Download Interent ExplorerDownload Apple SafariDownload OperaDownload FirefoxDownload Google Chrome

ISSAP Certification Training

ISSAP Certification Training

ISSAP Certification Training:

ISSAP Certification Training Course (Online, Onsite, and Classroom Live)

This four-day ISSAP Certification Training or Information System Security Architecture Professional Training (CISSP-ISSAP) course is focused on teaching you the management of security programs and the ins and outs of security architecture. You’ll learn the technical aspects of security architecture, including identity and access management, security operations, infrastructure, application security, governance and compliance, and security architecture modeling.

This Information System Security Architecture Professional (CISSP-ISSAP) seminar not only teaches you the nuts and bolts of security architecture, but it also prepares you to successfully pass the challenging (ISC)² ISSAP exam, one of three “concentration areas” for CISSP holders extending the CISSP common body of knowledge.

Your Registration Includes

  • Five (4) Days of Official (ISC)² Training from an Authorized CISSP-ISSEP Instructor
  • Official (ISC)² CISSP-ISSAP Courseware
  • Official (ISC)² CISSP-ISSAP Student Guide
  • Official (ISC)² CISSP-ISSAP Training Labs
  • Official (ISC)² CISSP-ISSAP Practice Exams
  • 100% Satisfaction Guarantee
  • Exam Pass Guarantee

Related Courses

Customize It:

  • If you are familiar with some aspects of ISSAP Certification Training, we can omit or shorten their discussion.
  • We can adjust the emphasis placed on the various topics or build the ISSAP Certification Training course around the mix of technologies of interest to you (including technologies other than those included in this outline).
  • If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the ISSAP Certification Training course in a manner understandable to lay audiences.

Audience / Target Group:

The CISSP-ISSAP training course is a great fit for professionals who currently hold a CISSP certification, with some example job titles including but not limited to:

  • System Architect
  • Chief Technology Officer
  • System and Network Designer
  • Business Analyst
  • Chief Security Officer

Course Prerequisites:

The knowledge and skills that a learner must have before attending this Information System Security Architecture Professional (CISSP-ISSAP) course are:

  • The CISSP-ISSAP requires a candidate to be a CISSP in good standing and demonstrate two years of professional experience in at least one of the six CISSP-ISSAP domains.

Objectives:

This Information System Security Architecture Professional (CISSP-ISSAP) Seminar prepares you to pass the (ISC)² CISSP-ISSAP exam, which covers six domain areas designed to ensure relevancy across all disciplines of information security.

  • Architect for governance, compliance, and risk management
  • Security architecture modeling
  • Infrastructure security architecture
  • Identity and access management (IAM) architecture
  • Architect for application security
  • Security operations architecture

Course Syllabus:

Domain 1 – Architect for governance, compliance, and risk management

  • Determine legal, regulatory, organizational, and industry requirements
  • Manage risk

Domain 2 – Security architecture modeling

  • Identify the security architecture approach
  • Verify and validate design (e.g., functional acceptance testing (FAT), regression)

Domain 3 – Infrastructure security architecture

  • Develop infrastructure security requirements
  • Design defense-in-depth architecture
  • Secure shared services (e.g., wireless, e-mail, voice over internet protocol (VoIP), unified communications (UC)
  • Domain name system (DNS), network time protocol NTP))
  • Integrate technical security controls
  • Design and integrate infrastructure monitoring
  • Design infrastructure cryptographic solutions
  • Design secure network and communication infrastructure (e.g., a virtual private network (VPN), internet protocol security (IPsec), transport layer security (TLS))
  • Evaluate physical and environmental security requirements

Domain 4 – Identity and access management (IAM) architecture

  • Design identity management and lifecycle
  • Design access control management and lifecycle
  • Design identity and access solutions

Domain 5 – Architect for application security

  • Integrate software development life cycle (SDLC) with application security architecture (e.g., requirements traceability matrix (RTM), security architecture documentation, secure coding)
  • Determine application security capability requirements and strategy (e.g., open source, cloud service providers (CSP), software as a service (SaaS)/infrastructure as a service (IaaS)/platform as a service (PaaS) environments)
  • Identify common proactive controls for applications (e.g., Open Web Application Security Project (OWASP))

Domain 6 – Security operations architecture

  • Gather security operations requirements (e.g., legal, compliance, organizational, and business requirements)
  • Design information security monitoring (e.g., security information and event management (SIEM), insider threat, threat intelligence, user behavior analytics, incident response (IR) procedures)
  • Design business continuity (BC) and resiliency solutions
  • Validate business continuity plan (BCP)/disaster recovery plan (DRP) architecture
  • Design incident response (IR) management

Whether you are looking for general information or have a specific question, we want to help!

Request More Information

    Time frame: