Loading...
0

Information Systems Security Architecture Professional (ISSAP or CISSP-ISSAP) Bo

SEC850

Course Description

This course provides a comprehensive review of security topics and exam preparation for the Information Systems Security Architecture Professional (ISSAP) certification. ISSAP is a specialty of the CISSP which extends upon the CISSP Common Body of knowledge.  In this training students concentrate on the six major domains of the Information Systems Security Architecture Professional (ISSAP) Concentration:

Information Systems Security Architecture Professional (ISSAP or CISSP-ISSAP) Bo Dec 2025

Information Systems Security Architecture Professional (ISSAP or CISSP-ISSAP) Bo

Domain 1: Security Architecture AnalysisApproach to Security ArchitectureConducting the Requirements AnalysisDesigning the Security ModelConduct Design Verification and Validation
Approach to Security Architecture
Conducting the Requirements Analysis
Designing the Security Model
Conduct Design Verification and Validation
Domain 2: Communication and Network SecurityThe Communication ArchitectureThe Network ArchitectureProtecting the Communications and NetworksSecurity Design Considerations and Associated Risks
The Communication Architecture
The Network Architecture
Protecting the Communications and Networks
Security Design Considerations and Associated Risks
Domain 3: Physical Security ConsiderationsAssessing the Physical Security RequirementsIntegration of Physical Products and SystemsSolution Evaluation
Assessing the Physical Security Requirements
Integration of Physical Products and Systems
Solution Evaluation
Domain 4: CryptographyCryptography RequirementsDesign Considerations and ConstraintsKey Management Life CycleIntegrated SolutionsIdentity System Integration
Cryptography Requirements
Design Considerations and Constraints
Key Management Life Cycle
Integrated Solutions
Identity System Integration
Domain 5: Technology-Related Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)Business Impact Analysis (BIA) RequirementsWhat are the Strategies for Availability and Recovery?Designing the Continuity Recovery Solution
Business Impact Analysis (BIA) Requirements
What are the Strategies for Availability and Recovery?
Designing the Continuity Recovery Solution
Domain 6: Access Control Systems and MethodologyAccess Control Key Concepts, Methodologies, and TechniquesArchitecture of Identity and Access Management
Access Control Key Concepts, Methodologies, and Techniques
Architecture of Identity and Access Management

CISSP Certification

Our Testimonials

"We equip professionals with in-demand skills, strategically aligning our courses with industry needs and ensuring our curriculum reflects the latest technologies."

Katherine with comp
Katherine Cain Executive Director

Our Training Partners