fbpx

Training with Iverson classes

Training is not a commodity – all training centres are not the same. Iverson Associates Sdn Bhd is the most established, the most reputable, and the top professional IT training provider in Malaysia. With a large pool of experienced and certified trainers, state-of-the-art facilities, and well-designed courseware, Iverson offers superior training, a more impactful learning experience and highly effective results.

At Iverson, our focus is on providing high-quality IT training to corporate customers, meeting their learning needs and helping them to achieve their training objectives. Iverson has the flexibility to provide training solutions whether for a single individual or the largest corporation in a well-paced or accelerated training programme.

Our courses continue to evolve along with the fast-changing technological advances. Our instructor-led training services are available on a public and a private (in-company) basis. Some of our courses are also available as online, on demand, and hybrid training.

CISSP : Certified Information Systems Security Professional

Course and Certificate TRAINING AND CERTIFICATION
Please let us know your name.
Please let us know your email address.
Invalid Input
Invalid Input
Invalid Input

Overview

Gain core knowledge and experience to successfully implement and manage security programs in this official (ISC)2 CISSP course

This course is the most comprehensive review of information security concepts and industry best practices, and covers the eight domains of the official CISSP CBK (Common Body of Knowledge). You will gain knowledge in information security that will increase your ability to successfully implement and manage security programs in any organization or government entity. You will learn how to determine who or what may have altered data or system information, potentially affecting the integrity of those asset and match an entity, such as a person or a computer system, with the actions that entity takes against valuable assets, allowing organizations to have a better understanding of the state of their security posture. Policies, concepts, principles, structures, and standards used to establish criteria for the protection of information assets are also covered in this course.

 

This five-day program is comprised of a total of eight domains and includes:

· Official (ISC)2 Guide to the CISSP Common Body of Knowledge® (CBK) (electronic format)

· Official (ISC)2 CISSP Training Handbook

· Official (ISC)2 CISSP Flash Cards

· CISSP Certification Exam Voucher

Audience Profile

This training course is intended for professionals who have at least five years of cumulative, paid work experience in two or more of the eight domains of the (ISC)2 CISSP CBK and are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current information security careers. The training seminar is ideal for those working in positions such as, but not limited to:

  • Security Consultant
  • Security Manager
  • IT Director/Manager
  • Security Auditor
  • Security Architect
  • Security Analyst
  • Security Systems Engineer
  • Chief Information Security Officer
  • Security Director
  • Network Architect

Prerequisities

Professionals with at least five years of experience and who demonstrate a globally recognized level of competence, as defined in the CISSP Common Body of Knowledge (CBK) in two or more of the eight security domains.

At Course Completion

After completing this course, the student will be able to:

• Apply fundamental concepts and methods related to the fields of information technology and security.

• Align overall organizational operational goals with security functions and implementations.

• Determine how to protect assets of the organization as they go through their lifecycle.

• Leverage the concepts, principles, structures, and standards used to design, implement, monitor, and secure operating systems, equipment, networks, applications, and those controls used to enforce various levels of confidentiality, integrity, and availability.

• Apply security design principles to select appropriate mitigations for vulnerabilities present in common information system types and architectures.

• Explain the importance of cryptography and the security services it can provide in today’s digital and information age.

• Evaluate physical security elements relative to information security needs.

• Evaluate the elements that comprise communication and network security relative to information security needs.

• Leverage the concepts and architecture that define the associated technology and implementation systems and protocols at Open Systems Interconnection (OSI) model layers 1–7 to meet information security needs.

• Determine appropriate access control models to meet business security requirements.

• Apply physical and logical access controls to meet information security needs.

• Differentiate between primary methods for designing and validating test and audit strategies that support information security requirements.

• Apply appropriate security controls and countermeasures to optimize an organization’s operational function and capacity.

• Assess information systems risks to an organization’s operational endeavors.

• Determine appropriate controls to mitigate specific threats and vulnerabilities.

• Apply information systems security concepts to mitigate the risk of software and systems vulnerabilities throughout the systems’ lifecycles.

Course Outline

RM9,500.00(+RM760.00 Tax)
* Training Dates:

* Price includes Exam

Course Information
EXAM CODE
CISSP
DURATION
5 Days
CERTIFICATION
Certified Information Systems Security Professional
Schedule

29 Jan 2024 - 2 Feb 2024

4-8 Mar 2024

15-19 Apr 2024

10-14 Jun 2024

22-26 Jul 2024

9-13 Sep 2024

11-15 Nov 2024

PMP, Project Management Professional (PMP), CAPM, Certified Associate in Project Management (CAPM) are registered marks of the Project Management Institute, Inc.

We are using cookies to give you the best experience on our site. By continuing to use our website without changing the settings, you are agreeing to use of cookies.
Ok Decline