CISSP Courses South Africa

CISSP Courses South Africa

CISSP Courses South Africa

No Comments on CISSP Courses South Africa

CISSP Courses South Africa

Certified Information Systems Security Professional (CISSP)

South Africa is a country on the southernmost tip of the African continent, marked by several distinct ecosystems. Inland safari destination Kruger National Park is populated by big game. The Western Cape offers beaches, historicol winelands around Stellenbosch to Paarl, jagged cliffs at the Cape of Good Hope, lush forest and lakes along the Garden Route, and beneath flat-topped Table Mountain is the city of Cape Town.

CISSP Training South Africa

From sources across the web
Security and risk management; Asset security; Security engineering; Communications and network security; Identity and access management; Security assessment

Frequently asked questions about the CISSP Courses South Africa.

Why Learn Certified Information Systems Security Professional (CISSP)?

Overall CISSP (Certified Information Systems Security Professional) is an independent information security certification granted by the International Information System Security Certification Consortium, also known as (ISC)².

When is Information Systems Security Professional Courses in South Africa Offered?

Overall learn Advanced security anytime and anywhere. We have 3 training options and we have award-winning IT courses. In turn identify and implement client side and integration technologies. Thus learn how to create and manage your own security features.

Part-Time

Fast forward your career in the IT industry with a part-time Security courses at School of IT. All in all the Part-time CISSP courses that allow working professionals to transition into a new skill set while working. In turn at School of IT we are agile and can customize a data analyst course to the individual. Start anytime and choose your hours!

Full Time

Are you ready to start a career in IT? In turn learn about security and cyber security as a full time student at School of IT. Thus beginning your career as a Cyber Security Analyst. Start anytime and manage your own contact hours with your mentor!

High School

In addition prepare for the future by learn about advanced security for networks while you’re still in high school. Have the option to get internationally accredited and recognized before you even finish school!

Corporate

All in all upskill yourself or your company by learning about about cybersecurity while you’re working. Thus no matter where you are, you can upskill yourself and get internationally accredited and recognized in under 3 months!

CISSP Course Objectives

Overall by the end of the CISSP Certification Course, Students will have knowledge in:

  • Understand and Apply Security Concepts
  • Evaluate and Apply Security Governance Principles
  • Determine Compliance and Other Requirements
  • Legal and Regulatory Issues that Pertain to Information Security in a Global Context
  • Requirements for Investigation Types
  • Develop, Document, and Implement Security Policy, Standards, Procedures, and Guidelines
  • Identify, Analyse, and Prioritise Business Continuity (BC) Requirements
  • Contribute to and Enforce Personnel Security Policies and Procedures
  • Understand and Apply Risk Management Concepts
  • Understand and Apply Threat Modelling Concepts and Methodologies
  • Apply Supply Chain Risk Management (SCRM) Concepts
  • Establish and Maintain a Security Awareness, Education, and Training Program

CASP+ Course Objectives

Overall by the end of the CASP+ Course, Students will have knowledge in:

CompTIA Advanced Security Practitioner (CASP+)​ Course Outline

Module 1 – Supporting IT Governance and Risk Management

  • Identify the Importance of IT Governance and Risk Management
  • Assess and Mitigate Risk
  • Integrate Documentation into Risk Management

Module 2 – Leveraging Collaboration to Support Security

  • Facilitate Collaboration Across Business Units
  • Secure Communications and Collaboration Solutions

Module 3 – Using Research and Analysis to Secure the Enterprise

  • Determine Industry Trends and Their Effects on the Enterprise
  • Analyse Scenarios to Secure the Enterprise

Module 4 – Integrating Advanced Authentication and Authorisation Techniques

  • Implement Authentication and Authorisation Technologies
  • Implement Advanced Identity and Access Management

Module 5 – Implementing Cryptographic Techniques

  • Select Cryptographic Techniques
  • Implement Cryptography

Module 6 – Implementing Security Controls for Hosts

  • Select Host Hardware and Software
  • Harden Hosts
  • Virtualise Servers and Desktops
  • Protect Boot Loaders

Module 7 – Implementing Security Controls for Mobile Devices

  • Implement Mobile Device Management
  • Address Security and Privacy Concerns for Mobile Devices

Module 8 – Implementing Network Security

  • Planning Deployment of Network Security Components and Devices
  • Planning Deployment of Network-Enabled Devices
  • Implementing Advanced Network Design and Network Security Controls

Module 9 – Implementing Security in the Systems and Software Development Lifecycle

  • Implement Security throughout the Technology Lifecycle
  • Identify General Application Vulnerabilities
  • Identify Web Application Vulnerabilities
  • Implement Application Security Controls

Module 10 – Integrating Assets in a Secure Enterprise Architecture

  • Integrate Standards and Best Practices in Enterprise Security
  • Select Technical Deployment Models
  • Integrate Cloud-Augmented Security Services
  • Secure the Design of the Enterprise Infrastructure
  • Integrate Data Security in the Enterprise Architecture
  • Integrate Enterprise Applications in a Secure Architecture

Module 11 – Conducting Security Assessments

  • Select Security Assessment Methods
  • Perform Security Assessments with Appropriate Tools

Module 12 – Responding to and Recovering from Incidents

  • Prepare for Incident Response and Forensic Investigations
  • Conduct Incident Response and Forensic Analysis

Cyber Security Objectives

Course Objectives.

By the end of the Cyber Security course, students will have usable knowledge of the following:

  • Overall learn fundamental principles of cybersecurity management.
  • Actively learn how to scan networks.
  • All in all Learn to design a secure network topologies.
  • Understand procedures for threat analysis.
  • In turn troubleshoot various security systems.
  • Learn basic principles of cybersecurity management.
  • Understand cybersecurity culture.
  • All in all evaluate risks and threats.
  • Learn corporate governance, policies and the world wide web regulations.

Career Prospects

The career prospects for CISSP graduates are excellent and high in demand. Computers is everywhere: on all platforms and devices and in all countries around the world!

  • Security Analyst.
  • Security Engineer.
  • Security Architect.
  • Security Administrator.
  • Security Software Developer.
  • Cryptographer.
  • Cryptanalyst.
  • Security Consultant.

Alternative Courses

About the author:

Business Info

info@schoolofit.co.za
+2782 696 7749
155 Main Road, Somerset West, 7130

Business Contact Times

Mon to Thur: 9am to 5pm SAST
Fri: 9am to 4pm SAST

Company Details

The School of IT International Pty Ltd
Enterprise no: 2019/278233/07
Tax no: 9227879237

Connect

    Subscribe to our newsletter today to get discounts off your next course!

Follow us

The School of IT International Copyrights. © 2015 - 2024

Back to Top