HTME

COURSE OVERVIEW

IE1065 : Certified Information System Security Professional (ICS Exam Preparation Training)
Certified Information System Security Professional (ICS Exam Preparation Training)
OVERVIEW
COURSE TITLE : IE1065 : Certified Information System Security Professional (ICS Exam Preparation Training)
COURSE DATE : Jun 15 - Jun 17 2025
DURATION : 3 Days
INSTRUCTOR : Dr. Pan Glou
VENUE : Kuwait City, Kuwait
COURSE FEE : $ 3750
Register For Course Outline
OTHER SCHEDULED DATES
Date : Jan 20 - Jan 22 2025 (3 Days) Location : Abu Dhabi, UAE Classroom Fee (US$) : $ 3750 Course Info
Date : Apr 20 - Apr 24 2025 (5 Days) Location : Dubai, UAE Classroom Fee (US$) : $ 3750 Course Info
Date : Jul 06 - Jul 08 2025 (3 Days) Location : Al Khobar, KSA Classroom Fee (US$) : $ 3750 Course Info
Date : Oct 19 - Oct 21 2025 (3 Days) Location : Doha, Qatar Classroom Fee (US$) : $ 4250 Course Info

Course Description

 
This practical and highly-interactive course includes real-life case studies where participants will be engaged in a series of interactive small groups and class workshops. 
 
This course is designed to provide participants with a detailed and up-to-date overview of Certified Information System Security Professional. It covers the security and risk management; the concepts of confidentiality, integrity and availability; the security governance principles, compliance requirements and legal and regulatory issues that pertain to information security in a global context; the business continuity (BC) requirements and personnel security policies and procedures; and the risk management and threat modeling concepts, methodologies and risk-based management concepts to the supply chain. 
 
Further, the course will also discuss the security awareness, education and training program; the asset security, privacy, appropriate asset retention, data security controls and information and asset handling requirements; the security architecture and engineering; the fundamental concepts of security models; and the systems security requirements, security architectures, designs sand solution elements. 
 
Participants of the course will be able to assess and mitigate vulnerabilities in web-based systems, mobile systems and embedded devices; apply cryptography, security principles to site and facility design as well as implement site and facility security controls; employ communication and network security; implement secure design principles in network architectures and identify secure network components; implement secure communication channels according to design; recognize identity and access management (IAM), control physical and logical access to assets; manage identification and authentication of people, devices, and services; integrate identity as a third-party service; implement and manage authorization mechanisms and manage the identity and access provisioning lifecycle; carryout security assessment and testing as well as design and validate assessment, test, and audit strategies and conduct security control testing; and collect security process, analyze test output, generate report and conduct or facilitate security audits. 
 
During this interactive course, participants will learn the security operations, support investigations and the requirements for investigation types; the logging and monitoring activities, provisioning resources and foundational security operations concepts and resource protection techniques; the incident management, detective and preventative measures and patch and vulnerability management; the change management processes, recovery strategies, disaster recovery (DR) processes and disaster recovery plans (DRP); the business continuity (BC) planning and exercises, physical security and personnel safety and security concerns; the software development security, security in the software development life cycle (SDLC) and security controls in development environments; the effectiveness of software security and security impact of acquired software; and the coding guidelines and standard 

link to course overview PDF

TRAINING METHODOLOGY

This interactive training course includes the following training methodologies:

Lectures
Workshops & Work Presentations
Case Studies & Practical Exercises
Videos, Software & Simulators

In an unlikely event, the course instructor may modify the above training methodology for technical reasons.

VIRTUAL TRAINING (IF APPLICABLE)

If this course is delivered online as a Virtual Training, the following limitations will be applicable:

Certificates : Only soft copy certificates will be issued
Training Materials : Only soft copy materials will be issued
Training Methodology : 80% theory, 20% practical
Training Program : 4 hours per day, from 09:30 to 13:30

RELATED COURSES

Plant Equipment & Control System Protection

IE0501 : Plant Equipment & Control System Protection

Metering Pump Selection, Operation, Maintenance & Troubleshooting

IE0600 : Metering Pump Selection, Operation, Maintenance & Troubleshooting

Maintenance of Instrumented Protection Systems (IPS), Pneumatic Converters, Process Control Systems & Emergency Shutdown Valves

IE0343 : Maintenance of Instrumented Protection Systems (IPS), Pneumatic Converters, Process Control Systems & Emergency Shutdown Valves

Plant Equipment & Control System Protection

IE0501 : Plant Equipment & Control System Protection