CISSP Training

CISSP Training is a five-day instructor-led course is designed to prepare students to pass the Certified Information Systems Security Professional (CISSP) certification exam. The CISSP course develops the candidate’s understanding of security methodology and the skills necessary for a professional to observe, analyze, and verify organizational security threats and vulnerabilities.

Upcoming Dates

Class Date Class Hours Location GTR Price  
Date Range Date Range Live Online $3995.00 Register Quote
Date Range Date Range Columbia, MD $3995.00 Register Quote
Date Range Date Range Dallas, TX $3995.00 Register Quote
Date Range Date Range Tempe, AZ   $3995.00 Register Quote
Date Range Date Range Washington, DC   $3995.00 Register Quote
Date Range Date Range Atlanta, GA   $3995.00 Register Quote
Date Range Date Range Salt Lake City, UT   $3995.00 Register Quote
Date Range Date Range Seattle-Tacoma, WA $3995.00 Register Quote
Date Range Date Range San Diego, CA   $3995.00 Register Quote
Date Range Date Range Washington, DC   $3995.00 Register Quote

What's Included

  • Comprehensive study materials, including Boson ExSim-Max for CISSP.


The International Information Systems Security Certification Consortium, also known as (ISC)2, requires exam candidates to have a minimum of five years of relevant work experience in two or more of the eight domains, four years of work experience with an applicable college degree or a credential from the (ISC)2 approved list. The CISSP certification requires successfully passing the CISSP exam, which is administered by (ISC)2, and having met the experience requirements.

If you do not yet have the necessary experience, you may earn the Associate of (ISC)2 designation by passing the required CISSP examination.

Course Objectives

You will control access to data and information systems using common access control best practices. You will discover how networks are designed for security, and the components, protocols, and services that allow telecommunications to occur in a secure manner. Next, you will learn about the principles of security management and how to manage risk as part of a comprehensive information security management program. You will explore applications and systems development security controls. Then, you will learn how to perform cryptography and how to secure system architecture. You will examine operations security and the appropriate controls and best practices to use to keep operations secure. You will learn how to perform business continuity planning and apply physical security to protect organizational assets and resources. Finally, you will explore law, investigations, and ethics with respect to information systems security and computer forensics.

Course Outline

  • Security and Risk Management (Security, Risk, Compliance, Law, Regulations, Business Continuity)
  • Asset Security (Protecting Security of Assets)
  • Security Engineering (Engineering and Management of Security)
  • Communications and Network Security (Designing and Protecting Network Security)
  • Identity and Access Management (Controlling Access and Managing Identity)
  • Security Assessment and Testing (Designing, Performing, and Analyzing Security Testing)
  • Security Operations (Foundational Concepts, Investigations, Incident Management, Disaster Recovery)
  • Software Development Security (Understanding, Applying, and Enforcing Software Security)