ISSAP Certification Training | Information System Security Architecture Professional Training

ISSAP Certification Training | Information System Security Architecture Professional Training

Course Delivery

This Course is available in the following format:

Request this course in a different delivery format

GSA Schedule 70 Saving for Government Customers

Course Overview:

ISSAP Certification Training | Information System Security Architecture Professional Training – Hands-on

Learn about information systems security architecture in this official (ISC)2 ISSAP Certification Training | Information System Security Architecture Professional Training course.

CISSP-ISSAP is a recognized credential recognizing advanced expertise in the area of information security architecture. This official ISSAP Certification Training | Information System Security Architecture Professional Training seminar provides students with a comprehensive review of information security concepts and industry best practices, mainly focusing on designing security solutions and providing management with risk-based guidance to meet organizational needs.

This ISSAP Certification Training | Information System Security Architecture Professional Training course is designed for those who hold their CISSP certification and would like to specialize in advanced expertise in information security architecture I for designing security solutions and providing management with risk-based guidance to meet organizational needs.

Gain the skills needed to develop a business continuity plan (BCP) and disaster recovery plan (DRP) for an organization through an understanding of identifying adverse events that could potentially threaten an organization’s ability to thrive.

ISSAP Certification Training | Information System Security Architecture Professional Training – Related Courses

CISA Training | Certified Information Systems Auditor Training
CISM Training | Certified Information Security Manager Training
CISSP Training | Certified Information Systems Security Professional Training
CompTIA Cybersecurity Analyst+ Training | CSA+ Certification Training

ISSAP Certification Training | Information System Security Architecture Professional Training – Customize It:

• If you are familiar with some aspects of this ISSAP Certification Training | ISSAP Training course, we can omit or shorten their discussion.
• We can adjust the emphasis placed on the various topics or build the ISSAP Certification Training | ISSAP Training course around the mix of technologies of interest to you (including technologies other than those included in this outline).
• If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the ISSAP Certification Training | ISSAP Training course in manner understandable to lay audiences.

ISSAP Certification Training | Information System Security Architecture Professional Training – Audience / Target Group:

The target audience for this ISSAP Certification Training | ISSAP Training course:

• Information security professionals who detail the critical requirements to establish adequate and effective access controls, address the security concerns related to the critical role of communications and networks, and are responsible for choosing, implementing and monitoring cryptographic products and adoption of corporate cryptographic standards and policies
• Individuals pursuing CISSP-ISSAP® certification

ISSAP Certification Training | Information System Security Architecture Professional Training – What You Will Learn:

Upon completing this ISSAP Certification Training | Information System Security Architecture Professional Training course, learners will be able to meet these objectives:

In-depth coverage of the six domains required to pass the CISSP-ISSAP exam:

1.Security Architecture Analysis
2.Communication and Network Security
3.Physical Security Considerations
4.Cryptography
5.Technology-Related Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)
6.Access Control Systems and Methodology

ISSAP Certification Training | Information System Security Architecture Professional Training – Course Syllabus:

Domain 1: Security Architecture Analysis

The Security Architecture Analysis domain covers the best practices and standards for network and information systems design and the implementation of an architecture that will provide adequate security to accomplish the business goals of an enterprise.

CISSP-ISSAP Domain 1 Lessons

• Approach to Security Architecture
• Conducting the Requirements Analysis
• Designing the Security Model
• Conduct Design Verification and Validation

Domain 2: Communication and Network Security

Domain 2 addresses the security concerns related to the critical role of communications and networks in today’s computing environments. A security architecture professional must understand the risks to communications networks whether they are data, voice or multimedia. This includes understanding of communications processes and protocols, threats and countermeasures, support for organizational growth and operations, and the ability to design, implement and monitor, secure architectures.

CISSP-ISSAP Domain 2 Lessons

• The Communication Architecture
• The Network Architecture
• Protecting the Communications and Networks
• Security Design Considerations and Associated Risks

Domain 3: Physical Security Considerations

Physical Security Considerations is the sixth and final domain of this official CISSP-ISSAP training seminar. Domain 6 recognizes the importance of physical security and personnel controls in a complete information systems security model. The risks and tools used in providing physical security are also identified. This includes secure management, administration, and deployment of physical access controls, whether to prevent, detect or react to suspicious activity.

CISSP-ISSAP Domain 3 Lessons

• Assessing the Physical Security Requirements
• Integration of Physical Products and Systems
• Solution Evaluation

Domain 4: Cryptography

This Cryptography domain covers cryptographic methodologies and the use of cryptography to protect an organization’s data storage and communications from compromise or misuse. This includes awareness of threats to an organization’s cryptographic infrastructure. Additionally, this domain analyzes the responsibility involved in choosing, implementing and monitoring cryptographic products and adoption of corporate cryptographic standards and policy.

CISSP-ISSAP Domain 4 Lessons

• Cryptography Requirements
• Design Considerations and Constraints
• Key Management Life Cycle
• Integrated Solutions
• Identity System Integration

Domain 5: Technology-Related Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)

BCP = Business Continuity Planning
DRP = Disaster Recovery Planning

The fifth domain in this official CISSP-ISSAP training seminar is called Technology Related BCP and DRP. It involves the identification of adverse events that could threaten the ability of the organization to continue the normal operations.

CISSP-ISSAP Domain 5 Lessons

• Business Impact Analysis (BIA) Requirements
• What are the Strategies for Availability and Recovery?
• Designing the Continuity Recovery Solution

6. Domain 6: Access Control Systems and Methodology

Access Control Systems and Methodology is the first domain reviewed in this official CISSP-ISSAP training seminar. It focuses on the critical requirements to establish adequate and effective access controls for an organization.

CISSP-ISSAP Domain 6 Lessons

• Access Control Key Concepts, Methodologies, and Techniques
• Architecture of Identity and Access Management

Additional ISSAP Information:

What’s Included?

• Comprehensive Study and Reference Materials
• Pre-Class Mentoring
• Practice Questions

Why Choose ENO ISSAP Training?

• ENO’s instructors live and breathe the ISSAP process
• Our ISSAP Training course materials are engaging, and reinforce concepts and exam objectives that are critical to your success
• Our ISSAP Training courses are all-inclusive events, in which the training, meals and hotel are all conveniently integrated into one package, allowing you to focus on your learning and certification objectives.

Whether you are looking for general information or have a specific question, we want to help!

Request More Information

Print Friendly, PDF & Email