(Training and Education)

Official (ISC)² CBK Training Seminars for the CISSP-ISSAP

An In-Depth Study of Information Architecture  

PLEASE NOTE: Effective July 1, 2017, the CISSP-ISSAP exam will be based on a new exam outlineAll Official (ISC)2 ISSAP Training Courses commencing by May 5, 2017 will be available for enrollment. 

The CISSP-ISSAP certification is for CISSPs who specialize in designing security solutions and providing management with risk-based guidance to meet organizational needs.

ISSAP Course Overview

Led by an (ISC)² authorized instructor, the Official (ISC)² CBK Training Seminar for the ISSAP provides a comprehensive review of information security concepts and industry best practices, covering the 6 domains of the ISSAP CBK: 

  • Access Control Systems and Methodology
  • Communications and Network Security
  • Cryptography
  • Security Architecture Analysis
  • Technology Related Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP) 
  • Physical Security Considerations

Several types of activities are used throughout the course to reinforce topics and increase knowledge retention. These activities include open ended questions from the instructor to the students, matching and poll questions, group activities, open/closed questions, and group discussions. This interactive learning technique is based on sound adult learning theories.

This training course will help candidates review and refresh their information security knowledge and help identify areas they need to study for the ISSAP exam and features:

  • Official (ISC)² courseware
  • Taught by an authorized (ISC)² instructor
  • Student handbook
  • Collaboration with classmates
  • Real-world learning activities and scenarios

Who should attend?

This course is intended for CISSPs who have at least 2 years of recent full-time professional work experience in architecture and are pursuing ISSAP training and certification to demonstrate mastery in security architecture to advance within their current information security careers. The training seminar is ideal for those working in positions such as, but not limited to:

  • System architect
  • Chief technology officer
  • System and network designer
  • Business analyst
  • Chief security officer

Learning Objectives

  • Define an architecture that will ensure adequate security and reliability for the organization information systems design.
  • Identify and deploy physical access controls that will enable the complete information system security model to prevent, detect, and react to suspicious activity.
  • Describe how cryptography is used to protect an organization's data and communications from security threats.
  • Explain how to select, implement, and monitor communications products according to company standards and policies.
  • Develop a Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP) for an organization through an understanding of identifying adverse events that could potentially threaten an organization's ability to thrive.
  • Utilize hard and soft concepts to applying access control methodologies.

 

Logo CISSP AP

Official (ISC)² CBK Training Seminars for the ISSAP are offered in three convenient formats:

 

classroom based training icon Classroom-based Training

Info orange arrow small 
View Schedule orange arrow small

 

liveonline training icon Live OnLine Training

Info orange arrow small 
View Schedule orange arrow small

 

private onsite training Private, On-site Training

Info orange arrow small

 

Need help deciding which training option is right for you? Contact us.

 

orange line

Resources