CISSP Training Live Workshop

 

🗓️ Start Date: 28th April 2024
🔁 Reoccurring: Every Sunday
⏳ Duration: 20 hours (10 Sessions)
⏱️ Session Duration: 2 hours


Program Approach:

Welcome to our live, immersive Certified Information Systems Security Professional (CISSP) workshop! This hands-on workshop offers a comprehensive, in-depth exploration of the knowledge required to expertly design, engineer, and manage the security posture of an organization. Designed to prepare you for the CISSP exam, this workshop will provide you with a vibrant platform to review, refresh your knowledge, and identify areas of focus.

This live workshop is more than just a training course. It’s an interactive, collaborative experience that offers real-time interaction with experts and peers. Beyond just theory, it includes practical case studies, group discussions, and activities to ensure a well-rounded understanding. Get ready to dive deep, ask questions, share insights, and expand your professional horizons in the dynamic field of information security.


 

Who Should Attend?

This interactive workshop is tailor-made for professionals working in roles including, but not limited to:

  • Security Consultants
  • Security Managers
  • IT Directors/Managers
  • Security Auditors
  • Security Architects
  • Security Analysts
  • Security Systems Engineers
  • Chief Information Security Officers
  • Security Directors
  • Network Architects

 

Program Objectives:

By the end of this workshop, participants will be able to:

  • Comprehend and apply essential concepts and techniques related to IT and security.
  • Align organizational operational goals with security functions and implementations.
  • Protect the organization’s assets throughout their lifecycle.
  • Understand the structures and standards used to secure operating systems, networks, applications, and implement relevant security controls.
  • Implement system security through the application of security design principles and suitable control mitigations.
  • Appreciate the importance of cryptography in today’s digital age.
  • Evaluate the impact of physical security elements on information system security and recommend appropriate protections.
  • Understand the components of communication and network security along with their functionalities.
  • Discuss concepts and architectures that define the technology and implementation systems and protocols at OSI model layers 1-7.
  • Understand and apply physical and logical access controls to different environments.
  • Evaluate various access control models to meet business security requirements.
  • Design and validate test and audit strategies that align with business requirements.
  • Enhance the operational function and capacity of an organization by applying suitable security controls and countermeasures.
  • Identify risks to an organization’s operations and assess specific threats, vulnerabilities, and controls.
  • 00

    days

  • 00

    hours

  • 00

    minutes

  • 00

    seconds

Submit a Comment

Your email address will not be published. Required fields are marked *

Chat WhatsApp
+971525115498