Skilldacity | UpSkill & Advance

(ISC)² CISSP Information Systems Security Architecture Professional, ISSAP

SKU ISC2CC-1-1-1-1 Categories , Tags , , , , , ,

As the architect, you play a key role in the information security department. Your responsibilities fall between the C-suite and upper managerial level and the implementation of the security program.

Although your role is tied closely to technology, it may be closer to the consultative and analytical process of information security.

This security architect certification proves your expertise in developing, designing, and analyzing security solutions. It also shows you excel at giving risk-based guidance to senior management to meet organizational goals.


  • Domain 1. Architect for Governance, Compliance, and Risk Management
  • Domain 2. Security Architecture Modeling
  • Domain 3. Infrastructure Security Architecture
  • Domain 4. Identity and Access Management (IAM) Architecture
  • Domain 5. Architect for Application Security
  • Domain 6. Security Operations Architecture

This course is designed for the chief security architect or analyst. Drawing from the comprehensive Informational Systems Security Architecture Professional (ISSAP) Common Body of Knowledge (CBK), the course provides a deep understanding of the broad spectrum of topics included in the CBK and addresses new threats, technologies, regulations, standards, and practices.

Who Should Attend
Before taking this course the learner should hold the CISSP designation and have the following experience, skills, or knowledge obtained while serving in the following roles:

  • System Architect
  • Chief Technology Officer
  • System and Network Designer
  • Business Analyst
  • Chief Security Officer

Course Objectives
After completing this course, learners will be able to:

  • Create an Information Security Architecture that meets the requirements of governance, compliance, and risk management.
  • Evaluate Security architecture models and frameworks.
  • Develop an infrastructure security program.
  • Produce an identity and access management architecture.
  • Integrate security principles into application development.
  • Design a security operations architecture.

Course Components:

  • (ISC)² CISSP-ISSAP Fundamentals Course
  • (ISC)² CISSP-ISSAP Training Course


To see prices please register or contact your certification consultant.

Custom configured devices are available.  Please contact your certification consultants for details or click on the device request button below.  For stock device configuration please click here.

Get 20% Discount

Sign up to receive updates, promotions, and sneak peaks of upcoming products. Plus 20% off your next order.

Promotion nulla vitae elit libero a pharetra augue