Certified Information Systems Security Architecture Professional (CISSP-ISSAP)

Advance your expertise in security architecture

Course Code : 2516

Overview

The Information Systems Security Architecture Professional (ISSAP) is a CISSP who specializes in designing security solutions and providing management with risk-based guidance to meet organizational goals. They are skilled in facilitating the alignment of security solutions within the organizational context, such as, vision, mission, strategy, policies, requirements, change and external factors.

This training is a comprehensive and in-depth review of information security architectural concepts and industry best practices in the design, deployment and maintenance of an information security program. The course covers the six specific domains of the CISSP-ISSAP Common Body of Knowledge (CBK), helping participants gain a greater depth of knowledge in information security in the areas of ISSAP. The course trains participants to successfully leverage and deploy architectural frameworks and to design robust, secure systems that meet current and future business needs, configuring and operating secure systems and be a successful architecture professional.

Schedule Classes

Looking for more sessions of this class?
isc2

Course Delivery

This course is available in the following formats:

Live Classroom
Duration: 6 days

Live Virtual Classroom
Duration: 6 days

What You'll learn

  • Apply architectural frameworks in an enterprise security program
  • Design and implement identity management systems
  • Evaluate access control systems
  • Support governance and risk management
  • Integrate security concepts into application development
  • Connect secure networks
  • Operate and maintain information processing systems and networks

Outline

  • Design identity management and lifecycle
  • Design access control management and lifecycle
  • Determine security operation capability requirements and strategy
  • Design continuous security monitoring
  • Design continuity, availability and recovery solutions
  • Define security operations
  • Integrate physical security controls
  • Design incident management capabilities
  • Secure communications and networks
  • Determine infrastructure security capability requirements and strategy
  • Design layer 2/3 architecture
  • Secure common services
  • Architect detective, deterrent, preventative and control systems
  • Architect infrastructure monitoring
  • Design integrated cryptographic solutions
  • Architect for governance and compliance
  • Design threat and risk management capabilities
  • Architect security solutions for off-site data use and storage
  • Operating environment
  • Identify security architecture approach
  • Verify and validate design
  • Review software development lifecycle (SDLC) integration of application security architecture
  • Review application security
  • Determine application security capability requirements and strategy
  • Design application cryptographic solutions
  • Evaluate application controls against existing threats and vulnerabilities
  • Determine and establish application security approaches for all system components

 

 

View More

Prerequisites

There are no mandatory prerequisites for this course, however, completing the Foundations of Agile course prior to taking up this course would be beneficial.

Who Should Attend

The course is highly recommended for –

  • System architects
  • Chief technology officers
  • System and network designers
  • Business analysts
  • Chief security officers

Interested in this course? Let’s connect!

Certification

This course prepares participants for the certification examination for the CISSP-ISSAP certification. The details of the exam are as below –

Length of exam3 hours
Number of questions125
Question formatMultiple choice questions
Passing grade700 out of 1000
Exam availabilityEnglish

 

The examination evaluates the participant’s skills and knowledge in six specific domains. The weightage of these domains in the examination is as below –

DomainWeightage
Identity and access management architecture19%
Security operation architecture17%
Infrastructure security19%
Architect for governance, compliance and risk management16%
Security architecture modeling14%
Architect for application security15%
Total100%

Customer Reviews

Name
Email
Rating
Comments

No reviews yet