CDFPS®
CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL®
Certified by International Academy of Business and Financial Management (IABFM)
We can bespoke this program for in -house training
Building the world’s future leaders in business and finance
16 - 20 July 2018
CISSP®
www.iabfmafrica.org | www.iabfm.org | nairobioffice@iabfmafrica.org | Kenya +254 203673396
Holiday inn Hotel Sandton Johannesburg
Certified Information Systems Security Professional (CISSP) is an independent information security
certification governed by the not-for-profit International Information Systems Security Certification
Consortium, (ISC) 2.
The CISSP certification was the first credential in the field of information security, accredited by the
ANSI (American National Standards Institute) to ISO (International Standards Organization) Standard
17024:2003. It is approved by the U.S. Department of Defense (DoD) in both their Information Assurance
Technical (IAT) and Managerial (IAM) categories. CISSP certified professionals are considered
authorities on key security issues including mobile security, risk management, application development
security, cloud computing, among others.
CISSP certification is not only an objective measure of excellence, but a globally recognized standard
of achievement for security training. We provide comprehensive CISSP training for participants who
wish to gain expertise in defining the design, architecture, management and controls leading to a
secure business environment. Individuals possessing this vendor neutral credential are high in demand
by corporations all over the world who want to protect their organizations from a growing spurt of
sophisticated cyber attacks.
This globally recognized certification proves a candidate’s knowledge of the Information Security industry and
commitment to the profession. A CISSP is an information assurance professional who defines the architecture,
design, management and/or controls that assure the security of business environments. It prepares candidates
through a robust technical information security review along with critical IS management concepts and best
practices to drive an effective information security program. As your exclusive way to review and refresh your
knowledge of the domains and sub-domains of the CISSP CBK, the seminar will help you identify areas you need
to study and includes:
»» 100% up-to-date material
»» An overview of the information security field
»» Contributions from CISSPs; Authorized Instructors and subject matter experts
»» Post-Seminar Self-Assessment
Course Overview
Official CISSP Training Seminar
Certified Information
Systems Security Professional®
Certified Information
Systems Security Professional®
CISSP®
www.iabfm.org | www.iabfmafrica.org+254 2036 73396 nairobioffice@iabfmafrica.org
Building the world’s future leaders in business and finance
Benefits of the CISSP for You
»» Demonstrates a working knowledge of information security
»» Confirms commitment to profession
»» Offers a career differentiator, with enhanced credibility and marketability
»» Indicates that certified information security professionals earn a worldwide average of nearly 30%
more than their non-certified counterparts, according to the Global Information Security Workforce
Study
»» Fulfills government and organization requirements for information security certification mandates
Benefits of the CISSP for Your Employer
»» Positions candidates on a level playing field as certifications are recognized internationally
»» Provides increased credibility for your organization when working with vendors and contractors
»» Empowers employees with a universal language, circumventing ambiguity with industry-accepted
terms and practices
»» Validates commitment and years of experience gained in theindustry
»» Requires Continuing Professional Education (CPE) credits to ensure that personnel keep their skills
current
»» Satisfies certification mandate requirements for service providers or subcontractors
High-Level Certification Benefits
»» Worldwide recognition of competence
»» Managerial view of information security
»» Global overview of security challenges
»» In depth coverage of critical security topics
»» ANSI accreditation based on the ISO/IEC 17024 standard
CISSPs often hold job functions including:
»» Security Consultant
»» Security Manager
»» IT Director/Manager Security Auditor Security Architect
»» Security Analyst
»» Security Systems Engineer
»» Chief Information Security Officer Director of Security
»» Network Architect
CISSP candidates must have a minimum of five years of direct full-time security professional work
experience in two or more of the eight domains of the CISSP CBK®
, or four years of direct full-time
security professional work experience in two or more of the ten domains of the CISSP CBK with a
college degree.
Who Can Become a CISSP?
Why Become a CISSP?
