Certified Information Security Professional (CISP)

Certified Information Security Professional (CISP)

The Certified Information Security Professional (CISP)™ on Information Systems certification program is directed towards senior-level personnel in the information processing industry, If you plan to build a career in information security – one of today’s most visible professions – and if you have at least five full years of experience in information security, then the CISP credential should be your next career goal. It’s the credential for professionals who develop policies and procedures in information security.

Duration : 30 to 35 Hours

Certificate Accreditation: GAQM

Share:
Description
Additional Info
Description

Managing Data Center Facilities

Managing the facilities of today’s hi-end and hi-availability data centers is an extremely demanding and complex task that is often underestimated. There’s often little appreciation or understanding of the complexities involved, especially when many data centers are operating at or near their design limits—where downtime is never an option.

Even a Tier-4 data center designed per the ANSI/TIA-942 standard can face unscheduled downtime due to poor planning, weak operational procedures, subpar maintenance, and ineffective management.


About the CDCFOM® Exam

Candidates for the CDCFOM® (Certified Data Center Facilities Operations Manager) exam are expected to have in-depth knowledge in managing data center operations, which includes:

  • Capacity planning
  • Green initiatives
  • Equipment commissioning and decommissioning
  • Compliance to safety and international standards
  • Vendor management
  • Incident and crisis handling
  • Effective operations management
  • People management
  • Statutory compliance

Prerequisite

While some experience in data center operations is recommended, there is no formal prerequisite to take the exam.

Course Duration

30 to 35 hours


About the CISP™ Certification

The Certified Information Security Professional (CISP)™ certification is aimed at senior-level professionals in the information processing and security industries. It is ideal for those with 5+ years of experience in information security looking to move into policy development and managerial roles.

What is InfoSec?

Information security (InfoSec) refers to defending information from unauthorized access, use, disclosure, disruption, modification, inspection, recording, or destruction. It applies to data in any form—electronic or physical.

With the increased reliance on digital systems, information security has become essential for individuals and organizations, including:

  • Governments
  • Military
  • Corporations
  • Financial institutions
  • Hospitals
  • Private businesses

Why It Matters

The CISP credential is highly regarded and can significantly enhance your job prospects, helping you transition into leadership and management roles.


Taking the Exam

  • Format: 100 Multiple Choice Questions
  • Passing Criteria: 80% (i.e., 80 correct answers out of 100)
  • Duration: 2 hours (120 minutes)
  • Mode: Non-proctored; take it anytime, anywhere within 8 months of purchase
  • Attempts: Two attempts with each voucher
    • If passed on first attempt, second attempt is not valid
    • If failed both times, new voucher needs to be purchased

Certification Validity

The CISP™ certification is valid for 5 years. Candidates must re-certify after that period to maintain the credential.


Course Outline

Module 1: Introduction to Information Security

  • Importance beyond computer security
  • Employee mindsets
  • Roles & responsibilities
  • Threats
  • Policies, procedures, risk management
  • Information protection programs

Module 2: Threats to Information Security

  • Common threats like:
    • Errors & omissions
    • Fraud, theft
    • Hackers
    • Malware
    • Denial-of-service
    • Social engineering

Module 3: Structure of an Information Security Program

  • Security program design
  • Roles across business units
  • Awareness programs
  • Steering committees
  • Roles from senior management to third parties

Module 4: Information Security Policies

  • Why policies matter
  • Types of policies (Tier 1, 2, 3)
  • Employment, conduct, asset classification, records management
  • Legal frameworks (SOX, HIPAA, FCPA, GLBA, etc.)

Module 5: Asset Classification

  • Classification methods
  • Confidential info
  • Roles: Owner, Custodian, User
  • Handling printed and electronic data
  • Retention and disposal
  • Reclassification and authorization

Module 6: Access Control

  • Access control policies
  • User access and system-level controls
  • Remote access standards
  • Monitoring, logging, IDS
  • Cryptographic concepts
  • Sample access policy

Module 7: Physical Security

  • Physical access control
  • Fire prevention and response
  • Secure document disposal
  • Intrusion detection
  • Physical security policy and planning

Target Audience

This certification is suited for professionals in roles such as:

  • IT consultants
  • Managers
  • Security policy creators
  • Privacy officers
  • Information security officers
  • Network & security device administrators
  • Security engineers
Additional Info
Item added to wishlist View Wishlist
Item removed from wishlist