Refine Your Search
...
Explore Financial Academy
About the Academy
Discover our Rich, 60-Year Journey
Jadarat
A Comprehensive System for Skill and Knowledge Development
Governance
Meet our Inspiring Leadership
Success Stories
Check out our Clients’ Reviews and Testimonials
...
This training program for the CISSP Certification, a pinnacle journey for cybersecurity professionals aiming to validate their expertise and ascend in their careers. Over six days, encompassing 66 hours of immersive instruction, this program demystifies the CISSP certification, ensuring participants are exam-ready with a deep understanding of all eight domains of cybersecurity. From security and risk management principles to intricate details of security engineering and software development security, you will gain insights into asset security, dive into the complexities of security engineering, and explore the nuances of communication and network security. The program also emphasizes the importance of identity and access management, security assessment and testing, security operations, and much more. The LDR414 program employs various training methodologies including lectures and simulation tests for professional certifications exams, ensuring a dynamic and engaging learning experience. By the end of this program, you will be prepared to take significant leadership roles in cybersecurity, developing a holistic understanding of information security best practices, frameworks, and strategies to protect organizations from cyber threats. Join us in shaping the future of cybersecurity leadership.
This training program for the CISSP Certification, a pinnacle journey for cybersecurity professionals aiming to validate their expertise and ascend in their careers. Over six days, encompassing 66 hours of immersive instruction, this program demystifies the CISSP certification, ensuring participants are exam-ready with a deep understanding of all eight domains of cybersecurity. From security and risk management principles to intricate details of security engineering and software development security, you will gain insights into asset security, dive into the complexities of security engineering, and explore the nuances of communication and network security. The program also emphasizes the importance of identity and access management, security assessment and testing, security operations, and much more. The LDR414 program employs various training methodologies including lectures and simulation tests for professional certifications exams, ensuring a dynamic and engaging learning experience. By the end of this program, you will be prepared to take significant leadership roles in cybersecurity, developing a holistic understanding of information security best practices, frameworks, and strategies to protect organizations from cyber threats. Join us in shaping the future of cybersecurity leadership.
Banking
Capital Market
Insurance
Financing
+3
Signature Programs
Not Exist
Lecture
Practical Implementation +1
Lecture
Practical Implementation
Exercises and assignments
Simulation Test for professional exam
Cyber Security
Information Technology +3
Cyber Security
Information Technology
Project Management
Risk Management
Internal Audit
This provides you with the opportunity to select the available times that suit you best for participation in our program. These times represent slots during which we are ready to welcome you and provide assistance and guidance.
In Class Training
Overview of the 8 Domains
Domain 1: Security and Risk Management
Domain 2: Asset Security
Domain 3: Security Engineering
Domain 4: Communication and Network Security
Domain 5: Identity and Access Management (IAM)
Domain 6: Security Assessment and Testing
Domain 7: Security Operations
Domain 8: Software Development Security
Domain 1: Security and Risk Management
Confidentiality, integrity, availability, authenticity, and non-repudiation
Security governance principles
Compliance
Supply Chain Risk Management (SCRM) concepts.
Legal and regulatory Issues
General Data Protection Regulation (GDPR)
California Consumer Privacy Act
Software Bill of Materials (SBOM)
Ethics
Policies, standards, procedures, and guidelines
Risk management concepts.
Product tampering and counterfeits
Threat modeling
Security champions
Gamification
Security Operations Center (SOC) reports
Education, training, and awareness
In Class Training
Domain 2: Asset Security
Data and asset classification
Tangible and intangible assets
Data owners
System owners
Business/Mission owners
Privacy
Data processors
Data remanence
Limitation on collection of sensitive data
Digital Rights Management (DRM)
Data retention
Data destruction
Data Loss Prevention (DLP)
Cloud Access Security Broker (CASB)
Baselines
Scoping and Tailoring
omain 3: Security Engineering (Part 1)
Secure design principles
Security models
Controls and countermeasures
Virtualization
Microservices
Containerization
Serverless
Trusted Platform Module (TPM)
Industrial Control Systems (ICS)
Embedded systems
Database security
Cloud computing
Secure Access Service Edge (SASE)
Supervisory Control and Data Acquisition (SCADA)
eXtensible Markup Language (XML)
OWASP
he Internet of Things
In Class Training
Facility design considerations
Physical security
Domain 4: Communication and Network Security
Voiceover IP
Content distribution networks
Virtual routing and forwarding
Virtual domain
Network Functions Virtualization (NFV)
Remote meeting technology
Telecommuting
Port isolation
VLANs
Software-defined networks
Micro-segmentation
Virtual eXtensible Local Area Network (VXLAN)
Software-Defined Wide Area Network (SD-WAN)
In Class Training
Domain 5: Identity and Access Management (IAM)
Physical and logical access
Credential management systems
Just-In-Time (JIT)
SSO
LDAP
Multi-factor authentication
Password-less authentication
Biometrics
Accountability
Session management
SAML
Credential management
Third-party identity services
On-premises, cloud, and hybrid identity
Provisioning
In Class Training
Security testing strategies
Internal and third-party audits
Operational, criminal, civil, and regulatory investigations
eDiscovery
Incident management
Firewalls
IDS and IPS
Honeypots and honeynets
Vulnerability management
Change management processes.
Recovery strategies
Disaster recovery processes
Disaster recovery plans
In Class Training
Domain 8: Software Development Security
Software capability maturity models
Change management
DevOps
DevSecOps
Scaled Agile Framework (SAFe)
Software Component/Composition Analysis (SCA)
Interactive Application Security Test (IAST)
Continuous Integration/Continuous Delivery (CI/CD)
Security Orchestration, Automation, and Response (SOAR)
Security vulnerabilities
Secure coding
Code repositories
Programming interfaces
Software-defined security
Security of Application Programming Interfaces (APIs)
Acquire knowledge and strategies to confidently tackle the CISSP® certification exam, focusing on the latest 2024 exam updates.
Master the principles of security governance, compliance, legal and regulatory issues, including GDPR and supply chain risk management concepts.
Gain insights into data and asset classification, ownership, and data security principles including privacy, DRM, and data destruction methods.
Explore secure design principles, security models, and controls for safeguarding enterprise assets and software, emphasizing virtualization, cloud computing, and IoT security.
Develop a deep understanding of network architecture, including the OSI model, TCP/IP protocols, network devices, and secure network design and implementation.
Learn to manage access controls, identity services, and authentication mechanisms, ensuring secure access to resources and data.
Acquire the ability to conduct comprehensive security control testing, vulnerability assessments, and penetration testing to identify and address security gaps.
Enhance skills in incident response, forensics, logging, monitoring, and the management of security operations for effective threat detection and response.
Understand the importance of securing the software development lifecycle, including the application of secure coding practices, software assessment, and the use of DevSecOps for security integration.
Prepare to take on significant leadership roles in cybersecurity by developing a holistic understanding of information security best practices, frameworks, and strategies to protect organizations from cyber threats.