CISSP-ISSAP Certification Training

Commitment 5 Days, 7-8 hours a day.
Language English
User Ratings Average User Rating 4.8 See what learners said
Price REQUEST
Delivery Options Instructor-Led Onsite, Online, and Classroom Live

COURSE OVERVIEW

CISSP-ISSAP is a recognized credential recognizing advanced expertise in the area of information security architecture. This official CISSP-ISSAP Certification Training  – Information System Security Architecture Professional Training (ISSAP) seminar provides students with an in-depth review of information security architectural concepts and industry best practices in the design, deployment, and maintenance of an information security program.

This CISSP-ISSAP Training course covers the 6 domains of the CISSP-ISSAP CBK (Common Body of Knowledge). Whether a student is hoping to take the CISSP-ISSAP certification exam or learn more about information architecture, this course is packed with study tips and practical information. All that to be said, CISSP-ISSAP is a great resource for those hoping to review and refresh their information security knowledge while also identifying areas they need to study before writing the certification exam.

WHAT'S INCLUDED?
  • 5 days of CISSP-ISSAP Certification Training with an expert instructor
  • CISSP-ISSAP Certification Electronic Course Guide
  • Certificate of Completion
  • 100% Satisfaction Guarantee
RESOURCES
RELATED COURSES

ADDITIONAL INFORMATION

COURSE OBJECTIVES

Upon completing this CISSP-ISSAP Certification Training course, learners will be able to meet these objectives:

  • Create an Information Security Architecture that meets the requirements of governance, compliance, and risk management.
  • Evaluate Security architecture models and frameworks.
  • Develop an infrastructure security program.
  • Produce an identity and access management architecture.
  • Integrate security principles into application development.
  • Design a security operations architecture.
CUSTOMIZE IT
  • We can adapt this CISSP-ISSAP Certification Training course to your group’s background and work requirements at little to no added cost.
  • If you are familiar with some aspects of this CISSP-ISSAP Certification course, we can omit or shorten their discussion.
  • We can adjust the emphasis placed on the various topics or build the CISSP-ISSAP Certification course around the mix of technologies of interest to you (including technologies other than those included in this outline).
  • If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the CISSP-ISSAP Certification Training course in a manner understandable to lay audiences.
AUDIENCE/TARGET GROUP

The target audience for this CISSP-ISSAP Certification Training course:

  • System Architect
  • Chief Technology Officer
  • System and Network Designer
  • Business Analyst
  • Chief Security Officer
CLASS PREREQUISITES

The knowledge and skills that a learner must have before attending this CISSP-ISSAP Certification Training course are:

COURSE SYLLABUS

CISSP-ISSAP Certification Training
Domain 1 – Architect for governance, compliance, and risk management
  • Determine legal, regulatory, organizational, and industry requirements
  • Manage risk
Domain 2 – Security architecture modeling
  • Identify the security architecture approach
  • CISSP-ISSAP Certification Training
  • Verify and validate design (e.g., functional acceptance testing (FAT), regression)
Domain 3 – Infrastructure security architecture
  • Develop infrastructure security requirements
  • Design defense-in-depth architecture
  • Secure shared services (e.g., wireless, e-mail, voice over internet protocol (VoIP), unified communications (UC)
  • Domain name system (DNS), network time protocol NTP))
  • Integrate technical security controls
  • Design and integrate infrastructure monitoring
  • Design infrastructure cryptographic solutions
  • Design secure network and communication infrastructure (e.g., a virtual private network (VPN), internet protocol security (IPsec), transport layer security (TLS))
  • Evaluate physical and environmental security requirements
Domain 4 – Identity and access management (IAM) architecture
  • Design identity management and lifecycle
  • Design access control management and lifecycle
  • Design identity and access solutions
Domain 5 – Architect for application security
  • Integrate software development life cycle (SDLC) with application security architecture (e.g., requirements traceability matrix (RTM), security architecture documentation, secure coding)
  • Determine application security capability requirements and strategy (e.g., open source, cloud service providers (CSP), software as a service (SaaS)/infrastructure as a service (IaaS)/platform as a service (PaaS) environments)
  • Identify common proactive controls for applications (e.g., Open Web Application Security Project (OWASP))
Domain 6 – Security operations architecture
  • Gather security operations requirements (e.g., legal, compliance, organizational, and business requirements)
  • Design information security monitoring (e.g., security information and event management (SIEM), insider threat, threat intelligence, user behavior analytics, incident response (IR) procedures)
  • Design business continuity (BC) and resiliency solutions
  • Validate business continuity plan (BCP)/disaster recovery plan (DRP) architecture
  • Design incident response (IR) management
CISSP-ISSAP Certification TrainingCISSP-ISSAP Certification Training Course Recap, Q/A, and Evaluations

REQUEST MORE INFORMATION