Course Overview
You may learn all you need to know about becoming a Certified Information Systems Security Professional and get ready for the Certified Information Security Professionals exam by taking the Certified Information Systems Security Specialist (CISSS) course. Important subjects including risk management, data security, incident response, and ethical hacking are covered in this class. Participants become extremely useful assets to any firm since they acquire skills that are necessary for handling today's security concerns. Participants will have the skills necessary to identify, stop, and lessen cybersecurity risks while creating strong security procedures by the program's conclusion.
Course Objectives
The course aims to:
- Analyze how secure a system is
- Identify potential risks to the system
- Describe Identity and Access Management
- Explain the architecture of a security system
- Recognize the software development life cycle's impact on security
- React to a security breach with disaster recovery
- Perform a proper security audit both internally and externally
Course Outline
The course is structured into modules covering both theoretical and practical aspects:
- Introduction to Information Systems Security: Understanding the basics of cybersecurity, key concepts, and terminology.
- Security and Risk Management: In this module, Security and Risk Management, students will learn about Confidentiality, Integrity, and Availability. It will also go into detail on Security Governance and compliance requirments.
- Network Security and Architecture: Techniques to secure networks, including firewalls, VPNs, and intrusion detection systems.
- Access Control and Identity Management: Implementing access control measures and managing user identities securely.
- Asset Management: In this module, Asset Management, students will learn about protecting assets. The module will cover asset ownership and asset retention.
- Incident Response and Recovery Planning: Developing response strategies for cybersecurity incidents and ensuring rapid recovery.
- Data Protection and Cryptography: Exploring encryption methods and data protection regulations.
- Ethical Hacking and Penetration Testing: Learning the ethical aspects of hacking to detect and fix system vulnerabilities.
Target Group
This course is ideal for:
- IT professionals and network administrators seeking to advance their cybersecurity skills.
- Security consultants and analysts who need a broader understanding of information security.
- Business managers interested in enhancing their organization’s information security practices.
- Individuals preparing for information security certification exams and seeking professional growth in cybersecurity.
Program Cost
- 5-day program: €3700
- 10-day program: €6500
This course is available on various dates throughout the year. Upon request, the program can be tailored to fit your preferred schedule and location.
Organizers
The Geneva Institute of Business Management organizes this course with its European partners.