(CISSP) Certified Information System Security Professional

(CISSP) Certified Information System Security Professional

Wist je dat….

Vijfhart is verkozen tot opleider van het jaar door Computable

Algemeen

The CISSP is ideal for information security professionals seeking to prove their understanding of cybersecurity strategy and hands-on implementation. It shows you have the advanced knowledge and technical skills to design, develop and manage an organization¿s overall security posture.

The CISSP exam evaluates expertise across eight security domains. (Think of domains as topics you need to master based on your professional experience and education.) Passing the exam proves you have the advanced knowledge and
technical skills to effectively design, implement and manage a best-in-class cybersecurity program.

Doel

  • The goal is to prepare every candidate for the CISSP exam in the folowing domains:
  • 1. Security and Risk Management
  • 2. Asset Security
  • 3. Security Architecture and Engineering
  • 4. Communication and Network Security
  • 5. Identity and Access Management (IAM)
  • 6. Security Assessment and Testing
  • 7. Security Operations
  • 8. Software Development Security

Doelgroep

The CISSP is ideal for experienced security practitioners, managers and executives interested in proving their knowledge across a wide array of security practices and principles, including those in the following positions:

  • Chief Information Security Officer
  • Chief Information Officer
  • Director of Security
  • IT Director/Manager
  • Security Systems Engineer
  • Security Analyst
  • Security Manager
  • Security Auditor
  • Security Architect
  • Security Consultant
  • Network Architect

Voorkennis

Onderstaande voorkennis is vereist:

Understanding Networking Fundamentals of vergelijkbare kennis.

Bijzonderheden

LET OP: Deze CISSP opleiding is exclusief het CISSP examen. Deze kunt u na de opleiding zelf aanvragen.Deze training vindt plaats in de avond van 16:00 tot 20:00 uur.
Persoonlijk advies?

Onderwerpen

  • Security and Risk Management (e.g., Security, Risk, Compliance, Law, Regulations, Business Continuity)
    • Understand and Apply Concepts of Confidentiality, Integrity, and Availability
    • Apply Security Governance Principles
    • Compliance
    • Understand Legal and Regulatory Issues that Pertain to Information Security in a Global Context
    • Develop and Implement Documented Security Policy, Standards, Procedures, and Guidelines
    • Understand Business Continuity Requirements
    • Contribute to Personnel Security Policies
    • Understand and Apply Risk Management Concepts
    • Understand and Apply Threat Modeling
    • Integrate Security Risk Considerations into Acquisitions Strategy and Practice
    • Establish and Manage Security Education, Training, and Awareness
  • Asset Security (Protecting Security of Assets)
    • Classify Information and Supporting Assets
    • Determine and Maintain Ownership
    • Protect Privacy
    • Ensure Appropriate Retention
    • Determine Data Security Controls
    • Establish Handling Requirements
  • Security Engineering (Engineering and Management of Security)
    • Implement and Manage an Engineering Life Cycle Using Security Design Principles
    • Understand Fundamental Concepts of Security Models
    • Select Controls and Countermeasures Based Upon Information Systems Security Standards
    • Understand the Security Capabilities of Information Systems
    • Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements
    • Assess and Mitigate Vulnerabilities in Web-based Systems
    • Assess and Mitigate Vulnerabilities in Mobile Systems
    • Assess and Mitigate Vulnerabilities in Embedded Devices and Cyber-Physical Systems
    • Apply Cryptography
    • Apply Secure Principles to Site and Facility Design
    • Design and Implement Facility Security
  • Communications and Network Security (Designing and Protecting Network Security)
    • Apply Secure Design Principles to Network Architecture
    • Securing Network Components
    • Design and Establish Secure Communication Channels
    • Prevent or Mitigate Network Attacks
  • Identity and Access Management (Controlling Access and Managing Identity)
    • Control Physical and Logical Access to Assets
    • Manage Identification and Authentication of People and Devices
    • Integrate Identity as a Service (IDaaS)
    • Integrate Third-Party Identity Services
    • Implement and Manage Authorization Mechanisms
    • Prevent or Mitigate Access Control Attacks
    • Manage the Identity and Access Provisioning Life Cycle
  • Security Assessment and Testing (Designing, Performing, and Analyzing Security Testing)
    • Design and Validate Assessment and Test Strategies
    • Conduct Security Control Testing
    • Collect Security Process Data
    • Conduct or Facilitate Internal and Third-Party Audits
  • Security Operations (e.g., Foundational Concepts, Investigations, Incident Management, Disaster Recovery)
    • Understand and Support Investigations
    • Understand Requirements for Investigation Types
    • Conduct Logging and Monitoring Activities
    • Secure the Provisioning of Resources through Configuration Management
    • Understand and Apply Foundational Security Operations Concepts
    • Employ Resource Protection Techniques
    • Conduct Incident Response
    • Operate and Maintain Preventative Measures
    • Implement and Support Patch and Vulnerability Management
    • Participate in and Understand Change Management Processes
    • Implement Recovery Strategies
    • Implement Disaster Recovery Processes
    • Test Disaster Recovery Plan
    • Participate in Business Continuity Planning
    • Implement and Manage Physical Security
    • Participate in Personnel Safety
  • Software Development Security (Understanding, Applying, and Enforcing Software Security)
    • Understand and Apply Security in the Software Development Life Cycle
    • Enforce Security Controls in the Development Environment
    • Assess the Effectiveness of Software Security
    • Assess Software Acquisition Security

