CISSP Certification Training in Sydney

This course offers all the information which ensures that the security leaders get in-depth knowledge and understanding about the new threats, technologies, regulations, standards, and practices.

  • 5 Days Instructor-led Training*

  • 100% Money Back Guarantee**

  • 1-year e-learning access

Request a Quote

We value your privacy. We will never spam you.

What you get

  • 5-day immersive training in Sydney.
  • 1-year access to the audio-video lectures.
  • 100% Money back guarantee 

Course Outcomes

Skills

Increase your competence levels as an information security professional.

Alignment

Course is aligned to the CISSP certification exam syllabus as per (ISC)2

Outcome

Pass the CISSP certification exam by (ISC)2.

Our 100% Money Back Guarantee

We offer a no questions asked, 100% money back guarantee to all of our training participants. This guarantee covers you when you are dissatisfied with any aspect of the CISSP Certification Training, and communicate it to us via an email (support@greycampus.com) within 24 hours of the start of the classroom training program. It's that easy!

Course Curriculum

Introduction to the course
Introduction
CISSP Certification Goals
Security Professional Certification Value
Exam Common Body of Knowledge
Becoming a CISSP
Introduction
Cryptography Concepts Part1
Cryptography Concepts Part2
History of Cryptography
Cryptosystem Features
Encryption Systems Part1
Encryption Systems Part2
Substitution Ciphers
Symmetric Algorithms Part1
Symmetric Algorithms Part2
Asymmetric Algorithms
Message Integrity
Digital Signatures
Public Key Infrastructure Part1
Public Key Infrastructure Part2
Trusted Platform Module
Encryption Communication Levels
E-Mail Security
Internet Security
Cryptography Attacks
Introduction
Threat Mitigation Techniques
Geographical-Man Made and Political Threats
Site and Facility Design
Perimeter Security
Building and Internal Security
Secure Data Centers and Fire Detection Systems
Types of Power Issues
HVAC Guidelines
Equipment Security and Personal Security
Introduction
Security Model Concepts
System Architecture
Computing Platforms
Virtual Computing and Security Services
System Components
Memory Concepts
Enforcing Process Security and Multitasking
System Security Architecture
Security Models and Modes Part1
Security Models and Modes Part2
System Evaluation and Ass...
Certification and Accreditation
Security Architecture Threats
Database Security and Distributed Systems Security
Introduction
Access Control Concepts
Identification and Authentication
Password Types and Management
Ownership-Character-Physiological-Behavioral Factors
Biometric Considerations
Authorization Concepts Part1
Authorization Concepts Part2
User Accountability
Vulnerability Assessment
Penetration Testing and Threat Modeling
Access Control Categories-Types-Models and Administration
Provisioning Life Cycle and Access Control Monitoring
Access Control Threats
Introduction
System Development Life Cycle
Software Testing and Validation
Software Development Security Best Practices
Software Development Methods
Programming Languages
Database Architecture and Models
Database Interface Languages
Data Warehouse-Mining and Threats
Database and Application Access Control
Monitoring for Problems
Software Threats and Security
Introduction
Principles and Terms
Security Frameworks & Methodologies Part1
Security Frameworks & Methodologies Part2
Risk Assessment
Asset Values-Vulnerabilities and Threats
Quantitative Risk Analysis
Safeguard Selection
Risk Management
Security Governance Components
Security Policies
Classification Life Cycle
Responsibilities and Roles
Personnel Security
Security Awareness Training
Introduction
OSI and TCIP Models Part1
OSI and TCIP Models Part2
IP Addressing
Transmission Methods
Types of Cabling
Network Topologies
Network Protocols and Services
Network Routing and Devices
Network Connection Types Part1
Network Connection Types Part2
Network Authentication
Wireless Technologies
WLAN Security Methods
Network Threats and Cabling Behaviors
Introduction
Operation Security Concepts
Protecting Tangible and Intangible Assets
Asset and Media Management
Storage Options
Network and Resource Management
Incident Response and Change Management
Patch Management-Audit and Review
Threats and Preventative Measures
Trusted Paths-Trusted Recovery and System Hardening
Monitoring and Reporting
Introduction
Business Continuity and Disaster Recovery Concepts Part1
Business Continuity and Disaster Recovery Concepts Part2
BIA Development
Business Continuity Planning
Preventive Controls
Recovery Strategies Part1
Recovery Strategies Part2
Data Backup Types
Data Recovery Terms
Critical Teams and Duties
BCP Testing
Introduction
Digital Crime
Computer Crime Concepts
Major Legal Systems
Intellectual Property Law
Privacy Part1
Privacy Part2
Liability
Incident Response
Forensic and Digital Investigations Part1
Forensic and Digital Investigations Part2
Evidence Part1
Evidence Part2
Security Professional Ethics
Course Outro

Reviews

Our Training Venue in Sydney

Victory Offices Pty Ltd
Level 25,300 Barangaroo Avenue, SYDNEY NSW 2000

Sydney is the most populous city in Australia and the state capital of New South Wales. Sydney has an advanced market economy with strengths in finance, manufacturing, and tourism. This city has foreign banks and multinational corporations. There are many businesses based in Sydney and it is the headquarter of many multinationals companies. If you are staying here then you must get certified in PMP, ITIL or Six Sigma for a great career.