Consult our trainings :
> formation Technologies numériques > formation Cybersécurité > formation Synthèses et référentiels ISO, CISSP... > formation CISSP, sécurité des SI, préparation à la certification
CISSP, sécurité des SI, préparation à la certification Training
Stage pratique
Best
Duration : 5 days
Ref : CIS
Price 2020 :
3320 €
excl. taxes
Free breaks and lunches
- Program
- Participants / Prerequisite
- Intra/Tailored
Program
This training details security concepts for obtaining CISSP certification. It will prepare you to take the exam by covering the entire Common Body of Knowledge (CBK), the shared core security knowledge defined by the International Information Systems Security Certification Consortium (ISC)².
Certification
To take the certification exam, you must register on the ISC2 website and submit an eligibility packet.
PROGRAM
IS security and the (ISC)²'s CBK
- Information system security.
- The why of CISSP certification.
- Overview of the scope covered by the CBK.
Security management and operations security.
- Security management practices. Writing policies, directives, procedures, and standards for security.
- The security awareness program, management practices, risk management, etc.
- Operations security: Preventive, detective, and corrective measures, roles and responsibilities of those involved.
- Best practices, security when hiring, etc.
Architecture, security models, and access control
- Architecture and security models: System architecture, theoretical informational security models.
- System evaluation methods, operational security modes, etc.
- Access control systems and methodologies. Categories and types of access controls.
- Access to data and systems, intrusion prevention systems (IPS) and intrusion detection systems (IDS).
- Audit trails, threats and attacks related to access control, etc.
Cryptography and development security
- Cryptography. Concepts, symmetrical and asymmetrical cryptography.
- Hash functions, public key infrastructure, etc.
- Security of application and system developments. Databases, data warehouses.
- The development cycle, object-oriented programming, expert systems, artificial intelligence, etc.
Telecom and network security
- Telecom and network security. Basic concepts, TCP/IP model, network and security equipment.
- Security protocols, attacks on networks, data backups, wireless technologies, VPNs, etc.
Continuity of business, laws, ethics, and physical security.
- Continuity of operations and disaster recovery plan.
- Business continuity plan, disaster recovery plan.
- Emergency measures, training and awareness program, crisis communications, exercises and tests, etc.
- Law, investigations, and ethics: Civil, criminal, and administrative law, intellectual property.
- Legal framework of investigations, evidence admissibility rules, etc.
- Physical security. Threats and vulnerabilities related to the environment of a place, scope of security.
- Layout requirements, site monitoring, staff protection, etc.
Participants / Prerequisite
» Participants
IS security manager or any other person who plays a role in IS security policy.
» Prerequisite
Basic knowledge of networks and operating systems as well as information security. Basic knowledge of auditing and business continuity standards.
Intra/Tailored
Book your place
Click on a session for reserving.
Time schedule
Generally, courses take place from 9:00 to 12:30 and from 14:00 to 17:30.
However, on the first day attendees are welcomed from 8:45, and there is a presentation of the session between 9:15 and 9:30.
The course itself begins at 9:30. For the 4- or 5-day hands-on courses, the sessions finish at 15:30 on the last day










