What will you learn?
- 9Helicopter view of all major information security domains and how they interconnect;
- 9Deep understanding of each domain with use cases and multiple expert trainers per domain;
- 9Practical application of the domains in a European, Netherlands’ and Belgian context;
- 9Ultimate preparation for the CISSP® adaptive exam;
- 10 course days
- 40 hours of self study
- €5.450,- excluding VAT
IT infrastructure &
Arjen has been working as a network infrastructure consultant since 1997. Based on his expertise, he advises and designs data networks in which security was a big part of the designs. In recent years, Arjen has been active as a freelancer so that he builds up a broad knowledge of the latest developments regarding (software defined) networks and their security by being active within several organizations.
Because Arjen has worked as a consultant in many large and small organizations, he understands how the theory works out in practice. Adding this information brings the content to life and informative discussions are created during the training sessions.
Rob van der Staaij
Identity & Access Management
Rob has more than twenty years of experience in many organizations and sectors. Rob is also affiliated with the University of Groningen, Faculty of Law, Department of Criminal Law and Criminology, where he focuses on cyber crime and cyber security. He gives presentations at international conferences and has published dozens of articles and various books.
Rob is analytical and has a broad knowledge of cyber security. He finds it a challenge to explain complex subjects in clear and simple language.
Theo Heinsbroek has over 10 years of experience in the field of information security, identity and access management, risk management and IT audit. In these areas, Theo advises clients on compliance with laws and regulations, risk management and operational effectiveness. Larger organizations in various branches in the Netherlands belong to the clientele. SeKuRiGo helps organizations make strategic and tactical choices in the areas of information security, identity and access management, risk management and IT audit.
About the CISSP® Preparation course
During this CISSP® Preparation Course you will become a broadly trained specialist in the field of information security. After completion, you’ll have thorough knowledge of the 8 CISSP® domains, you’ll able to apply them in your working environment and you are fully prepared to take the international adaptive – based CISSP® exam.
There are many CISSP® training providers today, most of them mainly focused on the exam. We believe that both the CISSP® exam and its content should not be underestimated. Just practicing exam questions and studying your book is insufficient to truly grasp its’ coverage and utilize its’ full potential in the real world. In addition to this, CISSP® is developed and governed in the US, there where students are Dutch, Belgian, European.
This is why the Security Academy has chosen to:
- Develop a 10 – day CISSP® training over a period of 10 weeks
- Allocate multiple trainers that are each an expert in a specific domain covered
- Create extensive use cases and practice exam questions per each domain covered
- Provide special attention to the practical application of the domains in the European, Netherlands’ and Belgian context
- Deliver an extensive CISSP®-practice exam on the last day of training, including an evaluation and discussion afterwards
Basic knowledge of information security is recommended. If you do not have this yet, we recommend that you follow the Information Security Foundation training prior to this training.
In addition, having basic knowledge about security & technology is desirable. The IT Security Foundation course has been specially developed for that purpose so that you also acquire the correct technical knowledge. For those that want to certify: Take note that in order to do so, passing the exam is insufficient. ISC2 requires at least 5 years of recent full-time professional work experience in 2 or more of the 8 domains of the CISSP CBK (knowledge domains).
Who should attend?
This course is intended for students who are involved in information security and that want to have a thorough knowledge of its many domains and / or prepare themselves for CISSP® exam. This includes but is not limited to:
- Security Consultants
- Security Managers
- IT Directors/Managers
- Security Auditors
- Security Architects
- Security Analysts
- Security Systems Engineers
- Chief Information Security Officers
Classroom training or Online Live?
- Classroom Training: You’re our guest and threated as such
When you take our Classroom Training you are our guest, and that’s how we’ll threat you! You’ll train in an inspiring training environment handpicked based on the highest quality standards. All trainings include a delicious lunch, when you register to your training you can indicate any dietary requirements that we should consider.
- Online Live Training: Prepare, train and certify from the comfort of your home or work
For those of you preferring an online experience, we offer Online Live Training through the SECO – Institute Online Learning Platform based on BigBlueButton, a secure platform specifically designed for Online Training that requires collaboration and (hands on) exercises. Course materials are delivered via a designated Student Portal prior to your training. For the SECO – Institute trainings, the examination is also conducted online via a certified Proctor. Everything you need to prepare, train and certify from the comfort of your home or work.
* Our classroom trainings are delivered in Dutch or English, depending on the composition of the student group
* Our Online Live Trainings are delivered either in Dutch or in English. Make sure that you register for the right class!
