CISSP Exam Preparation


22 – 26 August 2016 | Rp 9,000,000 di Lina Building, Jakarta Selatan
17 – 21 October 2016 | Rp 9,000,000 di Lina Building, Jakarta Selatan
05 – 09 December 2016 | Rp 9,000,000 di Lina Building, Jakarta Selatan





CISSP® certification is a globally recognized standard of achievement that confirms an individual’s knowledge in the field of information security. CISSPs are information assurance professionals who define the architecture, design, management and/or controls that assure the security of business environments. It was the first certification in the field of information security to meet the stringent requirements of ISO/IEC Standard 17024.

This comprehensive course also prepares the participants for the Certified Information Systems Security Professional (CISSP®) examination, owned and maintained by the International Information Systems Security Certification Consortium (ISC). Successful completion of this program requires the participants to complete all required assignments and self-study.



After completing this course, participants will be able to:

  • Prepare to take CISSP® exam
  • Get familiar with CISSP® domains
  • Understand key aspects of Security Policy development and Security Management Practices
  • Define the architecture, design, management and controls that assure the security of business environments
  • Understand techniques for committing key facts and figures to memory for test preparation
  • Critical test-taking tips and study techniques for the CISSP® exam




This course will significantly benefit Security Consultant, Security Analyst, Security Manager, Security Systems Engineer, IT Director/Manager, Chief Information Security Officer, Security Auditor, Director of Security, Security Architect and Network Architect


Five (5) Days



Participants must have some knowledge and experience in networking technologies and information system security.



Module 1: Introduction to CISSP

  • Becoming a CISSP
  • The CISSP Exam

Module 2: Information Security Governance and Risk Management

  • Fundamental Principles of Security
  • Security Frameworks
  • Security Management
  • Risk Management
  • Risk Assessment and Analysis
  • Layers of Responsibility
  • Security Steering Committee

Module 3: Access Control

  • Access Control Overview
  • Security Principles
  • Identification, Authentication, Authorization, and Accountability
  • Access Control Models, Techniques and Technologies, and Administration
  • Access Control Methods
  • Accountability
  • Access Control Practices and Monitoring
  • Threats to Access Control

Module 4: Security Architecture and Design

  • Computer Security
  • System Architecture
  • Computer Architecture
  • Operating System Architectures
  • System Security Architecture
  • Security Models
  • Security Modes of Operation
  • Systems Evaluation Methods
  • Information Technology Security

Module 5: Physical and Environmental Security

  • Introduction to Physical Security
  • The Planning Process
  • Protecting Assets
  • Internal Support Systems
  • Perimeter Security

Module 6: Telecommunications and Network Security

  • Telecommunications
  • Open Systems Interconnection Reference Model
  • TCP/IP Model
  • Types of Transmission
  • Cabling
  • Networking Foundations
  • Networking Devices
  • Wide Area Networks
  • Remote Connectivity
  • Wireless Technologies

Module 7: Cryptography

  • Cryptography Definitions and Concepts
  • Types of Ciphers
  • Methods of Encryption
  • Types of Symmetric Systems
  • Types of Asymmetric Systems
  • Message Integrity
  • Public Key Infrastructure
  • Key Management
  • Attacks

Module 8: Business Continuity and Disaster Recovery Planning

  • Business Continuity and Disaster Recovery
  • BCP Project Components
  • Recovery Strategies
  • Insurance
  • Recovery and Restoration
  • Testing and Revising the Plan

Module 9: Legal, Regulations, Investigations, and Compliance

  • Complexities in Cybercrime
  • Intellectual Property Laws
  • Privacy
  • Liability and Its Ramifications
  • Compliance
  • Investigations
  • Ethics

Module 10: Software Development Security

  • Where do we place Security?
  • System Development Life Cycle
  • Software Development Life Cycle
  • Software Development Models
  • Capability Maturity Model Integration
  • Change Control
  • Programming Languages and Concepts
  • Distributed Computing
  • Mobile Code
  • Web Security
  • Database Management
  • Malicious Software (Malware)

Module 11: Security Operations

  • The Role of the Operations Department
  • Administrative Management
  • Operational Responsibilities
  • Configuration Management
  • Media Controls
  • Data Leakage
  • Network and Resource Availability
  • Mainframes
  • E-mail Security
  • Vulnerability Testing

Module 12: Simulation Test




  • Time                : 09.00AM – 05.00PM
  • Venue             : Lina Building 4th Floor Suite 407, Jl. HR. Rasuna Said Kav. B-7, Kuningan, Jakarta Selatan





Rp 9,000,000


Training Packages

  • Course Materials – refer to CISSP All in One Exam Guide
  • Exercises and Mock Exam
  • Certificate of Attendance
  • Lunch and Coffee Break
  • Stationery and Souvenir


Certified Information Systems Security Professional (CISSP Exam Preparation)

The Most Globally Recognized in the Information Security



Formulir Pra-Pendaftaran Public Training / Permintaan Informasi Lebih Lanjut
  2. (required)
  3. (required)
  5. (required)
  6. (required)
  7. (required)
  8. (valid email required)
  9. (required)
  10. (required)
  11. DATA PRE REGISTRATION (Tidak Mengikat)
  12. (required)

cforms contact form by delicious:days

Share and Enjoy: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • TwitThis
  • Facebook
  • LinkedIn
  • Google Bookmarks
  • Y!GG
  • Digg
  • StumbleUpon
  • Reddit
  • MySpace
  • Technorati
  • YahooMyWeb
  • YahooBuzz

Leave a Reply

Your email address will not be published. Required fields are marked *