CISSP-ISSAP Certification Training
Commitment | 5 Days, 7-8 hours a day. |
Language | English |
User Ratings | Average User Rating 4.8 See what learners said |
Price | REQUEST |
Delivery Options | Instructor-Led Onsite, Online, and Classroom Live |
COURSE OVERVIEW
CISSP-ISSAP is a recognized credential recognizing advanced expertise in the area of information security architecture. This official CISSP-ISSAP Certification Training – Information System Security Architecture Professional Training (ISSAP) seminar provides students with an in-depth review of information security architectural concepts and industry best practices in the design, deployment, and maintenance of an information security program.
This CISSP-ISSAP Training course covers the 6 domains of the CISSP-ISSAP CBK (Common Body of Knowledge). Whether a student is hoping to take the CISSP-ISSAP certification exam or learn more about information architecture, this course is packed with study tips and practical information. All that to be said, CISSP-ISSAP is a great resource for those hoping to review and refresh their information security knowledge while also identifying areas they need to study before writing the certification exam.
WHAT'S INCLUDED?
- 5 days of CISSP-ISSAP Certification Training with an expert instructor
- CISSP-ISSAP Certification Electronic Course Guide
- Certificate of Completion
- 100% Satisfaction Guarantee
RESOURCES
- CISSP-ISSAP Certification – https://www.wiley.com/
- CISSP-ISSAP Certification Training – https://www.packtpub.com/
- CISSP-ISSAP Certification – https://store.logicaloperations.com/
- CISSP-ISSAP Certification – https://us.artechhouse.com/
- CISSP-ISSAP Certification Training – https://www.amazon.com/
RELATED COURSES
ADDITIONAL INFORMATION
COURSE OBJECTIVES
Upon completing this CISSP-ISSAP Certification Training course, learners will be able to meet these objectives:
- Create an Information Security Architecture that meets the requirements of governance, compliance, and risk management.
- Evaluate Security architecture models and frameworks.
- Develop an infrastructure security program.
- Produce an identity and access management architecture.
- Integrate security principles into application development.
- Design a security operations architecture.
CUSTOMIZE IT
- We can adapt this CISSP-ISSAP Certification Training course to your group’s background and work requirements at little to no added cost.
- If you are familiar with some aspects of this CISSP-ISSAP Certification course, we can omit or shorten their discussion.
- We can adjust the emphasis placed on the various topics or build the CISSP-ISSAP Certification course around the mix of technologies of interest to you (including technologies other than those included in this outline).
- If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the CISSP-ISSAP Certification Training course in a manner understandable to lay audiences.
AUDIENCE/TARGET GROUP
The target audience for this CISSP-ISSAP Certification Training course:
- System Architect
- Chief Technology Officer
- System and Network Designer
- Business Analyst
- Chief Security Officer
CLASS PREREQUISITES
The knowledge and skills that a learner must have before attending this CISSP-ISSAP Certification Training course are:
COURSE SYLLABUS
CISSP-ISSAP Certification Training
Domain 1 – Architect for governance, compliance, and risk management
- Determine legal, regulatory, organizational, and industry requirements
- Manage risk
Domain 2 – Security architecture modeling
- Identify the security architecture approach
- CISSP-ISSAP Certification Training
- Verify and validate design (e.g., functional acceptance testing (FAT), regression)
Domain 3 – Infrastructure security architecture
- Develop infrastructure security requirements
- Design defense-in-depth architecture
- Secure shared services (e.g., wireless, e-mail, voice over internet protocol (VoIP), unified communications (UC)
- Domain name system (DNS), network time protocol NTP))
- Integrate technical security controls
- Design and integrate infrastructure monitoring
- Design infrastructure cryptographic solutions
- Design secure network and communication infrastructure (e.g., a virtual private network (VPN), internet protocol security (IPsec), transport layer security (TLS))
- Evaluate physical and environmental security requirements
Domain 4 – Identity and access management (IAM) architecture
- Design identity management and lifecycle
- Design access control management and lifecycle
- Design identity and access solutions
Domain 5 – Architect for application security
- Integrate software development life cycle (SDLC) with application security architecture (e.g., requirements traceability matrix (RTM), security architecture documentation, secure coding)
- Determine application security capability requirements and strategy (e.g., open source, cloud service providers (CSP), software as a service (SaaS)/infrastructure as a service (IaaS)/platform as a service (PaaS) environments)
- Identify common proactive controls for applications (e.g., Open Web Application Security Project (OWASP))
Domain 6 – Security operations architecture
- Gather security operations requirements (e.g., legal, compliance, organizational, and business requirements)
- Design information security monitoring (e.g., security information and event management (SIEM), insider threat, threat intelligence, user behavior analytics, incident response (IR) procedures)
- Design business continuity (BC) and resiliency solutions
- Validate business continuity plan (BCP)/disaster recovery plan (DRP) architecture
- Design incident response (IR) management