Loading... Please wait...

Certified Information Systems Security Professional (CISSP)® Course

Duration: 4 days

Exam Sybllabus: ISC2 CISSP CBK - 4th Edition ( The Latest )

CISSP® 認證被譽為資訊安全界的至高標準,並已取得美國國家標準學會(American National Standards Institute) 之有關資訊安全的ISO/IEC 17024證書標準。該ISO證書為全球專業人員資格認證標準,以確保不同範疇專業能力水平,使僱主更有信心地相信他們僱用的資訊安全人員,擁有所需要的技術水準與經驗,能有效地處理及執行企業的資訊安全系統及政策。

Course Overview

In this course, students will analyze a wide range of information systems security subjects that are organized into 8 domains for CISSP exam certification based on Latest ISC2 CISSP CBK 4th Ed.

為對應CISSP CBK最新考試範圍,本校CISSP課程己附加以下全新課題,另外並將其設計成獨立CPE課程,給己考獲CISSP之學員修讀,獲取CPE持續進修學分。(課題前括孤數字代表對應以上最新相關考試範圍,以下內容同時適用於CISA考試範圍)

  • (3.4) Virtualization , Container, Docker Security Issues and Protections
  • (3.5) Cloud Computing ( SaaS, PaaS and IaaS ) : e.g. Amazon Web Services, Microsoft Azure Security Architectures
  • (3.5) Database Security : NoSQL Database ( MongoDB, Redis etc ) , Apache HaDoop for Big Data Analyistic
  • (3.5) Large-scale parallel data system : OpenStack, Cloudera system architectures
  • (3.8) Assess and mitigate vulnerabilities in Internet of things (IoT) and embedded devices ( Arduino, Raspberry, NodeMCU )
  • (3.9) Cryptography Application : Cryptocurrency (Bitcoin, Etheruem etc), Block Chain Distributed Database Architectures
  • (4.1) Software Defined Network (SDN) , iSCSI SAN Security, TCP/IP IPv6 Security
  • (4.2) Mobile Security : API Security, Mobile App Access Control, Mobile Device Protection
  • (4.3) VoIP, Remote Meeting Technology, Virtual Application/Desktop, VLAN in Virtual Environment, TLS/SSL
  • (4.3) Virtualized network designs : SDN , virtual SAN, port isolation
  • (5.2) Singal Sign On (SSO) on Cloud, Two Factor Authentication (2FA) Implementation, SAML
  • (5.3) Identify as a service, Cloud Identity
  • (6.2) Security for Continuous Testing in DevOps, Test Coverage Analysis, Interface Testing ( API, UI, Physical )
  • (7.2) Security for Continuous Monitoring in DevOps
  • (7.4) Securing Virtual Assets ( VMs, vSAN, SDN ) and Cloud Assets
  • (8.1) Agile Project Management, SCRUM, DevOps ( Continuous Integration, Continuous Delivery and Continuous Deployment )
  • (8.2) Assess security impact of acquired/outsourced/cloud software.


Who Should Attend

This course is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and engineers, network administrators, information security specialists, and risk management professionals, who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career.

Course Objectives

Upon successful completion of this course, students will be able to:

  •   analyze information systems access control.
  •   analyze security architecture and design.
  •   analyze network security systems and telecommunications.
  •   analyze information security management goals.
  •   analyze information security classification and program development.
  •   analyze risk management criteria and ethical codes of conduct.
  •   analyze software development security.
  •   analyze cryptography characteristics and elements.
  •   analyze physical security.
  •   analyze operations security.
  •   apply Business Continuity and Disaster Recovery Plans.
  •   identify legal issues, regulations, compliance standards, and investigation practices relating to information systems security.


課程查詢 : 3568-7071




Our Newsletter