CISSP-ISSAP Certification Training

Duration: 6 days

Introduction

This course is designed to help Certified Information Systems Security Professional – Information Systems Security Architecture Professional (CISSP-ISSAP) candidates prepare for the (ISC)2 exam.

Our expert instructors will guide you through the six domains of knowledge required of CISSP-ISSAP candidates using concrete, real-world examples to optimize concept understanding. Learn invaluable exam preparation and test-taking techniques as well as learn-and-recall strategies throughout the course.

This course covers all security architectural concepts and knowledge points needed for the ISSAP exam and beyond, and it covers current efforts internationally in the space of enterprise and ontology frameworks.

CISSP-ISSAP Certification Training

Related Courses

After completing this course, attendees will be able to:

  • Security Architecture Analysis
  • Access Control and Methodology
  • Communications and Network Security
  • Cryptography
  • Technology-Related Business Continuity (BCP) and Disaster Recovery (DRP)
  • Physical Security Considerations

ISSAP Domain 4: Security Architecture Analysis

  • Risk analysis, data valuation, business requirements (legal and regulatory)
  • Current architectures
  • Architectural solutions
  • System engineering methodologies
  • Design validation

ISSAP Domain 1: Access Control and Methodology

  • Access control concepts
  • Access control architecture
  • Access control administration
  • Design validation

ISSAP Domain 2: Communications and Network Security

  • Voice and facsimile communications
  • Network architecture
  • Network security
  • Network security design considerations
  • Security configuration development

ISSAP Domain 3: Cryptography

  • Cryptographic principles (applications and methodologies)
  • Key management
  • Public key infrastructure
  • Design validation

ISSAP Domain 5: Technology-Related Business Continuity (BCP) and Disaster Recovery (DRP)

  • Business impact analysis
  • Recovery strategy
  • Plan validation

ISSAP Domain 6: Physical Security Considerations

  • Unauthorized access and facility protection
  • Physical security plans
  • Design validation

Your Name*

Company*

Position*

Your Email*

Phone*

Address*

Number of Participants *

Time Frame*

Subject*

Your Message*