CISSP®
www.iabfm.org | www.iabfmafrica.org+254 2036 73396 nairobioffice@iabfmafrica.org
Building the world’s future leaders in business and finance
*	 Understand and apply concepts of confidentiality,
integrity and availability
*	 Apply security governance principles
*	 Compliance
*	 Understand legal & regulatory issues that pertain to
information security in a global context
*	 Develop and implement documented security policy,
standards, procedures, and guidelines
*	 Understand business continuity requirements
*	 Contribute to personnel security policies
*	 Classify information and supporting assets
(e.g., sensitivity, criticality)
*	 Determine and maintain ownership (e.g.data owners,
system owners, business/mission owners)
*	 Protect Privacy
*	 Ensure appropriate retention (e.g. media, hardware,
personnel)
*	 Determine data security controls (e.g. data at rest, data
in transit)
*	 Establish handling requirements (e.g. markings, labels,
storage, destruction of sensitive information)
SECURITY & RISK MANAGEMENT1
ASSET SECURITY2
SECURITY ENGINEERING3
*	 Implement and manage an engineering lifecycle using
security design principles
*	 Understand fundamental concepts of security models
(e.g. Confidentiality, Integrity, and Multi- level Models)
*	 Select controls and countermeasures based upon
information systems security standards
*	 Understand the security capabilities of information
systems (e.g. memory protection, virtualization, trusted
platform module, interfaces, fault tolerance)
*	 Assess and mitigate the vulnerabilities of security
architectures, designs, and solution elements
*	 Assess and mitigate vulnerabilities in web-based
systems (e.g. XML, OWASP)
*	 Assess and mitigate vulnerabilities in mobile systems
*	 Assess and mitigate vulnerabilities in embedded devices
and cyber-physical systems (e.g. network-enabled
devices)
*	 Apply cryptography
*	 Apply secure principles to site and facility design
*	 Design and implement facility security
*	 Apply secure design principles to network architecture
(e.g. IP & non-IP protocols, segmentation)
*	 Securing network components
*	 Design and establish secure communication channels
*	 Prevent or mitigate network attacks (e.g. DDoS,
spoofing)
COMMUNICATION & NETWORK SECURITY4
*	 Control physical and logical access to assets
*	 Manage identification and authentication of people and
devices
*	 Integrate identity as a service (e.g. cloud identity)
*	 Integrate third-party identity services (e.g. on- premise)
*	 Implement and manage authorization mechanisms
IDENTITY & ACCESS MANAGEMENT5
*	 Design and validate assessment and test strategies
*	 Conduct security control testing
*	 Collect security process data (e.g. management and
operational controls)
*	 Analyze and report test output (e.g. automated, manual)
*	 Conduct or facilitate internal and third-party audits
SECURITY ASSESSMENT & TESTING6
*	 Understand and support investigations
*	 Understand requirements for investigation types
*	 Conduct logging and monitoring activities
*	 Secure the provisioning of resources
*	 Understand and apply foundational security operations
concepts
*	 Employ resource protection techniques
*	 Conduct incident response
*	 Operate and maintain preventative measures
*	 Implement and support patch and vulnerability
management
*	 Participate in and understand change management
processes (e.g. versioning, base lining, security impact
analysis)
*	 Implement recovery strategies
*	 Implement disaster recovery processes
*	 Test disaster recovery plan
*	 Participate in business continuity planning and exercising
*	 Implement and manage physical security
*	 Participate in personnel safety (e.g. duress, travel,
monitoring)
SECURITY OPERATIONS7
*	 Understand and apply security in the software
development lifecycle
*	 Enforce security controls in the development
environment
*	 Assess the effectiveness of software security
*	 Acceptance testing
*	 Assess software acquisition security
SOFTWARE DEVELOPMENT SECURITY8
CISSP®
www.iabfm.org | www.iabfmafrica.org+254 2036 73396 nairobioffice@iabfmafrica.org
Building the world’s future leaders in business and finance
Delegate(s) Identification Details
(Please complete form in CAPITAL Letters)
Delegate 1
Title: Ms Mrs Mr Dr
Surname: ___________________________________
Given Name:________________________________
Job Title: ___________________________________
Email: _____________________________________
Mobile: ____________________________________
Delegate 2
Title: Ms Mrs Mr Dr
Surname: ___________________________________
Given Name:________________________________
Job Title: ___________________________________
Email: _____________________________________
Mobile: ____________________________________
Delegate 3
Title: Ms Mrs Mr Dr
Surname: ___________________________________
Given Name: _______________________________
Job Title: ___________________________________
Email: _____________________________________
Mobile: ____________________________________
Delegate 4
Title: Ms Mrs Mr Dr
Surname: ___________________________________
Given Name:________________________________
Job Title: ___________________________________
Email: _____________________________________
Mobile: ____________________________________
Delegate 5
Title: Ms Mrs Mr Dr
Surname: ___________________________________
Given Name:________________________________
Job Title: ___________________________________
Email: _____________________________________
Mobile: ____________________________________
Company/ Organisation Details
Company name: _____________________________
Contact Person: ______________________________
Email: _____________________________________
Website:____________________________________
Country:____________________________________
State: ______________________________________
Address:____________________________________
___________________________________________
Terms and Conditions
Accepted applications to attend the International Academy of Business and Financial
Management Ltd (IABFM) training courses (Programs) are in every case subject to
these terms and conditions:
Payment Terms – Payment is due in full upon completion and return of the registration
form. IABFM reserves the right to admit or refuse admission to delegates who have not
shown proof of payment of fees or not agreed to sign an indemnity form.