Planning & Prijs

Pageloader
Alle prijzen zijn excl. BTW.
Meer informatie over incompany of maatwerk
Cursus: (CISSP) Certified Information System Security Professional

Vul onderstaand formulier in en je ontvangt meer informatie over de incompany- en maatwerkmogelijkheden van deze cursus.

[contact-form-7 404 "Not Found"]

Wil je meer informatie ontvangen, een vrijblijvende offerte ontvangen of een brochure van deze cursus downloaden? Vul onderstaande gegevens in en je ontvangt de brochure of informatie binnen één werkdag.


Akkoord met opvolging en privacyvoorwaardenIk ga akkoord met de privacy voorwaarden

Akkoord met opvolging en privacyvoorwaardenIk ga akkoord met de privacy voorwaarden

Akkoord met opvolging en privacyvoorwaardenIk ga akkoord met de privacy voorwaarden

Ervaringen

ervaringen verzameld via Logo Springtest

Lucienne Groenendaal

Secretarieel medewerkster

"Training was prima, goede tips gekregen met af en toe een grap en grol. Locatie was prima, goed verzogd vwb koffie/thee, fruit en koekje. Mensen ook zeer vriendelijk. Lunch was perfect en zeer uitgebreid."

9

Ariana Scheepers

"De cursus was goed, en de verzorging ook!Ik heb er veel van opgestoken! De lokatie in Nieuwegein is goed te bereiken met het openbaar vervoer, dus dat is prettig. Tot een volgenden keer."

10

Eric Pos

Procesbeheerder bij Gemeente Amersfoort

"Ik vond de training erg leerzaam. De inhoud was van een hoog niveau en de docent was goed thuis in de materie. Ik stel het vooral op prijs dat er diep op de concepten werd ingegaan."

9
Tags:
Betalen op later moment
Schrijf je eerst in en betaal later op rekening of met de Groeikaart.
8,3 gemiddeld op Springest
Meer dan 450 cursisten deelden hun ervaring.
Pageloader
De cursus is toegevoegd aan jouw favorieten.

Jouw favorieten kun je bekijken via je profiel (deze vind je in het menu bovenaan de website).

Kunnen wij je helpen?

Laat jouw telefoonnummer of e-mailadres achter en wij nemen binnen 24 uur contact met je op.


Cursus: (CISSP) Certified Information System Security Professional


E-mailadres

Telefoonnummer

Opmerking of vraag


Meer weten

Vul onderstaand formulier in en je ontvangt meer informatie over deze cursus.


Cursus: (CISSP) Certified Information System Security Professional

Wij helpen je graag

Geen tijd om ons gehele aanbod aan cursussen te bekijken? Of heb je een andere vraag? Wij helpen je graag. Vul onderstaande vragen in en we nemen binnen 24 uur contact met je op.

(CISSP) Certified Information System Security Professional







Onderwerpen
Actieve filters: Wis alle filters
Pageloader
PRIVACY VOORWAARDEN

Jouw persoonsgegevens worden opgenomen in onze beschermde database en worden niet aan derden verstrekt. Je stemt hiermee in dat wij jou van onze aanbiedingen op de hoogte houden. In al onze correspondentie zit een afmeldmogelijkheid