CISSP
Service Times: 9am and 10:30am
6399 North Wells Road, Bigtownville, CO 32748
Latest
  • Loading
f

Certified Information Systems Security Professional (CISSP)

Email Print Export to ical format

Venue:

Academy of Management & Science (AMS)
House # 89/E, Road # 13/C, Block # E, Banani, Dhaka 1213, Bangladesh
Telephone: +880 (2) 9891190, +880 (2) 8836875, Cell No: (88) 01680878839, (88) 01193070284

Resource Person

Mohammad Shahadat Hossain is an Information Technology & Security Professional with M.Sc. in Computer Science & over 15+ years of IT experience in Telecom, Bank, IT Service & Infrastructure Integration Support company, Multinational & local enterprises. Presently he is working as "National IT Consultant" for Cowater International Inc, which is the implementation partner of SCOPE Project under OCAG, Bangladesh part funded by CIDA. Before joining to Cowater Int Inc he was the Deputy Manager, IT Operation & Information Security at TM International, Bangladesh (AKTEL). He also worked at Islami bank Bangladesh Ltd as Network Administrator and at Spectrum Engineering Consortium Ltd as Sr. System Engineer.

A few of his major global professional accreditation are:

  • Certified Information System Auditor (CISA)
  • Certified Information System Security Professional (CISSP)
  • Certified Information Security Manager (CISM)
  • Certified Information Technology Manager (CITM)
  • Certified Payment Card Industries Security Implementer (CPISI)
  • IRCA Certified Provisional Auditor (ISO27001)
  • Certified Ethical Hacker (CEH)
  • Computer Hacking Forensic Investigator (CHFI)
  • ITIL Foundation Certification
  • Certified Data Center Professional (CDCP)
  • Sun Certified System Administrator (SCSA)
  • Cisco Certified Network Associates (CCNA)
  • Microsoft Certified Professional (MCP)

Workshop Details

CISSP training/course in Bangladesh
Venue:
Academy of Management & Science (AMS)
Location: House # 89/E, Road # 13/C, Block # E, Banani, Dhaka-1213, Bangladesh
Contact:
Telephone: +880-2-9891190
+880 (2) 8836875
Cell No: (88) 01193070284
(88) 01680878839

Who Can Attend

  • Security Consultant
  • Security Analyst
  • Security Manager
  • Security Systems Engineer
  • IT Director/Manager
  • Chief Information Security Officer
  • Security Auditor
  • Director of Security
  • Security Architect o Network Architect

Certification

Download

Certified Information Systems Security Professional (CISSP)

Overview:

Globally Recognized Expertise in the Field of Information Security If you plan to build a career in information security – one of today’s most visible professions –the Certified Information Systems Security Professional (CISSP®) credential should be your next career goal.

A CISSP is an information assurance professional who defines the architecture, design, management and/or controls that assure the security of business environments. The vast breadth of knowledge and the experience it takes to pass the exam is what sets a CISSP apart. The credential demonstrates a globally recognized level of competence provided by the (ISC)2® CBK®, which covers critical topics in security today, including cloud computing, mobile security, application development security, risk management and more.

CISSP was the first credential in the field of information to meet the stringent requirements of ISO/IEC Standard 17024. Not only is the CISSP an objective measure of excellence, but also a globally recognized standard of  chievement.

Prerequisite:

CISSP candidates must have a minimum of five years of direct full-time security professional work experience in

Duration:

5 Days/40 Hours

Course Objectives:

Benefits of the CISSP for Trainee:

  • Demonstrates a working knowledge of information security
  • Confirms commitment to profession
  • Offers a career differentiator, with enhanced credibility and marketability
  • Affords you exclusive benefits as an (ISC)2 member, including valuable resources such as peer networking and idea exchange
  • Indicates that certified information security professionals earn a worldwide average of 25% more than their non-certified counterparts, according to the Global Information Security Workforce Study
  • Fulfills government and organization requirements for information security certification mandates

Benefits of the CISSP for Your Employer:

  • Positions candidates on a level playing field as (ISC)2 certifications are recognized internationally
  • Provides increased credibility for your organization when working with vendors and contractors
  • Empowers employees with a universal language, circumventing ambiguity with industry-accepted terms and practices
  • Validates commitment and years of experience gained in the industry
  • Requires Continuing Professional Education (CPE) credits to ensure that personnel keep their skills current
  • Satisfies certification mandate requirements for service providers or subcontractors

Course Details:

The CISSP CBK consists of the following ten domains:

Access Control: A collection of mechanisms that work together to create a security architecture to protect the assets of the information system.

