logo

CISSP - Information Systems Security Architecture Professional (ISSAP) (CS8503)

Our five-day CISSP-ISSAP training is a unique path allowing the acquisition of knowledge to design large-scale security architectures. It complements the subjects acquired in the general CISSP training (recommended prerequisite), dedicated to systems architects, business analysts, security directors, technology directors and network and system designers.

The six areas to be covered represent a plan to enhance the current security of the organization and make it possible to understand defense cybersecurity strategies, thus ensuring the confidentiality, integrity and availability of information resources.

Pohađajte naše obuke iz oblasti informatičke bezbednosti u Beogradu, putem virtuelne učionice (online, uživo) ili u vašim prostorijama (on-site).

Specijalni popusti se odobravaju prilikom prijave više učesnika koji istovremeno pohađaju obuku iz vaše kompanije, državni i neprofitni sektor, itd. Kontaktirajte nas da biste saznali više.

Termini obuke

Beograd
Grupa u formiranjuGrupa u formiranju
Datum na upit
1150€
 
Srpski
Novi Sad
Grupa u formiranjuGrupa u formiranju
Datum na upit
1150€
 
Srpski
Virtuelna učionica
Grupa u formiranjuGrupa u formiranju
Datum na upit
1150€
 
Srpski
1150€
Trajanje obuke: 
5 dana / 35 sati

Privatni trening

On-site / Online
Minimalan broj polaznika: 3
5 dana / 35 sati
Cena na zahtev
srpski ili engleski
Plan obuke: 

Module 1: Access Control Systems & Methodology

  • Control access to systems and data through understanding
  • Applying access control concepts, methodology, and techniques
  • Control techniques and policies
  • Access control administration
  • Identification and authentication techniques
  • Credentialing architecture
  • Design validation

Module 2: Communications & Network Security

  • Determine Communications Architecture
  • Determine Network Architecture
  • Protect Communications and Networks
  • Identify Security Design Considerations and Associated Risks

Module 3: Cryptography

  • Identify Requirements
  • Determine Usage
  • Identify Cryptographic Design Considerations and Constraints
  • Define Key Management Lifecycle
  • Design integrated cryptographic solutions

Module 4: Security Architecture Analysis

  • Identify Security Architecture Approach
  • Perform Requirements Analysis
  • Design Security Architecture
  • Verify and Validate Design

Module 5: Technology Related Business Continuity Planning (BCP) & Disaster Recovery Planning (DRP)

  • Incorporate Business Impact Analysis (BIA)
  • Determine Security Strategies for Availability and Recovery
  • Design Continuity and Recovery Solution

Module 6: Physical Security Considerations

  • Assess Requirements
  • Integrate Physical Security Products and Systems
  • Evaluate Solutions

Benefiti: 
  • Video snimak predavanja u periodu od 180 dana posle kraja obuke

  • Materijal u elektronskom obliku

  • Sertifikat o pohađanju kursa

Kontaktirajte nas za više informacija o ceni:

Eccentrix
Office: +381 11 71 38 192
Mobile: +381 65 31 38 195
E-mail: Jelena.Mijanovic@eccentrix.rs

Milutina Milankovića 9đ,
11070 Novi Beograd
www.eccentrix.rs

Eccentrix
Office: +381 11 71 38 192
Mobile: +381 65 31 38 197
E-mail: Boris.Gigovic@eccentrix.rs

Milutina Milankovića 9đ,
11070 Novi Beograd
www.eccentrix.rs