Speakers - Views of Speakers at any Conference or Training Course – are their
own and do not necessarily reflect the views of IABFM, its employees, agents or
contractors.
Delegate Substitutions – Provided the fee has been paid in full, within the time frame
as per our terms and conditions, substitutions at no extra charge, can be made up to 10
working days, before the start of the course. (Send notification for any such changes in
writing for the attention of the Customer Services Manager at info@iabfm.org).
Delegate Cancellations – must be received by IABFM in writing and must be
addressed to the Customer Services Manager at info@iabfm.org
•	 Cancellations received 10 working days before the program start-date, entitle
the cancelling delegate to a full credit of amounts (credit to attend future event
– not refund monies) paid to date of cancellation which may only be redeemed
against the cost of any future IABFM program, within one year from date of such
cancellation;
•	 Any cancellation(s) received less than 10 working days before the program
commencement date, does not entitle the cancelling delegate to any refund or
credit note and the full fee must be paid;
•	 Non attendance without written cancellation to the Customer Services Manager is
treated as a cancellation with no entitlement to any refund or credit.
Speaker Changes – Occasionally it is necessary, for reasons beyond our control, to
alter the content and timing of the program or the identity of the speakers.
*	If the IABFM cancels a program, delegate payments at the date of cancellation will
be credited to an IABFM program (such credit is available for up to one year from
the date of cancellation). If the IABFM postpones a program, delegate payments
at the postponement date will be credited towards the rescheduled program. If the
delegate is unable to attend the rescheduled program, the delegate will receive
a full credit of amounts paid up to the date of postponement which may only be
redeemed against the cost of any future IABFM program (and such credit will be
available for one year from the date of postponement). No cash refunds whatsoever
are available for cancellations or postponements.
Program Registration Form
Method of payment
A confirm letter and invoice will be sent upon receipt of your registration.
Please note that full payment must be made upon receipt of the invoice
and prior to the event.
Only those delegates whose fees have been paid in full will be admitted to the
event. Payment can be made to following bank account:
Bank HSBC
Account Name
International Academy of Business and Financial Management
Limited
Account No. 808667422838
Branch Central Branch, Hong Kong
SWIFT Code HSBCHKHH
Or pay by Paypal
using your credit card
Indemnity – The IABFM is absolved from and indemnified against any loss or damage
as a result of substitution, alteration or cancellation/postponement of a program arising
from any cause whatsoever, including, without limitation, any fortuitous event, Act
of God, unforeseen occurrence or any other event that renders performance of the
program impracticable or impossible.
A “fortuitous event” includes, but is not limited to, war, fire, flood, riot, industrial
action, extreme weather or other emergency.
Warranty of Authority – The signatory warrants that he/she has the authority to sign
this Application and agrees to be personally liable to IABFM for payments falling due
pursuant thereto should such warranty be breached.
Authorization and Acceptance of Terms and Conditions
I hereby declare I am authorised to sign this contract terms and
Conditions conditions in the name of the company/organistion.
Company/Organisation:__________________________________
Name: _____________________Date:________________
Signature__________________________
www.iabfm.org | www.iabfmafrica.orginfo@iabfm.org | nairobioffice@iabfmafrica.org
Program Period:
Program Venue:
Program Price: US $2,950.00 per delegate *
*Above price is net amount payable to IABFM, any withholding TAX or VAT
is an addtional cost payble by the client.
