CISSP-ISSAP Certification Prep Course

Networking/Server/Operating Systems
Schedules
Delivery Type (Must Select One)
  Instructor-Led
  Online Live Instructor-Led
Optional
  IT Online Library (1 Year Subscription - $1595.00)
Quantity
If quantity is more than 1, Please add all Attendees' Names /Voucher #/ Learning Credit below separated with a comma. If not specified, we will contact you prior to the class start date. Special Instructions

COURSE OVERVIEW

This course is designed for those who hold their CISSP certification and would like to specialize in advanced expertise in information security architecture I for designing security solutions and providing management with risk-based guidance to meet organizational needs.

Gain the skills needed to develop a business continuity plan (BCP) and disaster recovery plan (DRP) for an organization through an understanding of identifying adverse events that could potentially threaten an organization's ability to thrive.

This course is your one source for exam preparation that includes:

  • Official (ISC)2 CISSP-ISSAP Training Handbook
  • Official (ISC)2 CISSP-ISSAP Flash Cards
  • CISSP-ISSAP Certification Exam Voucher

WHAT YOU'LL LEARN

In-depth coverage of the six domains required to pass the CISSP-ISSAP exam:

  1. Security Architecture Analysis
  2. Communication and Network Security
  3. Physical Security Considerations
  4. Cryptography
  5. Technology-Related Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)
  6. Access Control Systems and Methodology

OUTLINE

Viewing outline for: 
Virtual Classroom Live

Virtual Classroom Live Outline

1. Domain 1: Security Architecture Analysis

  • Approach to Security Architecture
  • Conducting the Requirements Analysis
  • Designing the Security Model
  • Conduct Design Verification and Validation

2. Domain 2: Communication and Network Security

  • The Communication Architecture
  • The Network Architecture
  • Protecting the Communications and Networks
  • Security Design Considerations and Associated Risks

3. Domain 3: Physical Security Considerations

  • Assessing the Physical Security Requirements
  • Integration of Physical Products and Systems
  • Solution Evaluation

4. Domain 4: Cryptography

  • Cryptography Requirements
  • Design Considerations and Constraints
  • Key Management Life Cycle
  • Integrated Solutions
  • Identity System Integration

5. Domain 5: Technology-Related Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)

  • Business Impact Analysis (BIA) Requirements
  • What are the Strategies for Availability and Recovery?
  • Designing the Continuity Recovery Solution

6. Domain 6: Access Control Systems and Methodology

  • Access Control Key Concepts, Methodologies, and Techniques
  • Architecture of Identity and Access Management