Certified Information Systems Security Architecture Professional (CISSP-ISSAP)
The CISSP-ISSAP certification is for CISSPs who specialize in designing security solutions and providing management with risk-based guidance to meet organizational needs.
Led by an (ISC)² authorized instructor, the Official (ISC)² CBK Training Seminar for the ISSAP provides a comprehensive review of information security concepts and industry best practices, covering the 6 domains of the ISSAP CBK:
- Access Control Systems and Methodology
- Communications and Network Security
- Security Architecture Analysis
- Technology Related Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)
- Physical Security Considerations
Several types of activities are used throughout the course to reinforce topics and increase knowledge retention. These activities include open ended questions from the instructor to the students, matching and poll questions, group activities, open/closed questions, and group discussions. This interactive learning technique is based on sound adult learning theories.
This training course will help candidates review and refresh their information security knowledge and help identify areas they need to study for the ISSAP exam and features:
- Official (ISC)² courseware
- Taught by an authorized (ISC)² instructor
- Student handbook
- Collaboration with classmates
- Real-world learning activities and scenarios
This course is intended for CISSPs who have at least 2 years of recent full-time professional work experience in architecture and are pursuing ISSAP training and certification to demonstrate mastery in security architecture to advance within their current information security careers. The training seminar is ideal for those working in positions such as, but not limited to:
- System architect
- Chief technology officer
- System and network designer
- Business analyst
- Chief security officer
- Define an architecture that will ensure adequate security and reliability for the organization information systems design.
- Identify and deploy physical access controls that will enable the complete information system security model to prevent, detect, and react to suspicious activity.
- Describe how cryptography is used to protect an organization’s data and communications from security threats.
- Explain how to select, implement, and monitor communications products according to company standards and policies.
- Develop a Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP) for an organization through an understanding of identifying adverse events that could potentially threaten an organization’s ability to thrive.
- Utilize hard and soft concepts to applying access control methodologies.