Building the world’s future leaders in business and finance
Thank you for your interest in the program. To register, please
provide the following information and sign the form.
Certified Information Systems Security Professional
16 - 20 July 2018
Holiday inn Hotel Sandton Johannesburg
Print
Submit

Certified Information Systems Security Professional

  • 1.
    CDFPS® CERTIFIED INFORMATION SYSTEMSSECURITY PROFESSIONAL® Certified by International Academy of Business and Financial Management (IABFM) We can bespoke this program for in -house training Building the world’s future leaders in business and finance 16 - 20 July 2018 CISSP® www.iabfmafrica.org | www.iabfm.org | nairobioffice@iabfmafrica.org | Kenya +254 203673396 Holiday inn Hotel Sandton Johannesburg
  • 2.
    Certified Information SystemsSecurity Professional (CISSP) is an independent information security certification governed by the not-for-profit International Information Systems Security Certification Consortium, (ISC) 2. The CISSP certification was the first credential in the field of information security, accredited by the ANSI (American National Standards Institute) to ISO (International Standards Organization) Standard 17024:2003. It is approved by the U.S. Department of Defense (DoD) in both their Information Assurance Technical (IAT) and Managerial (IAM) categories. CISSP certified professionals are considered authorities on key security issues including mobile security, risk management, application development security, cloud computing, among others. CISSP certification is not only an objective measure of excellence, but a globally recognized standard of achievement for security training. We provide comprehensive CISSP training for participants who wish to gain expertise in defining the design, architecture, management and controls leading to a secure business environment. Individuals possessing this vendor neutral credential are high in demand by corporations all over the world who want to protect their organizations from a growing spurt of sophisticated cyber attacks. This globally recognized certification proves a candidate’s knowledge of the Information Security industry and commitment to the profession. A CISSP is an information assurance professional who defines the architecture, design, management and/or controls that assure the security of business environments. It prepares candidates through a robust technical information security review along with critical IS management concepts and best practices to drive an effective information security program. As your exclusive way to review and refresh your knowledge of the domains and sub-domains of the CISSP CBK, the seminar will help you identify areas you need to study and includes: »» 100% up-to-date material »» An overview of the information security field »» Contributions from CISSPs; Authorized Instructors and subject matter experts »» Post-Seminar Self-Assessment Course Overview Official CISSP Training Seminar Certified Information Systems Security Professional® Certified Information Systems Security Professional® CISSP® www.iabfm.org | www.iabfmafrica.org+254 2036 73396 nairobioffice@iabfmafrica.org Building the world’s future leaders in business and finance
  • 3.
    Benefits of theCISSP for You »» Demonstrates a working knowledge of information security »» Confirms commitment to profession »» Offers a career differentiator, with enhanced credibility and marketability »» Indicates that certified information security professionals earn a worldwide average of nearly 30% more than their non-certified counterparts, according to the Global Information Security Workforce Study »» Fulfills government and organization requirements for information security certification mandates Benefits of the CISSP for Your Employer »» Positions candidates on a level playing field as certifications are recognized internationally »» Provides increased credibility for your organization when working with vendors and contractors »» Empowers employees with a universal language, circumventing ambiguity with industry-accepted terms and practices »» Validates commitment and years of experience gained in theindustry »» Requires Continuing Professional Education (CPE) credits to ensure that personnel keep their skills current »» Satisfies certification mandate requirements for service providers or subcontractors High-Level Certification Benefits »» Worldwide recognition of competence »» Managerial view of information security »» Global overview of security challenges »» In depth coverage of critical security topics »» ANSI accreditation based on the ISO/IEC 17024 standard CISSPs often hold job functions including: »» Security Consultant »» Security Manager »» IT Director/Manager Security Auditor Security Architect »» Security Analyst »» Security Systems Engineer »» Chief Information Security Officer Director of Security »» Network Architect CISSP candidates must have a minimum of five years of direct full-time security professional work experience in two or more of the eight domains of the CISSP CBK® , or four years of direct full-time security professional work experience in two or more of the ten domains of the CISSP CBK with a college degree. Who Can Become a CISSP? Why Become a CISSP? CISSP® www.iabfm.org | www.iabfmafrica.org+254 2036 73396 nairobioffice@iabfmafrica.org Building the world’s future leaders in business and finance
  • 4.
