In today's fast evolving times technological solutions by itself cannot protect an organization's important information assets. So, Employers demanding qualified information security staff give their organizations a leading edge by providing the highest standard of security for their customers, employees, stakeholders and organizational information assets.
The CISSP is an internationally recognized security certification for information security professionals. Offered by the International Information Systems Security Certification Consortium, (ISC)2, the CISSP certification is both an objective measure of excellence and a globally recognized standard of achievement.
Benefits of the CISSP Certification for Professionals
Some of the Sucess Stories for students who enrolled in my course and pass the CISSP exam from the first attempt.
The value of the CISSP Certificates in the market today and what will be the benefit of of holding a CISSP Certificate
The course plan and Road map,
How can you get CISSP Certified from 3 to 5 weeks ?
what should be the study plan ?
What is the difference between CISSP Third and Fourth Edition and why should you study the Third Edition to pass the Fourth Edition exam.
The Resources that you should use during the course and the best exam practice questions that will allow you to clear the CISSP from the first attempt.
An Instruction to Access Control also know as AAA (Authentication , Authorization and Accounting)
The different Authorization Models and the difference between DAC, MAC and Non DAC
The Different type of Authentication.
Single Sign On is very common,
How it work ?
What Protocol is using SSO ?
What is the component of SSO ?
A Clear Explanation of RADUIS
Different types of Access Control Attacks
Different types of IDS / IPS and how they are functioning.
The Importance of Penetration Testing and the different phases of PT.
Which area you should focus on in the access control domain for the exam.
Some Examples of Access control question in the exam.
Some of the common Security framework
The definition of the Trusted Computer base also know as TCB
Different Types of Security Models.
Different type of Security Modes.
TCSEC a an American standard using to evaluate computer system
ITSEC is an European standard used to evaluate computer systems.
Some sample of exam questions
TCP / IP Model
Different types of Firewall and their usages.
Different types of RAID and their usages.
Different types of Backup and their usages.
Some Network questions from the exam.
Different types of Security documents, like policy , procedures, guidelines and standard
How to create a Disaster Recovery Plan.
Information Security Consultant, Senior Penetration tester and Certified Instructor with more than 20 years of experience.
CISSP, CEH, CEI, CISM, CISA, Security+, CCNP, CCSI, MCT, MCSE+ Security, MCITP, PMP, N+, RHCE, Linux+
IBM, Cliveland Clink Abu Dhabi (CCAD), Orascom Telecommunication, UAE Ministry of Interior, Egyptian Ministry of Interior, Saudi Ministry of Interior, Prince Naif University for forensic science - KSA, Khalifa University - UAE, Cairo University - Egypt