This is a repeating event

CISSP training (coaching)

23marsToute la journée27CISSP training (coaching)(ISC)²Tunisian Cloud - Les Berges du Lac 1, Immeuble Chammam, Les Berges du Lac(Toute la journée)

Détails de l'événement

CISSP training provides a comprehensive review of the knowledge required to effectively design, organize and manage an organization’s overall security posture. This training session allows students to review and refresh their knowledge and identify the areas they need to study for the CISSP exam.

Objectives of the CISSP training :

  • Understand and apply fundamental concepts and methods related to the information technology and security domains;
  • Align overall organizational business objectives with security functions and implementations;
  • Understand how to protect the organization’s assets throughout their life cycle;
  • Understand the concepts, principles, structures, and standards used to design, implement, monitor, and secure operating systems, equipment, networks, applications, and controls used to enforce various levels of confidentiality, integrity, and availability;
  • Implement system security through the application of security principles and the application of appropriate security controls to mitigate vulnerabilities present in common types and architectures of information systems;
  • Understand the importance of cryptography and the security services it can provide in the digital and information age;
  • Understand the impact of physical security elements on information system security and apply secure design principles to evaluate or recommend appropriate physical security protections;
  • Understand the elements that comprise communication and network security, and describe in detail the operation of communication and network systems;
  • List the concepts and architecture that define the associated technology and implementation systems and protocols at layers 1-7 of the Open Systems Interconnection (OSI) model;
  • Identify standard terms for applying physical and logical access controls to environments related to their security practice;
  • Evaluate different access control models to meet enterprise security requirements;
  • Cite key methods for designing and validating test and audit strategies that meet enterprise requirements;
  • Strengthen and optimize an organization’s operational function and capability by applying and using appropriate security controls and countermeasures;
  • Recognize risks to an organization’s operational activities and assess specific threats, vulnerabilities and controls;
  • Understand the system lifecycle and the software development lifecycle and how to apply security to them;
  • Identify the appropriate security control(s) for the development environment; and evaluate the effectiveness of software security.



mars 23 (Lundi) - 27 (Vendredi)


Tunisian Cloud - Les Berges du Lac 1

Immeuble Chammam, Les Berges du Lac