  • Concepts/methodologies/techniques
  • Effectiveness
  • Attacks

Telecommunications and Network Security: Discusses network structures, transmission methods, transport formats and security measures used to provide availability, integrity and confidentiality.

  • Network architecture and design
  • Communication channels
  • Network components
  • Network attacks

Information Security Governance and Risk Management: The identification of an organization’s information assets and the development, documentation and implementation of policies, standards, procedures and guidelines.

  • Security governance and policy
  • Information classification/ownership
  • Contractual agreements and procurement processes
  • Risk management concepts
  • Personnel security
  • Security education, training and awareness
  • Certification and accreditation

Software Development Security: Refers to the controls that are included within systems and applications software and the steps used in their development.

  • Systems development life cycle (SDLC)
  • Application environment and security controls
  • Effectiveness of application security

Cryptography: The principles, means and methods of disguising information to ensure its integrity, confidentiality and authenticity.

  • Encryption concepts
  • Digital signatures
  • Cryptanalytic attacks
  • Public Key Infrastructure (PKI)
  • Information hiding alternatives

Security Architecture and Design: Contains the concepts, principles, structures and standards used to design, implement, monitor, and secure, operating systems, equipment, networks, applications, and those controls used to enforce various levels of confidentiality, integrity and availability.

  • Fundamental concepts of security models
  • Capabilities of information systems (e.g. memory protection, virtualization)
  • Countermeasure principles
  • Vulnerabilities and threats (e.g. cloud computing, aggregation, data flow control)

Operations Security: Used to identify the controls over hardware, media and the operators with access privileges to any of these resources.

  • Resource protection
  • Incident response
  • Attack prevention and response
  • Patch and vulnerability management

Business Continuity and Disaster Recovery Planning: Addresses the preservation of the business in the face of major disruptions to normal business operations.

  • Business impact analysis
  • Recovery strategy
  • Disaster recovery process
  • Provide training

Legal, Regulations, Investigations and Compliance: Addresses computer crime laws and regulations; the investigative measures and techniques which can be used to determine if a crime has been committed and methods to gather evidence.

  • Legal issues
  • Investigations
  • Forensic procedures
  • Compliance requirements/procedures

Physical (Environmental) Security: Addresses the threats, vulnerabilities and countermeasures that can be utilized to physically protect an enterprise’s resources and sensitive information.

  • Site/facility design considerations
  • Perimeter security
  • Internal security
  • Facilities security

Training Calendar

<<  October  2017  >>
 S  M  T  W  T  F  S 
  1  2  3  4  5  6  7
  8  91011121314
15161718192021
22232425262728
293031    

Newsletter

AMS Campus Facilities

  • Two Air conditioned seminar halls with projector & audio system [Maximum Capacity up to 50 persons] including video recording capacity.
  • Two different PC Labs (Air conditioned)
  • Centralized server
  • Internet / WIFI facilities
  • Practice facilities in LABS
  • Online Exam Centre
  • Cafeteria & Own cook facility
  • Large lobby with natural surroundings
  • Huge Parking Space
  • Waiting Lounge
  • Distance education facilities
  • Printer, Scanner etc logistics facilities
  • Special Guest Room
  • Registration Booth Arrangement Space
  • 3 Star Accommodation arrangements for foreign guests on demand in walking distance from the center.
    ………and many more

Contact AMS

Academy of Management & Science (AMS)
House #450, Road # 31, New DOHS,Mohakhali, Dhaka-1206, Bangladesh
Cell No: (88) 01616004108
Email: This email address is being protected from spambots. You need JavaScript enabled to view it.

Academy Location

Testimonials

Show