Certified Information Systems Security Professional – CISSP
5 Day Instructor Led Course – 35 Contact Hours
Corporate Venue: Onsite or at NLP Tech for MA
Computer Labs: 1 PC for each student
Exams: Prometric & VUE exams available (fees excluded)
Certified Information Systems Security Professional (CISSP) is an independent information security certification governed by the not-for-profit International Information Systems Security Certification Consortium, commonly known as (ISC)Â². As of July 20, 2010, (ISC)Â² reports 67,744 members who hold the CISSP certification in 134 countries. In June, 2004, the CISSP was the first information security credential accredited by ANSI ISO/IEC Standard 17024:2003 accreditation, and, as such, has led industry acceptance of this global standard and its requirements. It is formally approved by the U.S. Department of Defense (DoD) in both their Information Assurance Technical (IAT) and Managerial (IAM) categories. The CISSP has been adopted as a baseline for the U.S. National Security Agency’s ISSEP program.
The CISSP is appropriate for the mid- and senior-level managers who are working toward or have already attained positions as CISOs, CSOs or Senior Security Engineers, etc.
CISSPÂ® – Professional Experience Requirement:
Candidates must possess a minimum of five years of direct full-time security work experience in two or more of these 10 domains of the (ISC)Â² CISSP CBKÂ®: Access Control / Application Security / Business Continuity and Disaster Recovery Planning
Cryptography / Information security Governance and Risk Management / Legal, regulations, Investigations and Compliance / Operations Security / Physical and environmental Security / Security Architecture and Design / Telecommunications and Network Security
Note: Effective January 1st 2012, professional work experience requirements for the CISSP will remain five years, but the domains will change.
1. Access Control
2. Application Security
3. Plans for Disaster Recovery and Continuity of Business Continuity
5. Risk Management and Governance of Information security
6. Legal, regulations, Investigations and Compliance
7. Operations Security
8. Environmental and Physical Security
9. Architecture and Design for Security
10. Telecommunications and Network Security