Our CISA training course is expert led and will allow you to gain first hand experience and an understanding of key topics in preparation for taking the CISSP certification exam thereby gaining a deep knowledge and understanding of new threats, technologies, regulations, standards, and practices
Aligning security to organisational objectives
Employing fundamental security principles
Managing security policies, standards and procedures
Applying risk management concepts
Assessing threats and vulnerabilities
Performing risk analysis and control
Preserving the business
Adhering to Business Continuity Management Code of Practice and Specifications
Performing a business impact analysis
Investigating legal measures and techniques
Reviewing intellectual property, liability and laws
Differentiating traditional and computer crime
Addressing ethical behaviour and compliance
Examining security models and frameworks
The Information Security Triad and multi-level models
Investigating industry standards: ISO 27001/27002
Exploring system and component security concepts
System design principles, capabilities, and limitations
Certification and accreditation criteria and models
Protecting information by applying cryptography
Detailing symmetric and asymmetric encryption systems
Ensuring message integrity through hashing
Uncovering threats to cryptographic systems
Safeguarding physical resources
Designing environments to resist hostile acts and threats
Denying unauthorised access
Identifying, categorising and prioritising assets
Applying security controls to assets
Protecting data through proper handling
Defining a secure network architecture
TCP/IP and other protocol models
Protecting from network attacks
Examining secure networks and components
Identifying wired and wireless technologies
Implementing firewalls, proxies and tunnels
Controlling access to protect assets
Defining administrative, technical and physical controls
Implementing centralised and decentralised approaches
Investigating biometric and multi-factor authentication
Identifying common threats
Designing and conducting security assessment strategies
Leveraging the role of testing and auditing to analyse the effectiveness of security controls
Differentiating detection and protection systems
Conducting logging and monitoring activities
Distinguishing between the roles of internal and external audits
Defining secure account management
Maintaining operational resilience
Managing security services effectively
Leveraging and supporting investigations and incident response
Differentiating detection and protection systems
Developing a recovery strategy
Designing a disaster recovery plan
Implementing test and maintenance processes
Securing the software development life cycle
Applying software development methods and security controls
Highlighting threats: Cross-Site Scripting (XSS), JavaScript attacks and Buffer Overflow
Addressing database security concepts and issues
See why people choose JBI
08/02/2018: The need for increased application security is dramatically changing the way software is built – for the better. By prioritising security during...
22/01/2018: The new Global Data Protection Regulation (GDPR) promises to be the biggest change in corporate information security since the original Data...
15/01/2018: As 2018 gets under way, now is the perfect time to revisit the OWASP 2017 conference – and apply the best-practice guidelines discussed at the...
19/10/2017: A leading Financial Services organisation was keen to get several of its teams working consistently in an "Agile" way. Agile is an iterative...
13/10/2017: The BBC, who have a very substantial investment in technology, were keen to improve the quality of software development: to instil developers...
07/10/2017: This client was expanding its capability to deliver technical training across EMEA. It had recently acquired a large technology company which...
PRIVATE COURSES
Bring a JBI course to your office
and train a whole team onsite
0800 028 6400 or request quote
You can customise this course to
suit your exact needs here
0800 028 6400 or request quote
Get in touch
0800 028 6400
Threat Modelling for Developers
Secure coding for Java and Javascript
Secure coding in ASP.NET
Secure coding in PHP
OWASP 2017 & PCI Compliance
GDPR
Excellent feedback, consistently !
"great tips help reduce build times"
"we got access to exclusive content"
"Short course meant less time off"
"what an inspiring trainer !"
"colleagues at 2 sites joined via web"
"I passed my exam the next day"
Subscribe to our Newsletter – Receive the latest info on Tech courses & insights Subscribe