Information Systems Security Architecture Professional (ISSAP)

  • Category
    ISC2
  • Course Duration
    40 Hours
  • Course Profile
    Click Here
Information Systems Security Architecture Professional (ISSAP)

Information Systems Security Architecture Professional (ISSAP)
Register Now

It is one of these certificates that focuses on the security of the computer system as institutions with the current development face new challenges in securing information. There are certified, trained and specialized professionals to help us achieve our security goals

Course Overview

No Overview Available

Course Outlines

1. Access Control Systems and Methodology

  • Access Control Concepts, Techniques, and Methodologies
  • Access Management Architecture

2. Communications and Network Security

  • Communications Architecture
  • Network Architecture
  • Communications and Networks
  • Security Design Considerations and Related Risks

3. Cryptography

  • Requirements of Cryptography
  • Usage
  • Cryptographic Design Considerations and Limitations
  • Key Management Lifecycle
  • Integrated Cryptographic Solutions (Public Key Infrastructure (PKI), API selection, etc)

4. Security Architecture Analysis

  • Security Architecture Approach
  • Requirements Analysis
  • Security Architecture – Verifying and Validating Design

5. Technology Related Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)

  • Business Impact Analysis (BIA) (e.g., legal, financial, stakeholders)
  • Security Strategies for Availability and Recovery
  • Continuity and Recovery Solution

6. Physical Security Considerations

  • Assessing Requirements
  • Integration of Physical Security Products and Systems
  • Evaluation of Solutions

Course Objectives

After ISSAP the we will be able to:

  • Developing the reliability and integrity of the organization's information systems design.
  • Classify and install physical access controls
  • Understand how encryption can protect organizational data and communications from external and internal threats, and your ability to implement them.
  • Implementing and monitoring optimum performance.
  • Identify negative events that may threaten the organization's workflow.
  • Application of difficult and solid concepts to access control methodologies.

Course Prerequisites

Candidates must be a CISSP in good standing 

Course Schedule

No Schedule Available

Course Delivery Format

No Delivery Format Available