CISSP Training

CISSP Training is designed to prepare students to pass the Certified Information Systems Security Professional (CISSP) certification exam. The CISSP course develops the candidate’s understanding of security methodology and the skills necessary for a professional to observe, analyze, and verify organizational security threats and vulnerabilities.

Upon completion of the course, students are offered to attend (as many times as desired) our ongoing live, online full-day exam preparation review sessions prior to taking the examination.

Exam Name:
CISSP
Certifications:
CISSP

Upcoming Dates

Apply
Class Date Class Hours Location GTR Price  

What's Included

  • Comprehensive study materials, including official courseware, Exam Prep Study Guide, Exam Review Sessions, and Boson ExSim-Max for CISSP.
  • (ISC)² CISSP Exam Voucher ($749 Value) & free retake if needed

Prerequisites

Candidates must have a minimum of five years cumulative, full-time experience in two or more of the eight domains of the current CISSP Exam Outline. Earning a post-secondary degree (bachelors or masters) in computer science, information technology (IT) or related fields may satisfy up to one year of the required experience or an additional credential from the ISC2 approved list may satisfy up to one year of the required experience. Part-time work and internships may also count towards the experience requirement.

A candidate who doesn't have the required experience to become a CISSP may become an Associate of ISC2 by successfully passing the CISSP examination. The Associate of ISC2 will then have six years to earn the five years required experience.

Course Objectives

You will control access to data and information systems using common access control best practices. You will discover how networks are designed for security, and the components, protocols, and services that allow telecommunications to occur in a secure manner. Next, you will learn about the principles of security management and how to manage risk as part of a comprehensive information security management program. You will explore applications and systems development security controls. Then, you will learn how to perform cryptography and how to secure system architecture. You will examine operations security and the appropriate controls and best practices to use to keep operations secure. You will learn how to perform business continuity planning and apply physical security to protect organizational assets and resources. Finally, you will explore law, investigations, and ethics with respect to information systems security and computer forensics.

Course Outline

  • Security and Risk Management (Security, Risk, Compliance, Law, Regulations, Business Continuity)
  • Asset Security (Protecting Security of Assets)
  • Security Architecture and Engineering (Engineering and Management of Security)
  • Communications and Network Security (Designing and Protecting Network Security)
  • Identity and Access Management (Controlling Access and Managing Identity)
  • Security Assessment and Testing (Designing, Performing, and Analyzing Security Testing)
  • Security Operations (Foundational Concepts, Investigations, Incident Management, Disaster Recovery)
  • Software Development Security (Understanding, Applying, and Enforcing Software Security)