cropped-Artboard-1.png

Captiva Solutions, Cybersecurity Architect (ISC2 CISSP Preparation)

Design, engineer, and manage the overall security posture of an organization. The Certified Information Systems Security Professional (CISSP) is a globally recognized certification for information technology security leaders It provides information security knowledge that increases students’ ability to successfully implement and manage complex security programs in any organization. Aligned with (ISC)² CBK, Captiva Solutions’ Cybersecurity Architect 5-day course covers all areas of IT security so you can become a strong information security professional. It develops your expertise in defining the IT architecture and in designing, building, and maintaining a secure business environment using globally approved information security standards. The course covers industry best practices and prepares you for the (ISC)² CISSP certification exam.

$1,299.00

Description

Design, engineer, and manage the overall security posture of an organization. The Certified Information Systems Security Professional (CISSP) is a globally recognized certification for information technology security leaders It provides information security knowledge that increases students’ ability to successfully implement and manage complex security programs in any organization. Aligned with (ISC)² CBK, Captiva Solutions’ Cybersecurity Architect 5-day course covers all areas of IT security so you can become a strong information security professional. It develops your expertise in defining the IT architecture and in designing, building, and maintaining a secure business environment using globally approved information security standards. The course covers industry best practices and prepares you for the (ISC)² CISSP certification exam.

Nullam quis risus eget urna mollis ornare vel eu leo. Aenean lacinia bibendum nulla sed 

Level 1

An organization must demonstrate basic cyber hygiene practices, such as ensuring employees change passwords regularly to protect Federal Contract Information (FCI). FCI is “information, not intended for public release, that is provided by or generated for the Government under a contract to develop or deliver a product or service to the Government.”

Level 2

An organization must have an institutionalized management plan to implement good cyber hygiene practices to safeguard CUI, including all the NIST 800-171 r2 security requirements and processes

Level 3 – Expert.

An organization must have standardized and optimized processes in place and additional enhanced practices that detect and respond to changing tactics, techniques and procedures (TTPs) of advanced persistent threats (APTs).

An APT is an adversary that possesses sophisticated levels of cyber expertise and significant resources to conduct attacks from multiple vectors. Capabilities include having resources to monitor, scan, and process data forensics.