Training CISSP Exam Preparation

COURSE DESCRIPTION Training CISSP Exam Preparation

CISSP® certification is a globally recognized standard of achievement that confirms an individual’s knowledge in the field of information security. CISSPs are information assurance professionals who define the architecture, design, management and/or controls that assure the security of business environments. It was the first certification in the field of information security to meet the stringent requirements of ISO/IEC Standard 17024.

This comprehensive course also prepares the participants for the Certified Information Systems Security Professional (CISSP®) examination, owned and maintained by the International Information Systems Security Certification Consortium (ISC). Successful completion of this program requires the participants to complete all required assignments and self-study.



After completing this course, participants will be able to:

  • Prepare to take CISSP® exam
  • Get familiar with CISSP® domains
  • Understand key aspects of Security Policy development and Security Management Practices
  • Define the architecture, design, management and controls that assure the security of business environments
  • Understand techniques for committing key facts and figures to memory for test preparation
  • Critical test-taking tips and study techniques for the CISSP® exam




This course will significantly benefit Security Consultant, Security Analyst, Security Manager, Security Systems Engineer, IT Director/Manager, Chief Information Security Officer, Security Auditor, Director of Security, Security Architect and Network Architect


Five (5) Days



Participants must have some knowledge and experience in networking technologies and information system security.



Module 1: Introduction to CISSP

  • Becoming a CISSP
  • The CISSP Exam

Module 2: Information Security Governance and Risk Management

  • Fundamental Principles of Security
  • Security Frameworks
  • Security Management
  • Risk Management
  • Risk Assessment and Analysis
  • Layers of Responsibility
  • Security Steering Committee

Module 3: Access Control

  • Access Control Overview
  • Security Principles
  • Identification, Authentication, Authorization, and Accountability
  • Access Control Models, Techniques and Technologies, and Administration
  • Access Control Methods
  • Accountability
  • Access Control Practices and Monitoring
  • Threats to Access Control

Module 4: Security Architecture and Design

  • Computer Security
  • System Architecture
  • Computer Architecture
  • Operating System Architectures
  • System Security Architecture
  • Security Models
  • Security Modes of Operation
  • Systems Evaluation Methods
  • Information Technology Security

Module 5: Physical and Environmental Security

  • Introduction to Physical Security
  • The Planning Process
  • Protecting Assets
  • Internal Support Systems
  • Perimeter Security

Module 6: Telecommunications and Network Security

  • Telecommunications
  • Open Systems Interconnection Reference Model
  • TCP/IP Model
  • Types of Transmission
  • Cabling
  • Networking Foundations
  • Networking Devices
  • Wide Area Networks
  • Remote Connectivity
  • Wireless Technologies

Module 7: Cryptography

  • Cryptography Definitions and Concepts
  • Types of Ciphers
  • Methods of Encryption
  • Types of Symmetric Systems
  • Types of Asymmetric Systems
  • Message Integrity
  • Public Key Infrastructure
  • Key Management
  • Attacks

Module 8: Business Continuity and Disaster Recovery Planning

  • Business Continuity and Disaster Recovery
  • BCP Project Components
  • Recovery Strategies
  • Insurance
  • Recovery and Restoration
  • Testing and Revising the Plan

Module 9: Legal, Regulations, Investigations, and Compliance

  • Complexities in Cybercrime
  • Intellectual Property Laws
  • Privacy
  • Liability and Its Ramifications
  • Compliance
  • Investigations
  • Ethics

Module 10: Software Development Security

  • Where do we place Security?
  • System Development Life Cycle
  • Software Development Life Cycle
  • Software Development Models
  • Capability Maturity Model Integration
  • Change Control
  • Programming Languages and Concepts
  • Distributed Computing
  • Mobile Code
  • Web Security
  • Database Management
  • Malicious Software (Malware)

Module 11: Security Operations

  • The Role of the Operations Department
  • Administrative Management
  • Operational Responsibilities
  • Configuration Management
  • Media Controls
  • Data Leakage
  • Network and Resource Availability
  • Mainframes
  • E-mail Security
  • Vulnerability Testing

Module 12: Simulation Test

Kami dapat menyelenggarakan Public Training ataupun inhouse Training CISSP Exam Preparation di seluruh wilayah indonesia. Untuk mendapatkan info training CISSP Exam Preparation serta mendaftarkan diri anda mengikuti training CISSP Exam Preparation yang akan kami selenggarakan, anda dapat mengirim surel di email kami atau anda dapat pula mengisi formulir pra registrasi yang tersedia dibawah ini. 

Form Request Training
  1. Isi Data Berikut ( Tidak Mengikat )
  2. (required)
  3. (valid email required)
  4. (required)
  5. (required)
  6. (required)
  7. (required)
  8. (required)
  9. (required)

WhatsApp WhatsApp kami