Certified Information Systems Security Professional (CISSP) 

Success Drives Global Consult Limited (SDCG) is a dynamic firm of seasoned professionals that focuses on human capacity and enterprise development IT, strategy, implementation, advisory, HR, regulatory, compliance, risk, audit, tax, and operations project managers. For every sector, there is a project manager type that specializes in that sector. In addition, project managers work in different types of industries, which include financial services, consulting, healthcare, business, construction, information, retail, manufacturing, insurance, government, and real estategenuine, click here Analytical,Assertive,Attention to detail,Business analysis Change management,Current state assessment,Current vs, best-in-class gap analysis,Current state-gap analysis Collaborative,Coordinated,Data analysis,Due diligence,Future state assessment,Future state design,Evaluation,Excel,Executing,plans,Execution,metrics,Financial,analysis,Gap analysis,Managed,Managing client expectations ,Managing conflicts, Manage meetings, Executive Management Training,

February 26, 2017
870,000.00 800,000.00


Dubai   View map



Introduction to CISSP

Introducing the CISSP certification program covering: CISSP competitive values, Common Body of Knowledge (CBK), and assessment test to gauge participants’ security knowledge, while interrelated domains are exposed to give thorough insight of the integral knowledge and full fields in IT security.

  • Access Control Systems and Methodology
  • This domain examines mechanisms and methods used to enable administrators and managers to control what subjects can access, the extent of their capabilities after authorization and authentication, auditing and monitoring of these activities. Some of the topics covered include:
  • Access Control Security Models
  • Identification and authentication technologies and techniques
  • Access control administration
  • Data ownerships
  • Attack methods

Telecommunications and Network Security

  • This domain examines internal, external, public, and private communication systems networking structures; devices; protocols and remote access and administration. Some of the topics covered include:
  • OSI model layers ­ Local Area Network (LAN), metropolitan Area Network (MAN), and Wide Area Network (WAN) technologies
  • Internet, intranet, and extranet issues ­ Virtual private networks (VPNs), firewalls, routers, bridges, and repeaters ­ Network topologies and cabling ­ Attack methods

Security Management Practices

  • This domain examines the identification of company assets, the proper way to determine the necessary level of protection required, and what type of budget to develop for security implementations with the goal of reducing threats and monetary loss. Some of the topics covered include:
  • Data classification ­ Policies, procedures, standards, and guidelines ­ Risk assessment and management
  • Personnel security, training, and awareness

Applications and Systems Development Security

  • This domain examines the security components within operating systems and applications and how to best develop and measure their effectiveness. This domain looks at software life cycles, change control, and application security. Some of the other topics covered include:
  • Data warehousing and data mining ­ Various development practices and their risks ­ System storage and processing components ­ Malicious code


This domain examines methods and techniques for disguising data for protection purposes. This involves cryptography techniques, approaches, and technologies. Some of the topics covered include:

Symmetric versus asymmetric algorithms and uses ­ Public key infrastructure (PKI) and hashing functions.

  • This domain examines concepts, principles, and standards for designing and implementing secure applications, operating systems, and systems. This covers international security measurement standards and their meaning for different types of platforms. Some of the topics covered include:
  • Operating states, kernel functions, and memory mapping
  • Security models, architectures, and evaluations
  • Evaluation criteria: Trusted Computer Security Evaluation Criteria
  • (TCSEC), Information Technology Security Evaluation Criteria
  • (ITSEC), and Common Criteria
  • Common flaws in applications and systems
  • Certification and accreditation

Operations Security

  • This domain examines controls over personnel, hardware, systems, and auditing and monitoring techniques. This also covers possible abuse channels and how to recognize and address them. Some of the topics covered include:
  • Administrative responsibilities pertaining to personnel and job functions
  • Maintenance concepts of antivirus, training, auditing, and resource protection activities
  • Preventive, detective, corrective, and recovery controls
  • Standards, compliance, and due care concepts
  • Security and fault tolerance technologies

Leave a Reply

Your email address will not be published. Required fields are marked *

Facebook Like Box

Contact Information

Address: No 18, Afolabi Aina Street, Beside Alade Market, Allen Avenue, Ikeja Lagos.

Tel: 01-2930669, 09038401501, 08033027439

E-mail: training@successdrives.net

Our Partners