Live Chat
Monday - Friday 8am - 6pm EST Chat Now
Contact Us
Monday - Friday 8am - 8pm EST 1-866-716-6688 Other Contact Options
Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

CISSP-ISSAP Certification Prep Course

Learn about information systems security architecture in this official (ISC)2 course.

GK# 1639

Course Overview

TOP

This course is designed for those who hold their CISSP certification and would like to specialize in advanced expertise in information security architecture I for designing security solutions and providing management with risk-based guidance to meet organizational needs.

Gain the skills needed to develop a business continuity plan (BCP) and disaster recovery plan (DRP) for an organization through an understanding of identifying adverse events that could potentially threaten an organization's ability to thrive.

This course is your one source for exam preparation that includes:

  • Official (ISC)2 CISSP-ISSAP Training Handbook
  • Official (ISC)2 CISSP-ISSAP Flash Cards
  • CISSP-ISSAP Certification Exam Voucher

Schedule

TOP
  • Delivery Format:
  • Date:
  • Location:
  • Access Period:

$

What You'll Learn

TOP

In-depth coverage of the six domains required to pass the CISSP-ISSAP exam:

  1. Security Architecture Analysis
  2. Communication and Network Security
  3. Physical Security Considerations
  4. Cryptography
  5. Technology-Related Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)
  6. Access Control Systems and Methodology

Outline

TOP
Viewing outline for:

Virtual Classroom Live Outline

1. Domain 1: Security Architecture Analysis

  • Approach to Security Architecture
  • Conducting the Requirements Analysis
  • Designing the Security Model
  • Conduct Design Verification and Validation

2. Domain 2: Communication and Network Security

  • The Communication Architecture
  • The Network Architecture
  • Protecting the Communications and Networks
  • Security Design Considerations and Associated Risks

3. Domain 3: Physical Security Considerations

  • Assessing the Physical Security Requirements
  • Integration of Physical Products and Systems
  • Solution Evaluation

4. Domain 4: Cryptography

  • Cryptography Requirements
  • Design Considerations and Constraints
  • Key Management Life Cycle
  • Integrated Solutions
  • Identity System Integration

5. Domain 5: Technology-Related Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)

  • Business Impact Analysis (BIA) Requirements
  • What are the Strategies for Availability and Recovery?
  • Designing the Continuity Recovery Solution

6. Domain 6: Access Control Systems and Methodology

  • Access Control Key Concepts, Methodologies, and Techniques
  • Architecture of Identity and Access Management

Who Should Attend

TOP
  • Information security professionals who detail the critical requirements to establish adequate and effective access controls, address the security concerns related to the critical role of communications and networks, and are responsible for choosing, implementing and monitoring cryptographic products and adoption of corporate cryptographic standards and policies
  • Individuals pursuing CISSP-ISSAPĀ® certification

Follow-On Courses

TOP
Course Delivery

This course is available in the following formats:

Virtual Classroom Live

Experience expert-led online training from the convenience of your home, office or anywhere with an internet connection.

Duration: 4 day

Request this course in a different delivery format.
Enroll