    * Understand andapply concepts of confidentiality, integrity and availability * Apply security governance principles * Compliance * Understand legal & regulatory issues that pertain to information security in a global context * Develop and implement documented security policy, standards, procedures, and guidelines * Understand business continuity requirements * Contribute to personnel security policies * Classify information and supporting assets (e.g., sensitivity, criticality) * Determine and maintain ownership (e.g.data owners, system owners, business/mission owners) * Protect Privacy * Ensure appropriate retention (e.g. media, hardware, personnel) * Determine data security controls (e.g. data at rest, data in transit) * Establish handling requirements (e.g. markings, labels, storage, destruction of sensitive information) SECURITY & RISK MANAGEMENT1 ASSET SECURITY2 SECURITY ENGINEERING3 * Implement and manage an engineering lifecycle using security design principles * Understand fundamental concepts of security models (e.g. Confidentiality, Integrity, and Multi- level Models) * Select controls and countermeasures based upon information systems security standards * Understand the security capabilities of information systems (e.g. memory protection, virtualization, trusted platform module, interfaces, fault tolerance) * Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements * Assess and mitigate vulnerabilities in web-based systems (e.g. XML, OWASP) * Assess and mitigate vulnerabilities in mobile systems * Assess and mitigate vulnerabilities in embedded devices and cyber-physical systems (e.g. network-enabled devices) * Apply cryptography * Apply secure principles to site and facility design * Design and implement facility security * Apply secure design principles to network architecture (e.g. IP & non-IP protocols, segmentation) * Securing network components * Design and establish secure communication channels * Prevent or mitigate network attacks (e.g. DDoS, spoofing) COMMUNICATION & NETWORK SECURITY4 * Control physical and logical access to assets * Manage identification and authentication of people and devices * Integrate identity as a service (e.g. cloud identity) * Integrate third-party identity services (e.g. on- premise) * Implement and manage authorization mechanisms IDENTITY & ACCESS MANAGEMENT5 * Design and validate assessment and test strategies * Conduct security control testing * Collect security process data (e.g. management and operational controls) * Analyze and report test output (e.g. automated, manual) * Conduct or facilitate internal and third-party audits SECURITY ASSESSMENT & TESTING6 * Understand and support investigations * Understand requirements for investigation types * Conduct logging and monitoring activities * Secure the provisioning of resources * Understand and apply foundational security operations concepts * Employ resource protection techniques * Conduct incident response * Operate and maintain preventative measures * Implement and support patch and vulnerability management * Participate in and understand change management processes (e.g. versioning, base lining, security impact analysis) * Implement recovery strategies * Implement disaster recovery processes * Test disaster recovery plan * Participate in business continuity planning and exercising * Implement and manage physical security * Participate in personnel safety (e.g. duress, travel, monitoring) SECURITY OPERATIONS7 * Understand and apply security in the software development lifecycle * Enforce security controls in the development environment * Assess the effectiveness of software security * Acceptance testing * Assess software acquisition security SOFTWARE DEVELOPMENT SECURITY8 CISSP® www.iabfm.org | www.iabfmafrica.org+254 2036 73396 nairobioffice@iabfmafrica.org Building the world’s future leaders in business and finance
  • 5.
