Certified Information
Systems Security
Professional (CISSP®)
Overview
Course Objective
In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK. You will:
• Analyze components of the Security and Risk Management domain.
• Analyze components of the Asset Security domain.
• Analyze components of the Security Engineering domain.
• Analyze components of the Communications and Network Security domain.
• Analyze components of the Identity and Access Management domain.
• Analyze components of the Security Assessment and Testing domain.
• Analyze components of the Security Operations domain.
• Analyze components of the Software Development Security domain.
Who Should Attend
Prerequisites

Training Calendar
Intake
Duration
Program Fees
Module
Module 1 - Security and Risk Management
• Security Governance Principles
• Compliance
• Professional Ethics
• Security Documentation
• Risk Management
• Remodelling
• Business Continuity Plan Fundamentals
• Acquisition Strategy and Practice
• Personnel Security Policies
• Security Awareness and Training
Module 2 - Asset Security
• Asset Classification
• Privacy Protection
• Asset Retention
• Data Security Controls
• Secure Data Handling
Module 3 - Security Engineering
• Security in the Engineering Lifecycle
• System Component Security
• Security Models
• Controls and Countermeasures in Enterprise Security
• Information System Security Capabilities
• Design and Architecture Vulnerability Mitigation
• Cryptography Concepts
• Vulnerability Mitigation in Embedded, Mobile, and Web-Based
Systems
• Cryptography Techniques
• Site and Facility Design for Physical Security
• Physical Security Implementation in Sites and Facilities
Module 4 - Communications and Network Security
• Network Protocol Security
• Network Components Security
• Communication Channel Security
• Network Attack Mitigation
Module 5 - Identity and Access Management
• Physical and Logical Access Control
• Identification, Authentication, and Authorization
• Identity as a Service
• Authorization Mechanisms
• Access Control Attack Mitigation
FAQs
General Questions:
Q: What is the Certified Information Systems Security Professional (CISSP®) course about?
The CISSP course, awarded by (ISC)², is the premier certification for experienced information systems security professionals. It expands on foundational security knowledge by covering the eight domains of the CISSP Common Body of Knowledge (CBK®), preparing participants for the CISSP certification exam with a job-relevant, practical approach to security.
Q: Who should attend this course?
This course is ideal for IT security practitioners, auditors, consultants, network/security analysts, administrators, information security specialists, and risk management professionals seeking to validate their expertise and pursue CISSP certification for career advancement.
Q: What are the prerequisites for this course?
Participants should have a minimum of five years of professional work experience in at least two of the eight CISSP CBK domains. A four-year college degree or an approved credential can substitute for one year of experience. It is highly recommended to have certifications such as Network+, Security+, or equivalent industry experience.
Q: How long is the course?
The course duration is 5 days.
Q: What key topics are covered in this course?
The course is divided into eight modules aligned with the CISSP CBK domains:
Module 1: Security and Risk Management – Governance, compliance, ethics, BCP, and risk frameworks.
Module 2: Asset Security – Data classification, retention, privacy, and secure handling.
Module 3: Security Engineering – System architecture, cryptography, vulnerabilities, and physical security.
Module 4: Communications and Network Security – Protocols, channels, network components, and mitigation strategies.
Module 5: Identity and Access Management – Access controls, authentication, and identity services.
Module 6: Security Assessment and Testing – (Covered in full course content; not shown above)
Module 7: Security Operations – (Covered in full course content; not shown above)
Module 8: Software Development Security – (Covered in full course content; not shown above)
Q: Will I receive a certification after completing the course?
This course prepares participants for the CISSP certification exam. Upon passing the exam and fulfilling the (ISC)² experience requirements, participants will earn the globally recognized CISSP credential.
Program Content & Skills:
Q: What foundational security management concepts will I learn in this course?
You’ll gain a solid understanding of security and risk management principles, including security governance, compliance standards, ethics, and risk frameworks. This foundation will help you develop policies and strategies that support enterprise-wide security initiatives and align with business continuity and acquisition planning.
Q: How does the course prepare me to align security initiatives with business strategy?
The course emphasizes integrating security management with organizational goals through modules on governance, risk, and compliance. You’ll explore how to develop security policies, establish awareness programs, assess risk appetite and tolerance, and support decision-making that ties security operations directly to business objectives.
Q: What skills will I develop in assessing and mitigating security risks?
You’ll learn how to conduct thorough risk assessments, identify threats and vulnerabilities, apply appropriate security controls, and ensure continuous testing and evaluation. You’ll also work with business continuity plans, personnel security policies, and asset classification to enhance your risk management capabilities.
Q: Will I learn how to secure IT systems and infrastructure?
Yes, the course covers securing systems across their lifecycle, applying cryptographic principles, and addressing vulnerabilities in physical facilities, networks, and software. You’ll gain hands-on knowledge in system design, secure architecture, communication channel protection, and countermeasures for network and system-based threats.
Q: How does the course address compliance and ongoing operations?
You’ll explore legal and regulatory frameworks, ethical responsibilities, and how to design compliant security programs. Topics include documentation, continuous monitoring, and the use of metrics to evaluate effectiveness—ensuring your organization stays aligned with industry standards and audit requirements.
Submit your interest today !