Certified Information Systems Security Professional (CISSP) Training Course

During this training you will expand upon your knowledge by addressing the essential elements of the 10 domains for information systems security professionals. The course offers a job-related approach to the security process, while providing the basic skills required to prepare for CISSP certification.

Course duration, academic hours: 40
Price (excl. VAT) 2300,00 
Price (with VAT): 2783,00 
Lecturer: Ainis Mūsiņš
Ainis Mūsiņš
Ainis Musins is an experienced instructor of operating system administration, installation and troubleshooting, paying special attention to IT security. Certified in SUSE Linux Enterprise Server 15 and Certified Information Security Manager® (CISM) - global standards for developing robust information security programs. The specialist provides in-depth insight into the creation of security infrastructures, the identification of network threats and the implementation of effective countermeasures.

Kirils Solovjovs
Kirils Solovjovs
Head of security company "Possible Security", IT policy activist, vulnerability finder and the most visible "good hacker" in Latvia. Kirill specializes in network flow analysis and reverse engineering, as well as social engineering. Experienced in investigating security incidents. Kirill has obtained three higher educations with distinction, incl. Master's degree in computer science at the University of Latvia, specializing in computer networks specialist and project manager. His professional experience is complemented by an internship at the NATO Cyber Defense Center of Excellence, developing the Crossed Swords red team exercise.

Plans

07. April, 2025 - 11. April, 2025
Place:
Online
Language:
lv
Lecturer:
Ainis Mūsiņš
Price (excl. VAT)
2300,00 
Price (with VAT):
2783,00 
Contact us

Apply or ask a question!

 

If you want to apply for the course or ask a question about it, feel free to use this form.

Please enter your first and last names
Please enter company name
Please enter your phone number
Please enter your email

Thank you! We will contact you.

Training schedule:
07.04.2025 09:00-16:15
08.04.2025 09:00-16:15
09.04.2025 09:00-16:15
10.04.2025 09:00-16:15
11.04.2025 09:00-16:15
Course target

Promote the development of knowledge and skills on:

  • Security and Risk Management;
  • Asset Security;
  • Security Engineering;
  • Communication and Network Security;
  • Identity and Access Management;
  • Security Assessment and Testing;
  • Software Development Security;
  • Preparing for the CISSP Certification Exam.
Audience

This course is intended for experienced IT security-related practitioners such as:

  • auditors;
  • consultants;
  • investigators, or instructors;
  • network or security analysts and engineers;
  • network administrators;
  • information security specialists;
  • risk management professionals.
At course completion you will be able to
  • Analyze security and risk management.
  • Analyze asset security.
  • Analyze security engineering.
  • Analyze communications and network security.
  • Analyze identity and access management.
  • Analyze security assessment and testing.
  • Analyze security operations.
  • Analyze software development security.
Prerequisites

It is highly recommended that students have certifications in Network+ or Security+, or possess equivalent professional experience upon entering CISSP training.

It will be beneficial if students have one or more of the following security-related or technology-related certifications or equivalent industry experience: MCSE, MCTS, MCITP, SCNP, CCNP, RHCE, LCE, CNE, SSCP, GIAC, CISA, or CISM.

Training materials

The student kit includes a comprehensive workbook and other necessary materials for this class.

Certification Exam

Cybersecurity Certification | CISSP – Certified Information Systems Security Professional | (ISC)² (isc2.org) exam (The voucher is already included in the course price).

It is possible to arrange the certification exam only on-site and at certain certification centers, currently the closest one is in Tallinn. The price of the course includes a round-trip bus ticket (Riga – Tallinn – Riga) with the Lux Express.

Course outline
  1. Security and Risk Management:
  • Security Governance Principles
  • Compliance
  • Professional Ethics
  • Security Documentation
  • Risk Management
  • Threat Modeling
  • Business Continuity Plan Fundamentals
  • Acquisition Strategy and Practice
  • Personnel Security Policies
  • Security Awareness and Training.
  1. Asset Security:
  • Asset Classification
  • Privacy Protection
  • Asset Retention
  • Data Security Controls
  • Secure Data Handling.
  1. Security Engineering:
  • Security in the Engineering Lifecycle
  • System Component Security
  • Security Models
  • Controls and Countermeasures in Enterprise Security
  • Information System Security Capabilities
  • Design and Architecture Vulnerability Mitigation
  • Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
  • Cryptography Concepts
  • Cryptography Techniques
  • Site and Facility Design for Physical Security
  • Physical Security Implementation in Sites and Facilities.
  1. Communications and Network Security:
  • Network Protocol Security
  • Network Components Security
  • Communication Channel Security
  • Network Attack Mitigation.
  1. Identity and Access Management:
  • Physical and Logical Access Control
  • Identification, Authentication, and Authorization
  • Identity as a Service
  • Authorization Mechanisms
  • Access Control Attack Mitigation.
  1. Security Assessment and Testing:
  • System Security Control Testing
  • Software Security Control Testing
  • Security Process Data Collection
  • Audits.
  1. Security Operations:
  • Security Operations Concepts
  • Physical Security
  • Personnel Security
  • Logging and Monitoring
  • Preventative Measures
  • Resource Provisioning and Protection
  • Patch and Vulnerability Management
  • Change Management
  • Incident Response
  • Investigations
  • Disaster Recovery Planning
  • Disaster Recovery Strategies
  • Disaster Recovery Implementation.
  1. Software Development Security:
  • Security Principles in the System Lifecycle
  • Security Principles in the Software Development Lifecycle
  • Database Security in Software Development
  • Security Controls in the Development Environment
  • Software Security Effectiveness Assessment.

If you want to get more information about this course, please contact us by phone +371 67505091 or send an e-mail at mrn@bda.lv.