Information System Security Architecture Professional Training (CISSP-ISSAP)

This four-day Information System Security Architecture Professional Training (CISSP-ISSAP) course is focused on teaching you the management of security programs and the ins and outs of security architecture. You’ll learn the technical aspects of security architecture, including identity and access management, security operations, infrastructure, application security, governance and compliance, and security architecture modeling.

This Information System Security Architecture Professional (CISSP-ISSAP) seminar not only teaches you the nuts and bolts of the security architecture, it prepares you to successfully pass the challenging (ISC)² ISSAP exam, one of three “concentration areas” for CISSP holders extending the CISSP common body of knowledge.

Your Registration Includes

  • Five (4) Days of Official (ISC)² Training from an Authorized CISSP-ISSEP Instructor
  • Official (ISC)² CISSP-ISSAP Courseware
  • Official (ISC)² CISSP-ISSAP Student Guide
  • Official (ISC)² CISSP-ISSAP Training Labs
  • Official (ISC)² CISSP-ISSAP Practice Exams
  • 100% Satisfaction Guarantee
  • Exam Pass Guarantee

Information System Security Architecture Professional Training (CISSP-ISSAP)Duration: 4 days

RESOURCES
RELATED COURSES
CUSTOMIZE It
  • We can adapt this Information System Security Architecture Professional (CISSP-ISSAP) course to your group’s background and work requirements at little to no added cost.
  • If you are familiar with some aspects of this Information System Security Architecture Professional (CISSP-ISSAP) course, we can omit or shorten their discussion.
  • We can adjust the emphasis placed on the various topics or build the Information System Security Architecture Professional (CISSP-ISSAP) Course around the mix of technologies of interest to you (including technologies other than those included in this outline).
  • If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Information System Security Architecture Professional (CISSP-ISSAP) course in manner understandable to lay audiences.
AUDIENCE/TARGET GROUP

The CISSP-ISSAP training course is a great fit for professionals who currently hold a CISSP certification, with some example job titles including but not limited to:

  • System Architect
  • Chief Technology Officer
  • System and Network Designer
  • Business Analyst
  • Chief Security Officer
CLASS PREREQUISITES

The knowledge and skills that a learner must have before attending this Information System Security Architecture Professional (CISSP-ISSAP) course are:

  • The CISSP-ISSAP requires a candidate to be a CISSP in good standing and demonstrate two years of professional experience in at least one of the six CISSP-ISSAP domains.
Information System Security Architecture Professional Training (CISSP-ISSAP) - OBJECTIVES

This Information System Security Architecture Professional (CISSP-ISSAP) Seminar prepares you to pass the (ISC)² CISSP-ISSAP exam, which covers six domain areas designed to ensure relevancy across all disciplines of information security.

  • Identity and access management architecture
  • Security operations architecture
  • Infrastructure security
  • Architect for governance, compliance and risk management
  • Security architecture modeling
  • Architect for application security
Information System Security Architecture Professional Training (CISSP-ISSAP) - COURSE SYLLABUS

Domain 1 – Identity and access management architecture

  • Identity management and lifecycle design
  • Access control management and lifecycle design

Domain 2 – Security operations architecture

  • Security operation capability requirements and strategy determination
  • Continuous security monitoring design (e.g., SIEM, insider threat, enterprise log management, cybercrime, advanced persistent threat)
  • Continuity, availability and recovery solutions design
  • Defining security operations (e.g., interoperability, scalability, availability, supportability)
  • Physical security controls integration
  • Incident management capabilities design
  • Secure communications and networks design

Domain 3 – Infrastructure security

  • Infrastructure security capability requirements and strategy determination
  • Layer 2/3 architecture design (e.g., access control segmentation, out-of-band management, OSI layers)
  • Common services security (e.g., wireless, e-mail, VoIP, unified communications)
  • Detective, deterrent, preventative and control systems architecture
  • Infrastructure monitoring architecture
  • Integrated cryptographic solutions design (e.g., public key infrastructure, identity system integration)

Domain 4 – Architect for governance, compliance and risk management

  • Government and compliance architecture
  • Threat and risk management capabilities design
  • Off-site data use and storage security solutions architecture
  • Operating environment (e.g., virtualization, cloud computing)

Domain 5 – Security architecture modeling

  • Identifying security architecture approach (e.g., reference architectures, build guides, blueprints, patterns)
  • Verify and validate design (e.g., POT, FAT, regression)

Domain 6 – Architect for application security

  • Application security software development life cycle (SDLC) integration review (e.g., requirements traceability matrix, security architecture documentation, secure coding)
  • Application security review (e.g., custom, commercial off-the-shelf, in-house cloud)
  • Application security capability requirements and strategy determination (e.g., open source, cloud service providers, SaaS/IaaS providers)
  • Application cryptographic solutions design (e.g., cryptographic API selection, PRNG selection, software-based key management)
  • Application controls evaluation against existing threats and vulnerabilities
  • Application security approaches establishment and determination for all system components (mobile, web and thick client applications; proxy, application and database services)
Information System Security Architecture Professional Training (CISSP-ISSAP) Course Wrap-Up

Whether you are looking for general information or have a specific question, we want to help.
Request More Information

    Time frame: