top of page
top

ISC2-ISSEP

Information Systems Security Engineering Professional

LOGO.png
Courses

Price
Duration

Please call

5 days

What you'll will learn

What you’ll learn in this course

The Information Systems Security Engineering Professional (ISSEP) is a security leader who specializes in the practical application of systems. engineering principles and processes to develop secure systems.

An ISSEP analyzes organizational needs, defines security requirements, designs security architectures, develops secure designs, implements system security, and supports system security assessment and authorization for government and industry.

Prerequisits

Required Experience

Candidates must have a CISSP in good standing and have 2-years’ cumulative, full-time experience in 1 or more of the five domains of the current ISSEP Exam Outline.
Or candidates must have a minimum of 7 -years’ cumulative, full-time experience in 2 or more of the five domains of the current ISSEP Exam Outline.

Earning a post-secondary degree (bachelor’s or master’s) in computer science, IT, or related fields or an additional credential from the ISC2 approved list may satisfy one year of the required experience. Part-time work and internships may also be considered.

Course Outline

Outlines

Domain 1: Systems Security Engineering Foundations
• 1.1 Apply systems security engineering fundamentals
• 1.2 Execute systems security engineering processes (e.g., hardware, software, data)
• 1.3 Integrate with system development methodology
• 1.4 Perform technical management
• 1.5 Participate in the technology procurement management
• 1.6 Resource Analysis (e.g., Cost estimation, personnel costs, probabilities and statistics (Monte Carlo))
Domain 2: Risk Management
• 2.1 Apply security risk management principles
• 2.2 Manage risk to system
• 2.3 Manage risk to operations

Domain 3: Security Planning and Engineering
• 3.1 Analyze organizational and operational environment
• 3.2 Apply system security principles
• 3.3 Develop system requirements
• 3.4 Create system security design
Domain 4: Systems Security Implementation, Verification and Validation
• 4.1 Implement and integrate security solutions
• Verify successful implementation
Domain 5: Secure Operations, Change Management and Disposal
• 5.1 Develop secure operations plan
• 5.2 Support secure operations
• 5.3 Participate in change management
• 5.4 Participate in the disposal process

Further information

reg

If you would like to know more about this course please contact us

Schedule
LOGO.png
LOGO.png
LOGO.png
reg1

Thanks for registering. our team will contact you soon !

Registration

ILT/VILT

Thanks for registering. our team will contact you soon !

Registration

ILT/VILT

Thanks for registering. our team will contact you soon !

Registration

ILT/VILT

Thanks for registering. our team will contact you soon !

Registration

ILT/VILT Required
bottom of page