Certified Information Systems Security Professional (CISSP)
CISSP
Projectmanagement
De CISSP-certificering is internationaal erkend en gericht op ervaren securityprofessionals. De training behandelt zowel technische als beleidsmatige aspecten van informatiebeveiliging. Ideaal voor wie strategisch, tactisch of technisch actief is binnen IT-security.
Leerdoelen
- Inzicht krijgen in de acht domeinen van de CISSP Common Body of Knowledge (CBK)
- Risico’s herkennen en passende beveiligingsmaatregelen bepalen
- Beveiligingsbeleid en -processen opstellen en beoordelen
- Relevante wet- en regelgeving toepassen binnen securitybeheer
- Voorbereiden op het officiële CISSP-examen van (ISC)²
- Securityprofessionals die CISSP-certificering nodig hebben voor hun functie
- IT’ers die willen doorgroeien binnen security of willen overstappen naar een securityrol
Minimaal vijf jaar werkervaring in twee of meer domeinen van het CISSP CBK
- Security and Risk Management (e.g., Security, Risk, Compliance, Law, Regulations, Business Continuity)
- Understand and Apply Concepts of Confidentiality, Integrity, and Availability
- Apply Security Governance Principles
- Compliance
- Understand Legal and Regulatory Issues that Pertain to Information Security in a Global Context
- Develop and Implement Documented Security Policy, Standards, Procedures, and Guidelines
- Understand Business Continuity Requirements
- Contribute to Personnel Security Policies
- Understand and Apply Risk Management Concepts
- Understand and Apply Threat Modeling
- Integrate Security Risk Considerations into Acquisitions Strategy and Practice
- Establish and Manage Security Education, Training, and Awareness
- Asset Security (Protecting Security of Assets)Classify Information and Supporting Assets
- Determine and Maintain Ownership
- Protect Privacy
- Ensure Appropriate Retention
- Determine Data Security Controls
- Establish Handling Requirements
- Security Engineering (Engineering and Management of Security)
- Implement and Manage an Engineering Life Cycle Using Security Design Principles
- Understand Fundamental Concepts of Security Models
- Select Controls and Countermeasures Based Upon Information Systems Security Standards
- Understand the Security Capabilities of Information SystemsAssess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements
- Assess and Mitigate Vulnerabilities in Web-based Systems
- Assess and Mitigate Vulnerabilities in Mobile Systems
- Assess and Mitigate Vulnerabilities in Embedded Devices and Cyber-Physical Systems
- Apply Cryptography
- Apply Secure Principles to Site and Facility Design
- Design and Implement Facility Security
- Communications and Network Security (Designing and Protecting Network Security)
- Apply Secure Design Principles to Network Architecture
- Securing Network Components
- Design and Establish Secure Communication Channels
- Prevent or Mitigate Network Attacks
- Identity and Access Management (Controlling Access and Managing Identity)
- Control Physical and Logical Access to Assets
- Manage Identification and Authentication of People and Devices
- Integrate Identity as a Service (IDaaS)
- Integrate Third-Party Identity Services
- Implement and Manage Authorization Mechanisms
- Prevent or Mitigate Access Control Attacks
- Manage the Identity and Access Provisioning Life Cycle
- Security Assessment and Testing (Designing, Performing, and Analyzing Security Testing)
- Design and Validate Assessment and Test Strategies
- Conduct Security Control Testing
- Collect Security Process DataConduct or Facilitate Internal and Third-Party Audits
- Security Operations (e.g., Foundational Concepts, Investigations, Incident Management, Disaster Recovery)
- Understand and Support Investigations
- Understand Requirements for Investigation Types
- Conduct Logging and Monitoring Activities
- Secure the Provisioning of Resources through Configuration Management
- Understand and Apply Foundational Security Operations Concepts
- Employ Resource Protection Techniques
- Conduct Incident Response
- Operate and Maintain Preventative Measures
- Implement and Support Patch and Vulnerability Management
- Participate in and Understand Change Management Processes
- Implement Recovery Strategies
- Implement Disaster Recovery ProcessesTest Disaster Recovery Plan
- Participate in Business Continuity Plannng
- Implement and Manage Physical Security
- Participate in Personnel Safety
- Software Development Security (Understanding, Applying, and Enforcing Software Security)
- Understand and Apply Security in the Software Development Life Cycle
- Enforce Security Controls in the Development Environment
- Assess the Effectiveness of Software SecurityAssess Software Acquisition Security