About this course
CISSP is an independent information security certification granted by the International Information System Security Certification Consortium, also known as (ISC)². As of January, 2022 there are 152,632 (ISC)² members holding the CISSP certification worldwide.
Curriculum
Security and Risk Management
- Confidentiality, integrity and availability
- Security governance policies and their supporting counterparts
- Compliance
- Global information security
- Legal and regulatory policies
- Professional ethics
- Business continuity
- Personnel security
- Risk management
- Threat modeling
- Acquisition security
- Security awareness
Asset Security
- Classify information
- Identify and document asset ownership
- Asset privacy concerns
- Asset retention policies
- Data security controls
- Handling requirements
Security Engineering
- Secure engineering processes
- Review security engineering models
- Security architecture
- Web-based vulnerabilities
- Mobile vulnerabilities
- Embedded device vulnerabilities
- Cryptography components and their relationships
- Site and facility design
- Physical security
Communication and Network Security
- Network architecture
- Network components
- Communication channels
Identity and Access Management
- Physical and logical access
- Authentication of people and devices
- Identity as service (cloud identity)
- Third-party identity
- Authorization mechanisms
- Access control attacks
- Provisioning life cycle
Security Assessment and Testing
- Validate assessment
- Security control
- Management and operational controls
- Analyze and report test outputs
- Security operations
- Handling investigations
- Investigation types
- Logging and monitoring
- Software development security
- Software development life cycle
- Security for development environments
- Software securityProvisioning of resources
- Resource protection
- Incident management
- Preventative measures
- Patch and vulnerability management
- Change management
- Disaster recovery
- Business continuity
- Manage physical security
- Personnel safety concerns
- Purchased software risk
FAQ
How do I register for the CISA exam after completing the course?
• After completing the course, you can register for the CISA exam through the ISACA website. Our course will prepare you thoroughly, and our team can provide guidance on the registration process.
What certification will I receive upon completing the training?
• Upon completing the training, you will receive a course completion certificate. However, to become a Certified Information Systems Auditor (CISA), you must pass the official CISA exam administered by ISACA.
Will I have access to course materials after the live sessions?
Yes, you will have access to recorded sessions, study materials, practice exams, and other resources throughout the duration of the course and for a limited time afterward, allowing you to review and reinforce your learning
Who are the trainers?
All of our highly qualified trainers are CISA®-certified with more than 12 years of experience in training and working in the multiple domain.
Is CISA Exam fee included in the CISA training course fee?
Typically, the CISA exam fee is not included in the CISA training course fee. Training courses generally cover the cost of instruction, study materials, and sometimes practice exams. The exam fee is a separate charge paid directly to ISACA when you register for the certification exam. Always check the specific details provided by your training provider and ISACA for accurate information.
What if I miss a CISA class?
You will never miss the CISA classes at Talent Arabia! You can choose either of the two options:
• View the recorded session of the class available in your LMS.
• You can attend the missed session, in any other live batch.
Comments (0)
0
0 Reviews