Master information systems security

CISSP® (Certified Information Systems Security Professional) - Training Programme

e-Careers Limited

*Precio Orientativo
Importe original en GBP:

Información importante

Tipología Vocational qualification
Metodología Online
Inicio Fechas a escoger
  • Vocational qualification
  • Online
  • Inicio:
    Fechas a escoger

Master information systems security and get on your way to earning a globally recognised qualification which is seen as a benchmark in the industry with this Certified Information System Security Professional (CISSP) course.

Información importante
¿Qué objetivos tiene esta formación?

When students have taken the CISSP course they are then able to sit the examination through the International Information Systems Security Certification Consortium (ISC)². Once you have completed this exam you will be able to function in roles such as security architect, security analyst and security systems engineer.

¿Esta formación es para mi?

This course is for IT professionals who need to improve their practical skills and attain a professional qualification or those who would like to specialise in IT security.

Requisitos: Students must have at least five years of recent full-time professional work experience in at least 2 of the 8 domains of CISSP: • Security and Risk Management • Asset Security • Security Engineering • Communications and Network Security • Identity and Access Management • Security Assessment and Testing • Security Operations • Software Development Security

¿Dónde se da y en qué fecha?
comienzo Ubicación
Fechas a escoger
comienzo Fechas a escoger

¿Qué aprendes en este curso?

Information Systems
Software Engineering
Information Systems management
Information Management System
Criminal law
Certified Information Systems Security Professional


The CISSP course will provide you with the knowledge to manage, operate, develop and plan an effective network security infrastructure in an enterprise environment. • The principles of access control and how they can be strengthened and applied to keep unauthorised users out of a system. • Telecommunications and network systems that need to be hardened to prevent data loss or theft. • The role that information governance and risk management play in raising security standards and how they need to be applied to corporate information systems. • The importance of secure software architecture and design to help ensure that in-house systems protect data and resources. • Using cryptography to protect data in transit and prevent unauthorised access of files without the correct encryption keys. • Using security architecture and design principles to limit data access and potential angles of attack. • Monitoring, auditing and improving operations security to keep systems secure at the point of access. • Designing and implementing business continuity and disaster recovery plans to help re-establish operations as quickly as possible following a serious outage. • Legal obligations of data security and obligations that must be fulfilled in the event of a criminal investigation. • Physical and environmental security considerations

Información adicional

Flexible, interest-free, part payment options available.