Comprehensive course analysis
Who should attend
- IT or Systems Security Managers
- Project Managers
- Systems or Network Engineers
- Systems Analyst or Auditor
- Systems or Network Consultant
- Senior Systems or Database Administrators or Programmers
- Anyone who wishes to refresh and broaden their knowledge in all 8 CISSP® CBK® domains to study for the CISSP® exam
a) CISSP Credential Minimum full-time work experience requirement will be 4 years plus a graduate degree or 5 years experience without a graduate degree. Experience must be in at least 2 of the 8 domains covered by the CISSP® CBK®
b) Associate of (ISC)2 Credential For those who do not meet the professional experience requirements, you can still become an Associate of (ISC)2 by completing and submitting the examination form and successfully passing the CISSP examination
About the course
For individuals in the field of information security, the Certified Information Systems Security Professional (CISSP®) credential will render the recognition of their expertise and skills. The globally recognised standard is ideal for experienced information security professionals, including those in mid and senior level managerial positions.
Positions in many large corporations and government agencies worldwide now require certification, and accredited practitioners have a higher earning potential together with greater career prospects. As a member of the International Information Systems Security Certification Consortium, Inc. or (ISC)2, you will be part of an elite network of certified information security professionals.
The official (ISC)2 CISSP® CBK® training seminar, the exclusive review course endorsed by (ISC)2, is the most comprehensive and complete review of information systems security concepts and industry best practices. It covers the 8 CISSP® CBK® domains and serves as a good learning tool for mastering concepts and topics related to all aspects of information systems security.
At the end of the course, participants will be able to:
- Master concepts and topics related to all aspects of information systems security in the 8 CISSP® CBK® domains
What Will Be Covered
- Security & risk management
- Asset security
- Security engineering
- Communication & network security
- Identity & access management
- Security assessment & testing
- Security operations
- Software development security
Chuan-Wei is the Chief Cybersecurity Technology Officer with STEE-InfoSec and has been in the IT industry since 1992, and has more than 18 years of experience in information security. Prior to joining STEE-InfoSec, he was the Executive Security Advisor - IBM Security APAC, who was honored as: 2...
Educational Qualifications/Professional Certifications Master’s Degree in Business Administration, University of Melbourne Master’s Degree in Computer Science & Information Systems, National University of Singapore Bachelor of Applied Science (Computer Technology), Nanyang Technological Univ...
Leong Kai Seng is currently working as the Director (Security Implementation & Management Services) in Integrated Health Information Systems Pte Ltd (IHIS) and responsible for driving cybersecurity technology exploration, implementation and operation for the public healthcare. He is also in...
Christopher Lek has more than 17 years of IT experience covering telecommunication industry, banking sector as well as global conglomerate. He has managed different roles from Governance, Risk management, Security architecture to Cyber defense. He is currently Director of Cyber Security for Centr...
Max has more than 15 years of leadership experience in cybersecurity, technology risk management, data protection, compliance, IT governance and technological audit. He served customers across the Asia Pacific and Japan region empowered them with pragmatic and innovative resolution addressing sec...
Kok Yin with 15 years of experience in numerous projects specifically in IT Security, vulnerability assessments, Infrastructure review, ITGC reviews and business process reviews which spans across different industries. Has led numerous IT audit and security assignments including review of IT bus...
Read more about Cybersecurity
Because of COVID-19, many providers are cancelling or postponing in-person programs or providing online participation options.
We are happy to help you find a suitable online alternative.