The following is included:
- CISSP® Official Study Guide from Sybex
- Additional course materials (slides, use cases, exam questions)
- Practice exam, evaluation and discussion on the last day
- A delicious lunch
Module 1 – Security and Risk Management
The aim of module 1 is to provide the candidate with knowledge and understanding of policies, methods, concepts, structures and standards for effective and efficient protection of company assets. This module also recognizes the softer skills with regards to leadership, organizational structures, behavior and security awareness
- Security governance
- BCP & DRP
- Risk management
- Education, training and awareness
Module 2 – Asset Security
The aim of module 2 is to allow the candidate to develop knowledge and understanding of concepts, principles, structures and standards with regard to securing and monitoring company assets and data and ensure a sufficient level of its confidentiality, integrity and availability.
- Asset management
- Data management
- Information classification
- Data security controls
Module 3 – Security Architecture and Engineering
The aim of module 3 is to provide the candidate with knowledge and understanding of the concepts, principles, structures and standards required to design and implement secure applications, operating systems, equipment and networks.
- Engineering lifecycle
- Security architectures and models
- Vulnerabilities of architectures, in software and systems
- Vulnerabilities in embedded and mobile devices
- Application and use of cryptography
- Site and facility design, planning and operations
Module 4 – Communication and Network Security
The aim of module 4 is to provide the candidate with knowledge and understanding of network architectures, communication- and transmission methods, protocols and measures to guarantee security (confidentiality, integrity, availability).
- Network architecture and design
- Multi-layer and converged protocols
- Security network components
- Secure communication channels
- Network attacks
Module 5 – Identity and Access Management (IAM)
The aim of module 5 is to provide the candidate with knowledge and understanding in the field of identification, authentication, authorization and accounting. Which methods and techniques play a role in access control?
- Physical & logical access to assets
- Identification & authentication of people
- Identity management
- Authorization mechanisms
- Access control attacks
- Attribute-Based Access Control (ABAC)
Module 6 – Security Assessment and Testing
The aim of module 6 is to provide the candidate with knowledge and understanding in the field of research into vulnerabilities in IT systems and the identification of the risk thereof. Various test and evaluation methods and techniques are reviewed.
- Assessment & test strategies
- Code review and interface testing
- Collection of security process data
- Internal and external audits
Module 7 – Security Operations
The aim of module 7 is to provide the candidate with knowledge and understanding in the field of security operations and operations security. The first concept means that security measures are enforced and enforced during the day-to-day operations. The second concept addresses the security and control of information assets in centralized and distributed environments.
- Concepts an foundation of security operations
- Investigation and evidence collecting
- Incident handling and response
- Reporting and documentation
- Patch and vulnerability management
- Change and configuration management
- Disaster recovery
- Asset management
- Security training and awareness
- Emergency management
- Digital forensics tools, tactics, and procedures
Module 8 – Software Development Security
The aim of module 8 is to provide the candidate with knowledge and understanding in the field of application security. Vulnerable applications can lead to attacks on its systems to a profound level. Software must therefore be designed with security in mind.
- Software development security
- Security in the software environment
- Software protection mechanisms
- Effectiveness of software security
- Assessment of software security
- Define and apply secure coding guidelines and standards
About the Exam
The CISSP® exam is taken by (ISC) 2 and is not included in the course. The exam lasts three hours and consists of 100 to 150 English open and multiple choice questions. The adaptive testing style of the exam determines on the basis of the answer you give to the first question what the rest of the exam will look like, and thus responds to your understanding of the material.
The costs for the exam are approximately € 520. After successful completion of the CISSP® exam, if you have sufficient work experience, you can apply for your CISSP® title at (ISC) 2.
This CISSP® exam is a theoretical exam that requires a lot of detailed knowledge. This means that there is still a lot of time to be spent preparing for the exam after the course. The mentioned stated amount of self-study in preparation for the exam is a minimum. The actual time required may be higher and varies from person to person.
- Course times: 9 am to approximately 4:30 pm. The coffee is ready at 8:30.
- Lunch is included and consists of a buffet with, among other things, fresh sandwiches. Do you have allergies or dietary requirements? Please communicate this in time.
- Training location:
Quinten Matsijslei 25
- By participating in a course or training you agree with our terms and conditions
Book as incompany or stay up to date
Book as incompanyStart date in accordance
- At your location or ours
Not right nowbut keep me posted
- Enter your e-mail and preferences