A Quick Glance

  • black-arrow

    Pass the CISSP exam

  • black-arrow

    Gain vital cybersecurity skills

  • black-arrow

    Implement and manage security programs

  • black-arrow

    Prove your security expertise and knowledge

Modern businesses require proven security professionals to help them defend against threats to their data and systems. CISSP (Certified Information Systems Security Professional)-certified professionals have vast knowledge and expertise to design, implement and manage IT security systems.

Our CISSP training is designed to help learners prepare for the CISSP exam, providing a full understanding of the 8 domains of the CISSP CBK which the exam assesses and ensuring delegates are ready to pass confidently.

Who should take this course

  • Security Consultants
  • Security Managers
  • Security Analysts
  • IT Managers
  • Security Directors
  • Network Architects
  • Security Auditors
  • Security Architects
  • Security Systems Engineers
  • Chief Information Security Officers
More

Prerequisites

There are no requirements for this course, but  4-5 years of experience in at least 2 of the 8 CBK domains is required for full CISSP certification.

More

What Will You Learn

  • Prepare for the CISSP exam
  • Understand the 8 domains of the CISSP CBK
  • Understand what is expected of a cybersecurity professional
  • Learn the fundamentals of security management
More

What's included

  Course Overview

Over 5 days, our expert instructors will go through each of the 8 CISSP CBK domains using a theory-based approach teaching all the concepts, tools and knowledge required for the modern cybersecurity professional to do their job effectively, all with the aim of passing the exam and achieving this highly sought-after certification.

More

  Course Content

Security and Risk Management

  • Confidentiality, Integrity, and Availability Concepts
  • Security Governance Principles
  • Compliance
  • Legal and Regulatory Issues
  • Professional Ethics
  • Security Policies, Standards, Procedures, and Guidelines

Asset Security

  • Information and Asset Classification
  • Ownership
  • Protect Privacy
  • Appropriate Retention
  • Data Security Controls
  • Handling Requirements

Security Architecture and Engineering

  • Engineering Processes using Secure Design Principles
  • Security Models Fundamental Concepts
  • Security Evaluation Models
  • Security Capabilities of Information Systems
  • Security Architectures, Designs, and Solution Elements Vulnerabilities
  • Web-based Systems Vulnerabilities
  • Mobile Systems Vulnerabilities
  • Embedded Devices and Cyber-Physical Systems Vulnerabilities
  • Cryptography
  • Site and Facility Design Secure Principles
  • Physical Security

Communication and Network Security

  • Secure Network Architecture Design
  • Secure Network Components
  • Secure Communication Channels
  • Network Attacks

Identity and Access Management (IAM)

  • Physical and Logical Assets Control
  • Identification and Authentication of People and Devices
  • Identity as a Service
  • Third-party Identity Services
  • Access Control Attacks
  • Identity and Access Provisioning Lifecycle

Security Assessment and Testing

  • Assessment and Test Strategies
  • Security Process Data
  • Security Control Testing
  • Test Outputs
  • Security Architectures Vulnerabilities

Security Operations

  • Investigations Support and Requirements
  • Logging and Monitoring Activities
  • Provisioning of Resources
  • Foundational Security Operations Concepts
  • Resource Protection Techniques
  • Incident Management
  • Preventative Measures
  • Patch and Vulnerability Management
  • Change Management Processes
  • Recovery Strategies
  • Disaster Recovery Processes and Plans
  • Business Continuity Planning and Exercises
  • Physical Security
  • Personnel Safety Concerns

Software Development Security

  • Security in the Software Development Lifecycle
  • Development Environment Security Controls
  • Software Security Effectiveness
  • Acquired Software Security Impact
More

CISSP

What is CISSP?

CISSP is a globally approved cybersecurity qualification designed for experienced cybersecurity practitioners.

In 1988, it was recognised that a standardised cybersecurity body which provided certification for the industry was required. In 1989, ISC (International Information Security Certification Consortium) was established, with its first certification, CISSP, being launched in 1994.

CISSP takes as its basis the CBK (Common Body of Knowledge), a collection of skills, practices and techniques which any cyber expert should know in order to do their job effectively.

Our CISSP training provides delegates with the knowledge they need to prepare for the CISSP exam, including a strong understanding of the 8 CISSP domains.



CISSP Certified Information Systems Security Professional Enquiry

 

Enquire Now


----- OR -------

Reach us at +44 1344 961530 or info@pentagonit.co.uk for more information.

About Manchester

Manchester (fortified town) is a city in Greater Manchester, England, with a population of 530,300 (in 2015). It lies within the United Kingdom's second most populous urban area, with a population of 2.55 million. Manchester is bordered by the Cheshire Plain to the south, the Pennines to the north and east. The local authority is Manchester City Council.

Manchester began with the civilian settlement associated with the Roman fort of Mamucium or Mancunium in about AD 79. It is aid to have been located on a sandstone bluff near the confluence of the rivers Medlock and Irwell. Historically a part of Lancashire, areas of Cheshire south of the River Mersey were incorporated in the 20th century. Throughout the Middle Ages Manchester remained a manorial township. It  began to expand "at an astonishing rate" only around the turn of the 19th century. Manchester's unplanned urbanisation came due  to a boom in textile manufacture . This  and resulted in Manchester becoming the world's first industrialised city.

Manchester achieved city status in 1853. The Manchester Ship Canal opened in 1894, creating the Port of Manchester and linking the place to the sea, 36 miles (58 km) to the west. Its fortunes declined after the Second World War, but the IRA bombing in 1996 led to extensive investment and regeneration.

In 2014, Manchester was ranked as a beta world city, the highest-ranked British city apart from London.

Economy

The economy grew relatively strongly between 2002 and 2012, where growth was 2.3% above the national average. With a GDP of $88.3bn (2012 est., PPP) the wider urban economy is the third-largest in the United Kingdom. In 2012 it showed  the strongest annual growth in business stock (5%) of all the Core Cities.

Landmarks

Manchester's buildings display a variety of architectural styles, ranging from Victorian to contemporary architecture. Manchester is home to a  number of skyscraperswith the tallest being the Beetham Tower was completed in 2006. Outside London it has been described as the United Kingdom's only real skyscraper outside the capital. The award-winning Heaton Park  is one of the largest municipal parks in Europe. The city has 135 parks, gardens, and open spaces.

Two large squares hold many of Manchester's public monuments. Albert Square and the Picaddily Gardens have monuments to various prominent personalities. 

Sport

Manchester is well known for being a city of sport. Two decorated Premier League football clubs bear the city name – Manchester United and Manchester City. Manchester United plays its home games at Old Trafford. Manchester City's home ground is the City of Manchester Stadium . The City of Manchester Stadium was initially built as the main athletics stadium for the 2002 Commonwealth Games. It was subsequently reconfigured into a football stadium before Manchester City's arrival. Manchester has hosted football competitions at  all levels at the Fallowfield Stadium. The City of Manchester Stadium has also seen many international games being played. The city has hosted almost all the major football competions.

 

More