ISSAP Certification Training

ISSAP Certification Training

Print Friendly, PDF & Email

Introduction:

ISSAP Certification Training | Information System Security Architecture Professional – Hands-on

Learn about information systems security architecture in this official (ISC)2 ISSAP Certification Training course.

This ISSAP Certification Training course is designed for those who hold their CISSP certification and would like to specialize in advanced expertise in information security architecture I for designing security solutions and providing management with risk-based guidance to meet organizational needs.

Gain the skills needed to develop a business continuity plan (BCP) and disaster recovery plan (DRP) for an organization through an understanding of identifying adverse events that could potentially threaten an organization’s ability to thrive.

The ISSAP certification is a “concentration area” for CISSP, and extends upon the CISSP Common Body of knowledge by focusing on the following areas:

RESOURCES

  • ISSAP Certification Training by Pass For Life – Paperback/Kindle – Amazon
  • ISSAP Certification Training by Susan Hansche – Paperback/Kindle – Amazon
  • ISSAP Certification Gerardus Blokdyk – Paperback/Walmart.com
  • Information System Security Architecture Professional Training Official (ISC)2® Guide to the ISSAP – (ISC)2 Press)
  • Information System Security Architecture Professional Training by Gerardus Blokdyk – Hardcover/Vitalsource.com

Duration: 4 days

Your Registration Includes

Five (4) Days of Official (ISC)² Training from an Authorized CISSP-ISSEP Instructor
Official (ISC)² CISSP-ISSAP Courseware
Official (ISC)² CISSP-ISSAP Student Guide
Official (ISC)² CISSP-ISSAP Training Labs
Official (ISC)² CISSP-ISSAP Practice Exams
100% Satisfaction Guarantee
Exam Pass Guarantee

Related Courses

ISSAP Certification Training – Customize It:

  • If you are familiar with some aspects of ISSAP Certification Training, we can omit or shorten their discussion.
  • We can adjust the emphasis placed on the various topics or build the ISSAP Certification Training course around the mix of technologies of interest to you (including technologies other than those included in this outline).
  • If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the ISSAP Certification Training course in manner understandable to lay audiences.

ISSAP Certification Training – Audience / Target Group:

The CISSP-ISSAP training course is a great fit for professionals who currently hold a CISSP certification, with some example job titles including but not limited to:

  • System Architect
  • Chief Technology Officer
  • System and Network Designer
  • Business Analyst
  • Chief Security Officer

ISSAP Certification Training – Objectives:

Upon completing this ISSAP Certification Training course, learners will be able to meet these objectives:

In-depth coverage of the six domains required to pass the CISSP-ISSAP exam:

  • Security Architecture Analysis
  • Communication and Network Security
  • Physical Security Considerations
  • Cryptography
  • Technology-Related Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)
  • Access Control Systems and Methodology

ISSAP Certification Training – Course Syllabus:

Domain 1: Access Control Systems and Methodology
Access Control Systems and Methodology is the first domain reviewed in this official CISSP-ISSAP training seminar. It focuses on the critical requirements to establish adequate and effective access controls for an organization.

CISSP-ISSAP Domain 1 Lessons

  • Access Control Concepts, Methodologies, and Techniques
  • Identity and Access Management Architecture

Domain 2: Communications and Network Security
Domain 2 addresses the security concerns related to the critical role of communications and networks in today’s computing environments. A security architecture professional must understand the risks to communications networks whether they are data, voice or multimedia. This includes understanding of communications processes and protocols, threats and countermeasures, support for organizational growth and operations, and the ability to design, implement and monitor, secure architectures.

CISSP-ISSAP Domain 2 Lessons

  • Communications Architecture
  • Network Architecture
  • Protection of Communications and Networks
  • Security Design Considerations and Associated Risks

Domain 3: Cryptography
This Cryptography domain covers cryptographic methodologies and the use of cryptography to protect an organization’s data storage and communications from compromise or misuse. This includes awareness of threats to an organization’s cryptographic infrastructure. Additionally, this domain analyzes the responsibility involved in choosing, implementing and monitoring cryptographic products and adoption of corporate cryptographic standards and policy.

ISSAP Training Domain 3 Lessons

  • Identify Requirements
  • Determine Usage
  • Identify Cryptographic Design Considerations and Constraints
  • Define Key Management Lifecycle
  • Design Integrated Cryptographic Solutions

Domain 4: Security Architecture Analysis
The Security Architecture Analysis domain covers the best practices and standards for network and information systems design and the implementation of an architecture that will provide adequate security to accomplish the business goals of an enterprise.

ISSAP Training Domain 4 Lessons

  • Identify Security Architecture Approach
  • Requirement Analysis
  • Security Architecture
  • Verify and Validate Design

Domain 5: Technology Related BCP and DRP

  • BCP = Business Continuity Planning
  • DRP = Disaster Recovery Planning

The fourth domain in this official CISSP-ISSAP training seminar is called Technology Related BCP and DRP. It involves the identification of adverse events that could threaten the ability of the organization to continue the normal operations.

ISSAP Training Domain 5 Lessons

  • Business Impact Analysis (BIA)
  • Security Strategies for Availability and Recovery
  • Continuity and Recovery Solution

Domain 6: Physical Security Considerations
Physical Security Considerations is the sixth and final domain of this official CISSP-ISSAP training seminar. Domain 6 recognizes the importance of physical security and personnel controls in a complete information systems security model. The risks and tools used in providing physical security are also identified. This includes secure management, administration, and deployment of physical access controls, whether to prevent, detect or react to suspicious activity.

ISSAP Training Domain 6 Lessons

  • Assess Requirements
  • Physical Security Products and Systems
  • Evaluate Solutions

Whether you are looking for general information or have a specific question, we want to help!

Request More Information

Time frame:

0