CISSP Training

CISSP Training is designed to prepare students to pass the Certified Information Systems Security Professional (CISSP) certification exam. The CISSP course develops the candidate’s understanding of security methodology and the skills necessary for a professional to observe, analyze, and verify organizational security threats and vulnerabilities.

Note: This course has been updated to reflect the new May 1 CISSP exam objectives.

Upon completion of the course, students are offered to attend (as many times as desired) our ongoing live, online full-day exam preparation review sessions prior to taking the examination.

Exam Name:

Upcoming Dates

Class Date Class Hours Location GTR Price  
Date Range Date Range Live Online   $4995.00 Register Quote
Date Range Date Range Live Online   $4995.00 Register Quote
Date Range Date Range Live Online   $4995.00 Register Quote

What's Included

  • Comprehensive study materials, including official courseware, Exam Prep Study Guide, Exam Review Sessions, and Boson ExSim-Max for CISSP.
  • (ISC)² CISSP Exam Voucher ($749 Value) & free retake if needed


The International Information Systems Security Certification Consortium, also known as (ISC)2, requires exam candidates to have a minimum of five years of relevant work experience in two or more of the eight domains, four years of work experience with an applicable college degree or a credential from the (ISC)2 approved list. The CISSP certification requires successfully passing the CISSP exam, which is administered by (ISC)2, and having met the experience requirements.

If you do not yet have the necessary experience, you may earn the Associate of (ISC)2 designation by passing the required CISSP examination.

Course Objectives

You will control access to data and information systems using common access control best practices. You will discover how networks are designed for security, and the components, protocols, and services that allow telecommunications to occur in a secure manner. Next, you will learn about the principles of security management and how to manage risk as part of a comprehensive information security management program. You will explore applications and systems development security controls. Then, you will learn how to perform cryptography and how to secure system architecture. You will examine operations security and the appropriate controls and best practices to use to keep operations secure. You will learn how to perform business continuity planning and apply physical security to protect organizational assets and resources. Finally, you will explore law, investigations, and ethics with respect to information systems security and computer forensics.

Course Outline

  • Security and Risk Management (Security, Risk, Compliance, Law, Regulations, Business Continuity)
  • Asset Security (Protecting Security of Assets)
  • Security Architecture and Engineering (Engineering and Management of Security)
  • Communications and Network Security (Designing and Protecting Network Security)
  • Identity and Access Management (Controlling Access and Managing Identity)
  • Security Assessment and Testing (Designing, Performing, and Analyzing Security Testing)
  • Security Operations (Foundational Concepts, Investigations, Incident Management, Disaster Recovery)
  • Software Development Security (Understanding, Applying, and Enforcing Software Security)