CISSP-ISSAP Certification Training
CISSP-ISSAP Certification Training (Architecture) Course – Hands-on
CISSP-ISSAP is a recognized credential recognizing advanced expertise in the area of information security architecture. This official CISSP-ISSAP Certification training – Information System Security Architecture Professional Training (ISSAP) seminar provides students with an in-depth review of information security architectural concepts and industry best practices in the design, deployment and maintenance of an information security program.
This CISSP-ISSAP training course covers the 6 domains of the CISSP-ISSAP CBK (Common Body of Knowledge). Whether a student is hoping to take the CISSP-ISSAP certification exam or learn more about information architecture, this course is packed with study tips and practical information. All that to be said, CISSP-ISSAP is a great resource for those hoping to review and refresh their information security knowledge while also identifying areas they need to study before writing the certification exam.
CISSP-ISSAP Certification Training Course – Customize it
- We can adapt this CISSP-ISSAP Certification Training course to your group’s background and work requirements at little to no added cost.
- If you are familiar with some aspects of this CISSP-ISSAP Certification Training course, we can omit or shorten their discussion.
- We can adjust the emphasis placed on the various topics or build the CISSP-ISSAP Certification Training around the mix of technologies of interest to you (including technologies other than those included in this outline).
- If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the CISSP-ISSAP Certification Training course in manner understandable to lay audiences.
CISSP-ISSAP Certification Training Course – Audience/Target Group
The CISSP-ISSAP Certification training course is a great fit for professionals who currently hold a CISSP certification, with some example job titles including but not limited to:
- System Architect
- Chief Technology Officer
- System and Network Designer
- Business Analyst
- Chief Security Officer
CISSP-ISSAP Certification training Course – Class Prerequisites
The knowledge and skills that a learner must have before attending this CISSP-ISSAP Certification training course are:
- To qualify for the CISSP-ISSAP, you must have at least 2 years of cumulative paid, full-time professional work experience in the area of architecture, maintain your CISSP credential in good standing, and pass the ISSAP examination.
CISSP-ISSAP Certification Training Course – Objectives:
Upon completing this ISSAP Training course, learners will be able to meet these objectives:
- Comprehend Access Control Systems and Methodology
- Learn about Technology Related Disaster Recovery Planning and Business Continuity Planning
- Learn about Communications and Network Security
- Learn Cryptography
- Comprehend Security Architecture Analysis
- Learn about Physical Security Considerations
Information System Security Architecture Professional Training (ISSAP) – Course Content
Domain 1: Access Control Systems and Methodology
Access Control Systems and Methodology is the first domain reviewed in this official CISSP-ISSAP training seminar. It focuses on the critical requirements to establish adequate and effective access controls for an organization.
CISSP-ISSAP Domain 1 Lessons
- Access Control Concepts, Methodologies, and Techniques
- Identity and Access Management Architecture
Domain 2: Communications and Network Security
Domain 2 addresses the security concerns related to the critical role of communications and networks in today’s computing environments. A security architecture professional must understand the risks to communications networks whether they are data, voice or multimedia. This includes understanding of communications processes and protocols, threats and countermeasures, support for organizational growth and operations, and the ability to design, implement and monitor, secure architectures.
CISSP-ISSAP Domain 2 Lessons
- Communications Architecture
- Network Architecture
- Protection of Communications and Networks
- Security Design Considerations and Associated Risks
Domain 3: Cryptography
This Cryptography domain covers cryptographic methodologies and the use of cryptography to protect an organization’s data storage and communications from compromise or misuse. This includes awareness of threats to an organization’s cryptographic infrastructure. Additionally, this domain analyzes the responsibility involved in choosing, implementing and monitoring cryptographic products and adoption of corporate cryptographic standards and policy.
CISSP-ISSAP Domain 3 Lessons
- Identify Requirements
- Determine Usage
- Identify Cryptographic Design Considerations and Constraints
- Define Key Management Lifecycle
- Design Integrated Cryptographic Solutions
Domain 4: Security Architecture Analysis
The Security Architecture Analysis domain covers the best practices and standards for network and information systems design and the implementation of an architecture that will provide adequate security to accomplish the business goals of an enterprise.
CISSP-ISSAP Domain 4 Lessons
- Identify Security Architecture Approach
- Requirement Analysis
- Security Architecture
- Verify and Validate Design
Domain 5: Technology Related BCP and DRP
- BCP = Business Continuity Planning
- DRP = Disaster Recovery Planning
The fourth domain in this official CISSP-ISSAP training seminar is called Technology Related BCP and DRP. It involves the identification of adverse events that could threaten the ability of the organization to continue the normal operations.
CISSP-ISSAP Domain 5 Lessons
- Business Impact Analysis (BIA)
- Security Strategies for Availability and Recovery
- Continuity and Recovery Solution
Domain 6: Physical Security Considerations
Physical Security Considerations is the sixth and final domain of this official CISSP-ISSAP training seminar. Domain 6 recognizes the importance of physical security and personnel controls in a complete information systems security model. The risks and tools used in providing physical security are also identified. This includes secure management, administration, and deployment of physical access controls, whether to prevent, detect or react to suspicious activity.
CISSP-ISSAP Domain 6 Lessons
- Assess Requirements
- Physical Security Products and Systems
- Evaluate Solutions