BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Training Heights - ECPv6.15.11//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Training Heights
X-ORIGINAL-URL:https://trainingheights.com
X-WR-CALDESC:Events for Training Heights
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:Africa/Lagos
BEGIN:STANDARD
TZOFFSETFROM:+0100
TZOFFSETTO:+0100
TZNAME:WAT
DTSTART:20250101T000000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=Africa/Lagos:20260420T000000
DTEND;TZID=Africa/Lagos:20260424T000000
DTSTAMP:20260426T202634
CREATED:20251013T150248Z
LAST-MODIFIED:20260306T101017Z
UID:5453-1776643200-1776988800@trainingheights.com
SUMMARY:CISSP
DESCRIPTION:What You Will Learn\n\nIntroduction to Information Security: Understand the fundamentals of information security\, governance\, and risk management\, and the importance of protecting organizational assets in a connected world.\nSecurity and Risk Management: Learn the core principles of confidentiality\, integrity\, and availability (CIA)\, along with governance\, compliance\, and risk management practices essential for protecting organizational assets.\nAsset Security: Understand how to classify\, manage\, and protect information and assets throughout their lifecycle\, ensuring proper data security and compliance with global standards.\nSecurity Architecture and Engineering: Explore secure design principles\, cryptography\, and security models\, and learn how to build and maintain resilient systems against evolving cyber threats.\nCommunication and Network Security: Master secure network architecture\, transmission methods\, and communication channels—learning how to protect data in transit and defend against network-based attacks.\nIdentity and Access Management (IAM): Gain practical knowledge on controlling access\, implementing authentication mechanisms\, and managing identities to ensure that only authorized users access critical systems.\nSecurity Assessment and Testing: Learn how to design\, perform\, and analyze security testing strategies to identify vulnerabilities and maintain system integrity across organizational environments.\nSecurity Operations: Master incident response\, disaster recovery\, logging\, monitoring\, and forensics to maintain business continuity and operational resilience.\nSoftware Development Security: Discover how to integrate security throughout the software development lifecycle (SDLC) to minimize risks in modern applications and cloud-based environments.\nCertification and Professional Development: Prepare for the CISSP certification exam with domain-based study\, practice assessments\, and guidance to advance your cybersecurity career.\n\n\n\n\n\n\nLimited Slots Available\nSecure your seat — limited availability \nWe keep class sizes small to ensure hands-on support and personalized feedback. \nSeats left: 12 \n📅 Happening on: April 20 – April 24\, 2026 \n⏳ Duration: 5 days • Live
URL:https://trainingheights.com/event/cissp/
CATEGORIES:EC-Council
ATTACH;FMTTYPE=image/jpeg:https://trainingheights.com/wp-content/uploads/2025/10/CISSP.jpg
END:VEVENT
END:VCALENDAR