    Delegate(s) Identification Details (Pleasecomplete form in CAPITAL Letters) Delegate 1 Title: Ms Mrs Mr Dr Surname: ___________________________________ Given Name:________________________________ Job Title: ___________________________________ Email: _____________________________________ Mobile: ____________________________________ Delegate 2 Title: Ms Mrs Mr Dr Surname: ___________________________________ Given Name:________________________________ Job Title: ___________________________________ Email: _____________________________________ Mobile: ____________________________________ Delegate 3 Title: Ms Mrs Mr Dr Surname: ___________________________________ Given Name: _______________________________ Job Title: ___________________________________ Email: _____________________________________ Mobile: ____________________________________ Delegate 4 Title: Ms Mrs Mr Dr Surname: ___________________________________ Given Name:________________________________ Job Title: ___________________________________ Email: _____________________________________ Mobile: ____________________________________ Delegate 5 Title: Ms Mrs Mr Dr Surname: ___________________________________ Given Name:________________________________ Job Title: ___________________________________ Email: _____________________________________ Mobile: ____________________________________ Company/ Organisation Details Company name: _____________________________ Contact Person: ______________________________ Email: _____________________________________ Website:____________________________________ Country:____________________________________ State: ______________________________________ Address:____________________________________ ___________________________________________ Terms and Conditions Accepted applications to attend the International Academy of Business and Financial Management Ltd (IABFM) training courses (Programs) are in every case subject to these terms and conditions: Payment Terms – Payment is due in full upon completion and return of the registration form. IABFM reserves the right to admit or refuse admission to delegates who have not shown proof of payment of fees or not agreed to sign an indemnity form. Speakers - Views of Speakers at any Conference or Training Course – are their own and do not necessarily reflect the views of IABFM, its employees, agents or contractors. Delegate Substitutions – Provided the fee has been paid in full, within the time frame as per our terms and conditions, substitutions at no extra charge, can be made up to 10 working days, before the start of the course. (Send notification for any such changes in writing for the attention of the Customer Services Manager at info@iabfm.org). Delegate Cancellations – must be received by IABFM in writing and must be addressed to the Customer Services Manager at info@iabfm.org • Cancellations received 10 working days before the program start-date, entitle the cancelling delegate to a full credit of amounts (credit to attend future event – not refund monies) paid to date of cancellation which may only be redeemed against the cost of any future IABFM program, within one year from date of such cancellation; • Any cancellation(s) received less than 10 working days before the program commencement date, does not entitle the cancelling delegate to any refund or credit note and the full fee must be paid; • Non attendance without written cancellation to the Customer Services Manager is treated as a cancellation with no entitlement to any refund or credit. Speaker Changes – Occasionally it is necessary, for reasons beyond our control, to alter the content and timing of the program or the identity of the speakers. * If the IABFM cancels a program, delegate payments at the date of cancellation will be credited to an IABFM program (such credit is available for up to one year from the date of cancellation). If the IABFM postpones a program, delegate payments at the postponement date will be credited towards the rescheduled program. If the delegate is unable to attend the rescheduled program, the delegate will receive a full credit of amounts paid up to the date of postponement which may only be redeemed against the cost of any future IABFM program (and such credit will be available for one year from the date of postponement). No cash refunds whatsoever are available for cancellations or postponements. Program Registration Form Method of payment A confirm letter and invoice will be sent upon receipt of your registration. Please note that full payment must be made upon receipt of the invoice and prior to the event. Only those delegates whose fees have been paid in full will be admitted to the event. Payment can be made to following bank account: Bank HSBC Account Name International Academy of Business and Financial Management Limited Account No. 808667422838 Branch Central Branch, Hong Kong SWIFT Code HSBCHKHH Or pay by Paypal using your credit card Indemnity – The IABFM is absolved from and indemnified against any loss or damage as a result of substitution, alteration or cancellation/postponement of a program arising from any cause whatsoever, including, without limitation, any fortuitous event, Act of God, unforeseen occurrence or any other event that renders performance of the program impracticable or impossible. A “fortuitous event” includes, but is not limited to, war, fire, flood, riot, industrial action, extreme weather or other emergency. Warranty of Authority – The signatory warrants that he/she has the authority to sign this Application and agrees to be personally liable to IABFM for payments falling due pursuant thereto should such warranty be breached. Authorization and Acceptance of Terms and Conditions I hereby declare I am authorised to sign this contract terms and Conditions conditions in the name of the company/organistion. Company/Organisation:__________________________________ Name: _____________________Date:________________ Signature__________________________ www.iabfm.org | www.iabfmafrica.orginfo@iabfm.org | nairobioffice@iabfmafrica.org Program Period: Program Venue: Program Price: US $2,950.00 per delegate * *Above price is net amount payable to IABFM, any withholding TAX or VAT is an addtional cost payble by the client. Building the world’s future leaders in business and finance Thank you for your interest in the program. To register, please provide the following information and sign the form. Certified Information Systems Security Professional 16 - 20 July 2018 Holiday inn Hotel Sandton Johannesburg Print Submit