Certified Information System Security Professional(CISSP)

4.5/5

Time to accelerate your cybersecurity career with the world’s top-ranking cybersecurity certification. The CISSP course provides you with the knowledge, skills, and ability to manage, operate, develop and plan an effective network security infrastructure with the basics of asset security, cryptography, security and risk management, and various threats and attacks. It is considered the first certification in the field of information security to meet the demanding requirements of ISO/IEC Standard 17024.

And specially designed for people who want to become certified security professionals and are looking to work that requires the CISSP certification. This course is 5 days long and once you receive a notification informing you that you have successfully passed the CISSP exam you will be awarded a Certified Information System Security Professional(CISSP) certificate. 

Training Options

Classroom Training

Online Instructor Led

Onsite Training

Course Information

Certified Information Systems Security Professional Course Outline

The following subjects will be taught during this five-day CISSP course:

Security and Risk Management:

  • Confidentiality, Integrity, and Availability Concepts
  • Security Governance Principles
  • Compliance
  • Legal and Regulatory Issues
  • Professional Ethics
  • Security Policies, Standards, Procedures, and Guidelines

Asset Security:

  • Information and Asset Classification
  • Ownership
  • Protect Privacy
  • Appropriate Retention
  • Data Security Controls
  • Handling Requirements

Security Architecture and Engineering:

  • Engineering Processes using Secure Design Principles
  • Security Models Fundamental Concepts
  • Security Evaluation Models
  • Security Capabilities of Information Systems
  • Security Architectures, Designs, and Solution Elements Vulnerabilities
  • Web-based Systems Vulnerabilities
  • Mobile Systems Vulnerabilities
  • Embedded Devices and Cyber-Physical Systems Vulnerabilities
  • Cryptography
  • Site and Facility Design Secure Principles
  • Physical Security

Communication and Network Security:

  • Secure Network Architecture Design
  • Secure Network Components
  • Secure Communication Channels
  • Network Attacks

Identity and Access Management (IAM):

  • Physical and Logical Assets Control
  • Identification and Authentication of People and Devices
  • Identity as a Service
  • Third-party Identity Services
  • Access Control Attacks
  • Identity and Access Provisioning Lifecycle

Security Assessment and Testing:

  • Assessment and Test Strategies
  • Security Process Data
  • Security Control Testing
  • Test Outputs
  • Security Architectures Vulnerabilities

Security Operations:

  • Investigations Support and Requirements
  • Logging and Monitoring Activities
  • Provisioning of Resources
  • Foundational Security Operations Concepts
  • Resource Protection Techniques
  • Incident Management
  • Preventative Measures
  • Patch and Vulnerability Management
  • Change Management Processes
  • Recovery Strategies
  • Disaster Recovery Processes and Plans
  • Business Continuity Planning and Exercises
  • Physical Security
  • Personnel Safety Concerns

Software Development Security:

  • Security in the Software Development Lifecycle
  • Development Environment Security Controls
  • Software Security Effectiveness
  • Acquired Software Security Impact

Delegates should purchase the following book which will be used during the course: The Official (ISC)2 Guide to the CISSP CBK Reference, 5th Edition, by John Warsinske.

It might also prove useful to briefly read over some of this guide prior to starting the course to supplement your learning and prepare you for your CISSP training.

Who Should Attend this CISSP Training Course?

This CISSP training course is suitable for mid- and senior-level managers who are working towards or have already achieved a position such as:

  • Chief Information Security Officer (CISO)
  • Chief Security Officer (CSO)
  • Senior Security Engineer
  • Security Consultant
  • Security Manager
  • Security Auditor
  • Security Architect
  • Network Architect

Prerequisites

No prior certifications are required, but delegates will thrive if they possess experience or knowledge of IS Security

Q: What are the basic requirements for Certified Information System Security Professional?

A: Candidate must have an experience of work, peer endorsement, ethics adherence, and successfully pass the CISSP exam are the requirements to qualify for Certified Information System Security Professional.

Q: Who should take CISSP course?

A: If you have 5 years of paid work experience in two or more of the eight domains of the CISSP and earning a four-year college degree equivalent or an additional credential from the (ISC)² approved list will be the criteria for CISSP course

Q: What are some of the domains of CISSP?

A: Some of the major domains of CISSP are, Security and risk management, Security assessment and testing, Security architecture and engineering, Asset security, Communication and network security, Security Operations and Identity and access management (IAM), and Software Development Security

Q: Can I take the CISSP without having 5 years of experience?

A: No you are not eligible unless you have a relevant industrial 5 years of experience, after that you will be qualified to become an official CISSP certificate expert. 

100% Business Fulfilment

Request more Information

    Corporate Training Options

    Classroom Training

    Customized to your Team’s needs

    Onsite Training

    Deliver at your Work Location

    Online Instructor Led

    Connect Online from Anywhere

    What People say?

    Not sure,
    which course to choose?

    Our Clients across the Globe!

    Our Corporate Clients