Course Description

This program provides participants with a comprehensive understanding of information security principles, practices, and frameworks, aligned with the (ISC)² CISSP Common Body of Knowledge (CBK). Topics include security and risk management, asset security, security architecture, identity and access management, security operations, software development security, and security assessment and testing. Participants will learn strategic and operational skills for protecting enterprise information systems, preparing them for professional practice or CISSP exam readiness.

Course Objectives

Upon completion of this course, participants will be able to:

  • Understand and apply security and risk management principles.
  • Design and implement secure systems and architectures.
  • Manage identity, access, and security operations effectively.
  • Apply security assessment, testing, and software security practices.
  • Prepare for the CISSP exam (if seeking official certification).

Who Should Attend?

This course is designed for IT security managers, security analysts, network administrators, compliance officers, risk managers, auditors, and professionals responsible for enterprise information security.

Course Agenda

Registration

Welcome & Introduction

Pre-Test

Day 1: Security & Risk Management

  • Information security governance and policy
  • Compliance, legal, and regulatory issues
  • Risk management concepts and methodologies
  • Business continuity and disaster recovery planning

Day 2: Asset Security & Security Architecture

  • Classification and protection of information assets
  • Secure system design and architecture principles
  • Network, cloud, and infrastructure security
  • Security models and frameworks
Day 3: Identity & Access Management (IAM)

  • Authentication, authorization, and identity management
  • Access control models (RBAC, ABAC, DAC, MAC)
  • Single Sign-On (SSO) and federated identity
  • IAM best practices and policy implementation
Day 4: Security Operations & Software Security

  • Security operations and monitoring
  • Incident response and forensic investigation
  • Security in the software development lifecycle (SDLC)
  • Secure coding practices and vulnerability management
Day 5: Security Assessment & Exam Preparation

  • Security assessment and testing strategies
  • Auditing, penetration testing, and monitoring
  • Integration of CISSP domains into practice
  • Mock exercises, sample questions, and review
  • Program review and key takeaways

Post Test

End of the Course

Assessment Methodology

All courses conducted by EdTech will begin with a Pre-evaluation and end with a Post-evaluation. The instructor will evaluate the knowledge and skills of the participants according to the feedback given by participants. This will help to recognize the benefits and the level of knowledge gained by participants through the course.

Training Methodology

Facilitated by a highly qualified specialist, who has extensive knowledge and experience; this program will be conducted using extensively interactive methods, encouraging participants to share their own experiences and apply the program material to real-life work situations in order to stimulate group discussions and improve the efficiency of the subject coverage.

Percentages of the total course hour classification are:

  • ​40% Theoretical lectures, Concepts and approach
  • 20% Motivation to develop individual skill and Techniques
  • 20% Case Studies and Practical Exercises
  • 20% Topic General Discussions and interaction

Course Manual

Participants will be provided with comprehensive presentation material as reference manual. This presentation material is a compilation of core valuable information, references, presentation methods and inspiring reading which will be used as a part of the material guide.

Course Certificate

At the completion of the course, all participants who successfully accomplished the required contact hours will receive an EdTech Training Participation Certificate as a testimony to their commitment to professional development and further education.

Why Edtech ?

  • Industry Experienced; Internationally Qualified Trainers
  • Hands-on Practical Sessions & Assignments
  • Intensive Study materials
  • Flexible Schedules
  • Realistic training methodology
  • High-Quality Training in Affordable Course Fees
  • Achievement Certificate, as approved by the Ministry of Education (Abu Dhabi Center for Technical and Vocational Education Training - ACTVET), HABC, AWS, IAOSHE, SHRM, etc.