Certified Information
Systems Security
Professional (CISSP®)

Overview

Welcome to Certified Information Systems Security Professional (CISSP)®. With your completion of the prerequisites and necessary years of experience, you are firmly grounded in the knowledge requirements of today’s security professional. This course will expand upon your knowledge by addressing the essential elements of the eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job related approach to the security process, while providing a framework to prepare for CISSP certification. CISSP is the premier certification for today’s information systems security professional. It remains the premier certification because the sponsoring organization, the International Information Systems Security Certification Consortium, Inc. (ISC)2®, regularly updates the test by using subject matter experts (SMEs) to make sure the material and the questions are relevant in today’s security environment. By defining eight security domains that comprise a CBK, industry standards for the information systems security professional have been established. The skills and knowledge you gain in this course will help you master the eight CISSP domains and ensure your credibility and success within the information systems security field.

Course Objective

In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK. You will:
• Analyze components of the Security and Risk Management domain.
• Analyze components of the Asset Security domain.
• Analyze components of the Security Engineering domain.
• Analyze components of the Communications and Network Security domain.
• Analyze components of the Identity and Access Management domain.
• Analyze components of the Security Assessment and Testing domain.
• Analyze components of the Security Operations domain.
• Analyze components of the Software Development Security domain.

Who Should Attend

This course is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and engineers, network administrators, information security specialists, and risk management professionals, who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career. Through the study of all eight CISSP Common Body of Knowledge (CBK) domains, students will validate their knowledge by meeting the necessary preparation requirements to qualify to sit for the CISSP certification exam. Additional CISSP certification requirements include a minimum of five years of direct professional work experience in two or more fields related to the eight CBK security domains, or a college degree and four years of experience.

Prerequisites

It is highly recommended that students have certifications in Network+ or Security+ or possess equivalent professional experience upon entering CISSP training. It will be beneficial if students have one or more of the following security-related or technology-related certifications or equivalent industry experience: Cybersecure First Responder (CFR), MCSE, CCNP, RHCE, LCE, SSCP®, GIAC, CISA™, or CISM®.
Analyzing Data with MS Excel

Training Calendar

Intake

Duration

Program Fees

Inquire further

5 Day

Contact us to find out more

Module


• Security Governance Principles
• Compliance
• Professional Ethics
• Security Documentation
• Risk Management
• Remodelling
• Business Continuity Plan Fundamentals
• Acquisition Strategy and Practice
• Personnel Security Policies
• Security Awareness and Training


• Asset Classification
• Privacy Protection
• Asset Retention
• Data Security Controls
• Secure Data Handling


• Security in the Engineering Lifecycle
• System Component Security
• Security Models
• Controls and Countermeasures in Enterprise Security
• Information System Security Capabilities
• Design and Architecture Vulnerability Mitigation
• Cryptography Concepts
• Vulnerability Mitigation in Embedded, Mobile, and Web-Based
Systems
• Cryptography Techniques
• Site and Facility Design for Physical Security
• Physical Security Implementation in Sites and Facilities


• Network Protocol Security
• Network Components Security
• Communication Channel Security
• Network Attack Mitigation


• Physical and Logical Access Control
• Identification, Authentication, and Authorization
• Identity as a Service
• Authorization Mechanisms
• Access Control Attack Mitigation

FAQs

Q: What is the Certified Information Systems Security Professional (CISSP®) course about?
The CISSP course, awarded by (ISC)², is the premier certification for experienced information systems security professionals. It expands on foundational security knowledge by covering the eight domains of the CISSP Common Body of Knowledge (CBK®), preparing participants for the CISSP certification exam with a job-relevant, practical approach to security.

Q: Who should attend this course?
This course is ideal for IT security practitioners, auditors, consultants, network/security analysts, administrators, information security specialists, and risk management professionals seeking to validate their expertise and pursue CISSP certification for career advancement.

Q: What are the prerequisites for this course?
Participants should have a minimum of five years of professional work experience in at least two of the eight CISSP CBK domains. A four-year college degree or an approved credential can substitute for one year of experience. It is highly recommended to have certifications such as Network+, Security+, or equivalent industry experience.

Q: How long is the course?
The course duration is 5 days.

Q: What key topics are covered in this course?
The course is divided into eight modules aligned with the CISSP CBK domains:

  • Module 1: Security and Risk Management – Governance, compliance, ethics, BCP, and risk frameworks.

  • Module 2: Asset Security – Data classification, retention, privacy, and secure handling.

  • Module 3: Security Engineering – System architecture, cryptography, vulnerabilities, and physical security.

  • Module 4: Communications and Network Security – Protocols, channels, network components, and mitigation strategies.

  • Module 5: Identity and Access Management – Access controls, authentication, and identity services.

  • Module 6: Security Assessment and Testing – (Covered in full course content; not shown above)

  • Module 7: Security Operations – (Covered in full course content; not shown above)

  • Module 8: Software Development Security – (Covered in full course content; not shown above)

Q: Will I receive a certification after completing the course?
This course prepares participants for the CISSP certification exam. Upon passing the exam and fulfilling the (ISC)² experience requirements, participants will earn the globally recognized CISSP credential.

Q: What foundational security management concepts will I learn in this course?
You’ll gain a solid understanding of security and risk management principles, including security governance, compliance standards, ethics, and risk frameworks. This foundation will help you develop policies and strategies that support enterprise-wide security initiatives and align with business continuity and acquisition planning.

Q: How does the course prepare me to align security initiatives with business strategy?
The course emphasizes integrating security management with organizational goals through modules on governance, risk, and compliance. You’ll explore how to develop security policies, establish awareness programs, assess risk appetite and tolerance, and support decision-making that ties security operations directly to business objectives.

Q: What skills will I develop in assessing and mitigating security risks?
You’ll learn how to conduct thorough risk assessments, identify threats and vulnerabilities, apply appropriate security controls, and ensure continuous testing and evaluation. You’ll also work with business continuity plans, personnel security policies, and asset classification to enhance your risk management capabilities.

Q: Will I learn how to secure IT systems and infrastructure?
Yes, the course covers securing systems across their lifecycle, applying cryptographic principles, and addressing vulnerabilities in physical facilities, networks, and software. You’ll gain hands-on knowledge in system design, secure architecture, communication channel protection, and countermeasures for network and system-based threats.

Q: How does the course address compliance and ongoing operations?
You’ll explore legal and regulatory frameworks, ethical responsibilities, and how to design compliant security programs. Topics include documentation, continuous monitoring, and the use of metrics to evaluate effectiveness—ensuring your organization stays aligned with industry standards and audit requirements.

Submit your interest today !

Contact us