Certified Information Systems Security Professional (CISSP)

Introduction:

Cybercrime damages are projected to cost the world $10.5 trillion annually by 2025. Organizations need leaders who can design and defend secure IT systems against today’s complex threats.

The Certified Information Systems Security Professional (CISSP) Training equips you with the expertise to build, manage, and secure enterprise IT environments. Covering the eight domains of the (ISC)² CISSP Common Body of Knowledge (CBK), this course prepares you to design, implement, and oversee security programs that protect critical data and infrastructure.

More than just exam prep, this training validates your ability to balance governance, risk, compliance, and technical defenses—skills that make CISSPs among the most respected and highest-paid professionals in cybersecurity.

Objectives:

By the end of this CISSP certification training course, participants will be able to apply knowledge across all eight (ISC)² CISSP domains and demonstrate the skills needed to earn the certification.

Analyze security and risk management principles
Apply asset security controls and data protection strategies
Design secure architectures and apply security engineering concepts
Implement communication, network, and identity management solutions
Conduct security assessments, testing, and operations management
Apply secure software development practices
Prepare effectively for the CISSP certification exam with official (ISC)² resources

Course Outline:

Module 1: Security and Risk Management

  • Governance, compliance, and ethics
  • Risk management frameworks
  • Business continuity planning
  • Personnel security and awareness training

Module 2: Asset Security

  • Classification and privacy protection
  • Data retention and security controls
  • Secure data handling

Module 3: Security Engineering

  • Security models and lifecycle integration
  • Cryptography concepts and techniques
  • Facility and physical security design

Module 4: Communications and Network Security

  • Network architecture and security controls
  • Secure communication channels
  • Threats to networked systems

Module 5: Identity and Access Management

  • Access control models
  • Authentication and authorization methods
  • Identity as a service (IDaaS)

Module 6: Security Assessment and Testing

  • Vulnerability assessment and penetration testing
  • Security audits and evaluations
  • Continuous monitoring

Module 7: Security Operations

  • Incident detection and response
  • Disaster recovery procedures
  • Operational resilience strategies

Module 8: Software Development Security

  • Secure coding practices
  • Database security
  • Software configuration management

Enroll in this course

$3,395.00

Need Help Finding The Right Training Solution?

Our training advisors are here for you.