structure and demonstrated competence in information security
 Validates commitment and years of experience gained in the industry
Information Security Strategic Solutions
(ISSS)

 Demonstrates comprehensive knowledge and understanding of all aspects of


information security
 Offers a career differentiator, with enhanced credibility and marketability
 Fulfills government and organization requirements for information security
certification mandates
 Benefits of CISSP certification to the enterprise
 Recognized as a global benchmark for information security management
 Provides increased credibility for the organization when bidding for contracts
 Establishes a standard of best practices for information security policies,
standards and guidelines
 First information security credential accredited by ANSI ISO/IEC Standard
17024:2003
 Formally approved by the U.S. Department of Defense (DoD) in the DoDD 8570
certification requirement
 Adopted as a baseline for the U.S. National Security Agency's ISSEP program

Who Should Attend


This workshop is meant for professionals responsible for the security of the
organization’s information systems and assets.

 CEO / CFO / CIO / CTO / CISO


 IS / IT Specialist / Analyst / Manager
 IS / IT Auditor / Consultant
 IS / IT Head / Director
 IT Operations Manager / Head / Director
 IT Compliance Manager / Head / Director
 Security Head / Director
 Security Specialist / Analyst
 Security Manager / Architect
 Security Consultant / Professional
 Security Officer / Engineer
 Security Administrator
 Security Auditor
 Network Specialist / Analyst
 Network Manager / Architect
 Network Consultant / Professional
 Network Administrator
 Senior Systems Engineer
 Systems Analyst
 Systems Administrator

The CISSP certification would immensely benefit those aspiring to make a career in
Information Security Management.

Workshop Outline
Information Security Strategic Solutions
(ISSS)

The CBK® (Common Body of Knowledge) establishes a common framework for


information security management consisting of 8 security domains outlined below
which are covered during our workshop.

Each domain has a set of review questions followed by a mock exam on completion
of the workshop.

Security and Risk Management (Security, Risk,


Compliance, Law, Regulations, and Business
Continuity)
 Confidentiality, integrity, and availability concepts
 Security governance principles
 Compliance
 Legal and regulatory issues
 Professional ethic
 Security policies, standards, procedures and guidelines

Asset Security (Protecting Security of Assets)


 Information and asset classification
 Ownership (e.g. data owners, system owners)
 Protect privacy
 Appropriate retention
 Data security controls
 Handling requirements (e.g. markings, labels, storage)

Security Engineering (Engineering and


Management of Security)
 Engineering processes using secure design principles
 Security models fundamental concepts
 Security evaluation models
 Security capabilities of information systems
 Security architectures, designs, and solution elements vulnerabilities
 Web-based systems vulnerabilities
 Mobile systems vulnerabilities
 Embedded devices and cyber-physical systems vulnerabilities
 Cryptography
 Site and facility design secure principles
 Physical security

Communication and Network Security (Designing


and Protecting Network Security)
 Secure network architecture design (e.g. IP & non-IP protocols, segmentation)
 Secure network components
 Secure communication channels
Information Security Strategic Solutions
(ISSS)

 Network attacks Identity and Access Management (Controlling Access and


Managing Identity)
 Physical and logical assets control
 Identification and authentication of people and devices
 Identity as a service (e.g. cloud identity)
 Third-party identity services (e.g. on-premise)
 Access control attacks
 Identity and access provisioning lifecycle (e.g. provisioning review)

Security Assessment and Testing (Designing,


Performing, and Analyzing Security Testing)
 Assessment and test strategies
 Security process data (e.g. management and operational controls)
 Security control testing
 Test outputs (e.g. automated, manual)
 Security architectures vulnerabilities

Security Operations (Foundational Concepts,


Investigations, Incident Management, and Disaster
Recovery)
 Investigations support and requirements
 Logging and monitoring activities
 Provisioning of resources
 Foundational security operations concepts
 Resource protection techniques
 Incident management
 Preventative measures
 Patch and vulnerability management
 Change management processes
 Recovery strategies
 Disaster recovery processes and plans
 Business continuity planning and exercises
 Physical security
 Personnel safety concerns

Software Development Security (Understanding,


Applying, and Enforcing Software Security)
 Security in the software development lifecycle
 Development environment security controls
 Software security effectiveness
 Acquired software security impact

Schedule
Information Security Strategic Solutions
(ISSS)

th th
14 , 15 , 21st and 22nd December

Delivery Mode
Classroom

Location
Koramangala, Bangalore

Fee Structure:
CISSP Training
Duration: 4 days Classroom
Fee: 22,000 INR

Contact Information:

Subramaniam Sankaran,
subramaniam@isss.co.in
+91 8754480225 (Also on Whatsapp)

Option to Pay by Credit Card is available

You might also like