Instructor

CISSP-ISSAP - Information Systems Security Architecture Professional Training

Curriculum

Ratings

( 4.6 Ratings )

Live Online Classes starting on 01 January, 1970

CISSP-ISSAP - Information Systems Security Architecture Professional

The ISSAP is an ideal credential for a chief security architect, analyst, or professionals with similar responsibilities. As the architect, you play a key role in information security. Your responsibilities fall between the C-suite and the implementation of your security program.

This security architect certification proves your expertise in developing, designing, and analyzing security solutions. It also shows you excel at giving risk-based guidance to senior management in pursuit of organizational goals.

 

Target Audience

  • System Engineer

  • Security Engineer

 

Course Objectives

  • Create an Information Security Architecture that meets the requirements of governance, compliance and risk management

  • Evaluate Security architecture models and frameworks

  • Develop an infrastructure security program

  • Produce an identity and access management architecture

  • Integrate security principles into applications development

  • Design a security operations architecture

 

Course Outline

1) Architect for Governance, Compliance, and Risk Management

  • Determine Legal, Regulatory, Organizational, and Industry Requirements

  • Determine Applicable Information Security Standards and Guidelines

  • Determine Applicable Sensitive/Personal Data Standards, Guidelines, and Privacy Regulations

  • Design Systems for Auditability

  • Manage Risk

  • Overview of Risk Treatment

  • Risk Monitoring

2) Security Architecture Modeling

  • Identify Security Architecture Approach

  • Review Physical Security Requirements

  • Verify and Validate Design

3) Infrastructure Security Architecture

  • Develop Infrastructure Security Requirements

  • Design Defense-in-Depth Architecture

  • Review Secure Shared Services

  • Design Boundary Protection with Enterprise Security Requirements Considered

  • Design Infrastructure Monitoring

  • Review Introduction to Cryptographic Principles

  • Design Infrastructure Cryptographic Solutions

  • Asymmetric Algorithms

  • Internet Protocol Security (IPSec)

4) Identity and Access Management (IAM) Architecture

  • Evaluate Enterprise Identity Management Requirements

  • Access Control Concepts and Principles

  • Design Identity and Access Solutions

5) Architect for Application Security

  • Assess and Align Application Security with the Enterprise

  • Assess Code Review Methodology and Testing

  • Determine Application Security Capability Requirements and Strategy

  • Identify Common Proactive Controls for Applications

6) Security Operations Architecture

  • Gather Security Operations Requirements

  • Design Information Security Monitoring

  • Design Business Continuity (BC) and Resiliency Solutions

  • Validate Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP) Architecture

(4.6 Ratings)

Download Course Contents

Still unsure?
We're just a click away


Course Outline PDF

SpireTec Unique Features

course-img
1-On-1 Training

Benefit from our 1-On-1 Training for personalized, focused, and effective learning experiences.

course-img
Customized Training

Experience our Customized Training service tailored to meet your specific learning needs and goals

course-img
4 - Hours / Weekend Session

Join our Class featuring 4 - Hours / Weekend Session for in-depth learning and expert training.

course-img
Free Demo Class

Join our Free Demo Class to experience top-notch training and expert guidance first hand!

Purchase This Course

Request More Information

CERTIFICATE

Get Ahead With SpireTec Solutions
Training Certificate

Earn your Certificate

Our course is exhaustive and this certificate is proof that you have taken a big leap in mastering the domain.

Differentiate yourself with Masters Certificate

Our course is exhaustive and this certificate is proof that you have taken a big leap in mastering the domain.

Share your achievement

Our course is exhaustive and this certificate is proof that you have taken a big leap in mastering the domain.

Need Customized Curriculum?

Our course is exhaustive and this certificate is proof that you have taken a big leap in mastering the domain.

Talk To Adviser
course-certificate

Top Certifications