CISSP-ISSAP Certification Prep Course

Duration:

4 Days

Audience:

Employees of federal, state and local governments; and businesses working with the government.

Course Description:

This course is designed for those who hold their CISSP certification and would like to specialize in advanced expertise in information security architecture I for designing security solutions and providing management with risk-based guidance to meet organizational needs.

Gain the skills needed to develop a business continuity plan (BCP) and disaster recovery plan (DRP) for an organization through an understanding of identifying adverse events that could potentially threaten an organization’s ability to thrive.

This course is your one source for exam preparation that includes:

  • Official (ISC)2 Guide to the CISSP-ISSAP Common Body of Knowledge® (CBK)
  • Official (ISC)2 CISSP-ISSAP Training Handbook
  • Official (ISC)2 CISSP-ISSAP Flash Cards
  • CISSP-ISSAP Certification Exam Voucher

What You’ll Learn

In-depth coverage of the six domains required to pass the CISSP-ISSAP exam:

  1. Security Architecture Analysis
  2. Communication and Network Security
  3. Physical Security Considerations
  4. Cryptography
  5. Technology-Related Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)
  6. Access Control Systems and Methodology

Who Needs to Attend

  • Information security professionals who detail the critical requirements to establish adequate and effective access controls, address the security concerns related to the critical role of communications and networks, and are responsible for choosing, implementing and monitoring cryptographic products and adoption of corporate cryptographic standards and policies
  • Individuals pursuing CISSP-ISSAP® certification

Prerequisites

At least two years of recent full-time security professional work experience in one or more of the six domains of the (ISC)2 CISSP-ISSAP Candidate Information Bulletin (CIB)

Course Outline

1. Domain 1: Security Architecture Analysis

  • Approach to Security Architecture
  • Conducting the Requirements Analysis
  • Designing the Security Model
  • Conduct Design Verification and Validation

2. Domain 2: Communication and Network Security

  • The Communication Architecture
  • The Network Architecture
  • Protecting the Communications and Networks
  • Security Design Considerations and Associated Risks

3. Domain 3: Physical Security Considerations

  • Assessing the Physical Security Requirements
  • Integration of Physical Products and Systems
  • Solution Evaluation

4. Domain 4: Cryptography

  • Cryptography Requirements
  • Design Considerations and Constraints
  • Key Management Life Cycle
  • Integrated Solutions
  • Identity System Integration

5. Domain 5: Technology-Related Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)

  • Business Impact Analysis (BIA) Requirements
  • What are the Strategies for Availability and Recovery?
  • Designing the Continuity Recovery Solution

6. Domain 6: Access Control Systems and Methodology

  • Access Control Key Concepts, Methodologies, and Techniques
  • Architecture of Identity and Access Management