CI-CCEAA
Tel: +971 (4) 42 89 440
ISC2-ISSEP
Information Systems Security Engineering Professional


Price:
Duration:
Please call
5 days
What you’ll learn in this course
The Information Systems Security Engineering Professional (ISSEP) is a security leader who specializes in the practical application of systems. engineering principles and processes to develop secure systems.
An ISSEP analyzes organizational needs, defines security requirements, designs security architectures, develops secure designs, implements system security, and supports system security assessment and authorization for government and industry.
Required Experience
Candidates must have a CISSP in good standing and have 2-years’ cumulative, full-time experience in 1 or more of the five domains of the current ISSEP Exam Outline.
Or candidates must have a minimum of 7 -years’ cumulative, full-time experience in 2 or more of the five domains of the current ISSEP Exam Outline.
Earning a post-secondary degree (bachelor’s or master’s) in computer science, IT, or related fields or an additional credential from the ISC2 approved list may satisfy one year of the required experience. Part-time work and internships may also be considered.
Course Outline
Domain 1: Systems Security Engineering Foundations
• 1.1 Apply systems security engineering fundamentals
• 1.2 Execute systems security engineering processes (e.g., hardware, software, data)
• 1.3 Integrate with system development methodology
• 1.4 Perform technical management
• 1.5 Participate in the technology procurement management
• 1.6 Resource Analysis (e.g., Cost estimation, personnel costs, probabilities and statistics (Monte Carlo))
Domain 2: Risk Management
• 2.1 Apply security risk management principles
• 2.2 Manage risk to system
• 2.3 Manage risk to operations
Domain 3: Security Planning and Engineering
• 3.1 Analyze organizational and operational environment
• 3.2 Apply system security principles
• 3.3 Develop system requirements
• 3.4 Create system security design
Domain 4: Systems Security Implementation, Verification and Validation
• 4.1 Implement and integrate security solutions
• Verify successful implementation
Domain 5: Secure Operations, Change Management and Disposal
• 5.1 Develop secure operations plan
• 5.2 Support secure operations
• 5.3 Participate in change management
• 5.4 Participate in the disposal process
Further information
If you would like to know more about this course please contact us
