Certified Information Systems Security Professional
CISSP® certification is a globally recognized standard of
achievement that confirms an individual's knowledge in the field
of information security. CISSPs are information assurance professionals
who define the architecture, design, management and/or controls
that assure the security of business environments. This was
the first certification in the field of information security
to meet the stringent requirements of ISO/IEC Standard 17024.
Technological solutions alone cannot protect an organization's
critical information assets. Employers demanding qualified information
security staff give their organizations a leading edge by providing
the highest standard of security for their customers', employees',
stakeholders' and organizational information assets. (ISC)²®,
the only not-for-profit body charged with maintaining, administering
and certifying information security professionals via the compendium
of industry best practices, the (ISC)² CBK®, is the
premier resource for information security professionals worldwide.
Roshcomm is pleased to announce our instructor-led CISSP®
Exam Prep courses in Bahrain. This highly sought after CISSP®
Exam Prep class is designed specifically to help you pass the
CISSP certification examination on your first try. The course
is based on the nine Knowledge Areas of the Guide to the Project
Management Body of Knowledge (PMBOK®) and the five process
groups - Initiating, Planning, Executing, Controlling, and Closing.
Professional Responsibility will also be reviewed. The course
includes lectures, Q&As, and lots of sample exam questions.
Led by (ISC)² authorized instructors,
who are experts in information security, the Official (ISC)
CISSP CBK Training Seminar is the most comprehensive review
of information security concepts and industry best practices,
and covers the 10 domains of the CISSP CBK (Common Body of Knowledge).
This training course will help candidates review and refresh
their information security knowledge and help identify areas
they need to study for the CISSP exam.
Several types of activities are used throughout the course to
reinforce topics and increase knowledge retention. These activities
include open ended questions from the instructor to the students,
matching and poll questions, group activities, open/closed questions,
and group discussions. This interactive learning technique is
based on sound adult learning theories.
Identify key purpose, benefits, and process of information
classification and how it is used to determine Access Control
policies and identifying the process for assessing the effectiveness
of implemented controls.
Provide the basic understanding of Telecommunication and
Network Security concepts, required components for minimizing
security risks, securing channels of communication, and techniques
for preventing and detecting network-based attacks.
Define and apply the Information Security Governance and
Risk Management framework including the policies, concepts,
principles, structures and standards that are established
for the protection of information assets, and how to assess
the effectiveness of that protection.
Explain the details of Software Development Security, including
the activities and processes pertaining to the planning, programming,
and management of software and systems that manage software
including ways to secure applications through design and control
interfaces, and assess the usefulness of their application
Identify the concepts within Cryptography, including the
terms and application of public and private algorithms, distribution
management, methods of attack, and the application, development,
and use of digital signatures for authenticity and electronic
transactions, and nonrepudiation processes.
Identify the Security Architecture and Design concepts focusing
on the architecture of security systems that provide for the
availability, integrity, and confidentiality of organizational
assets. Learners will address concepts, principles, structures,
frameworks, and standards used in the design and implementation
of security requirements of individual components, and enterprise
Identify the key terms and processes of Security Operations
and how to protect and control information processing assets
in a centralized or distributed environment through the daily
tasks required to keep security services operating reliably
Identify and apply the Business Continuity and Disaster
Recovery Planning requirements necessary to develop the preparation,
processes, and practices necessary to ensure the preservation
of the business in case of major disruptions to normal business
operations including the project scope and planning, how to
conduct a business impact analysis,identify recovery strategies,
develop the recovery plan and implement it.
Define and explain the Legal, Regulations, Investigations,
and Compliance concepts of and internationally accepted methods,
processes, and procedures used in computer crime legislation
and regulations specific to the investigative measures and
techniques used to identify the occurrence of an incidence,
and the gathering, analysis, and management of evidence.
Define and apply the requirements necessary for the overall
Physical (Environmental) Security processes for the evaluation
of physical, environmental, and procedural risks that might
be present in a facility, organization, or structure where
information systems are stored and managed.
Benefits of the CISSP for Professionals
Demonstrates a working knowledge of information security Confirms
commitment to profession
Offers a career differentiator, with enhanced credibility
Affords you exclusive benefits as an (ISC)² member, including
valuable resources such as peer networking and idea exchange
Indicates that certified information security professionals
earn a worldwide average of 25% more than their non-certified
counterparts, according to the Global Information Security Workforce
Fulfills government and organization requirements for information
security certification mandates
Benefits of the CISSP for Employers
Positions candidates on a level playing field as (ISC)² certifications
are recognized internationally
Provides increased credibility for your organization when
working with vendors and contractors
Empowers employees with a universal language, circumventing
ambiguity with industry-accepted terms and practices
Validates commitment and years of experience gained in the
Requires Continuing Professional Education (CPE) credits to
ensure that personnel keep their skills current
Satisfies certification mandate requirements for service providers
This course prepares you to take and pass the CISSP exam by ISC2
Note: CISSP is a registered trademark of ISC2
course is intended for students who have at least four years of
recent full-time security professional work experience in two
or more of the ten domains of the (ISC)²® Certified Information
System Security Professional® (CISSP) Common Body of Knowledge®
(CBK). The CISSP CBK defines the work experience in architecture,
design, management, risk, and controls that assure the security
of business environments. The course builds on and brings together
the holistic view of the topics covered in the everyday environment
of an information assurance professional.