CISSP Training

Home / Security Training / Certified Information Systems Security Professional (CISSP)

CISSP is recognised globally as an excellent security accreditiation

Who is the course aimed at?

The Certified Information Systems Security Professional (CISSP) Training Course is a globally acknowledged credential that demonstrates a high level of expertise in Information Security.

It’s aimed at people in roles such as:

Information Security Professionals
Security Consultants
Security Managers
Security Analysts
Risk Management Specialists
Network Architects
Compliance Officers

Course overview

The Certified Information Systems Security Professional (CISSP) Training Course is a critical pillar in cyber security. In an era marked by escalating cyber threats, the need for individuals with comprehensive knowledge of Information Security is paramount. This course equips professionals with the expertise needed to safeguard critical data, mitigate risks, and ensure that robust security measures are in place.

Proficiency in CISSP Training is imperative in a world where cyber attacks are relentless. This qualification is indispensable for professionals such as IT Managers, Security Consultants, and Network Architects who are entrusted with protecting sensitive data. Mastery of CISSP opens doors to career growth and exemplifies commitment to securing organisations against evolving cyber threats. Individuals aiming to lead and excel in the field of Information Security can benefit from attending this course.

The 5-day Online CISSP Training is designed to provide delegates with a rapid and comprehensive understanding of key CISSP concepts. Through interactive sessions, real-world case studies, and expert guidance, delegates will gain valuable insights into security policies, risk management, cryptography, and access control systems.

What is the course curriculum?

The course consists of 8 domains covered over a 5 day period.

Domain 1: Security and Risk Management

Understand and Apply Security Concepts
Evaluate and Apply Security Governance Principles
Legal and Regulatory Issues that Pertain to Information Security in a Global Context
Requirements for Investigation Types
Develop, Document, and Implement Security Policy, Standards, Procedures, and Guidelines
Identify, Analyse, and Prioritise Business Continuity (BC) Requirements
Contribute to and Enforce Personnel Security Policies and Procedures
Understand and Apply Risk Management Concepts
Understand and Apply Threat Modelling Concepts and Methodologies
Apply Supply Chain Risk Management (SCRM) Concepts
Establish and Maintain a Security Awareness, Education, and Training Programme

Domain 2: Asset Security

Identify and Classify Information and Assets
Establish Information and Asset Handling Requirements
Provision Resources Securely
Manage Data Lifecycle
Ensure Appropriate Asset Retention
Determine Data Security Controls and Compliance Requirements

Domain 3: Security Architecture and Engineering

Research, Implement, and Manage Engineering Processes Using Secure Design Principles
Understand the Fundamental Concepts of Security Models
Select Controls Based Upon Systems Security Requirements
Understand Security Capabilities of Information Systems
Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements
Cryptographic Life Cycle
Understand Methods of Cryptanalytic Attacks
Apply Security Principles to Site and Facility Design
Design Site and Facility Security Controls
Manage the information system life-cycle

Domain 4: Communication and Network Security

Implement Secure Design Principles in Network Architectures
Secure Network Components
Implement Secure Communication Channels According to Design

Domain 5: Identity and Access Management

Control Physical and Logical Access to Assets
Manage Identification and Authentication of People, Devices, and Services
Integrate Identity as a Third-Party Service
Implement and Manage Authorisation Mechanisms
Manage the Identity and Access Provisioning Lifecycle
Implement Authentication Systems

Domain 6: Security Assessment and Testing

Design and Validate Assessment, Test, and Audit Strategies
Conduct Security Control Testing
Collect Security Process Data
Analyse Test Output and Generate Report
Conduct or Facilitate Security Audits

Domain 7: Security Operations

Understand and Support Investigations
Conduct Logging and Monitoring Activities
Securely Provisioning Resources
Understand and Apply Foundational Security Operations Concepts
Apply Resource Protection Techniques
Conduct Incident Management
Operate and Maintain Detective and Preventative Measures
Implement and Support Patch and Vulnerability Management
Participate in Change Management Processes
Implement Recovery Strategies
Implement disaster recovery (DR) processes
Test disaster recovery plans (DRP)
Participate in Business Continuity (BC) planning and exercises
Implement and manage physical security
Address personnel safety and security concerns

Domain 8: Software Development Security

Integrate Security in the Software Development Life Cycle (SDLC)
Identify and Apply Security Controls in Development Environments
Assess the Effectiveness of Software Security
Assess Security Impact of Acquired Software
Define and Apply Secure Coding Guidelines and Standards

What’s included?

World-Class Training Sessions from Experienced Instructors
CISSP Certificate
Digital Delegate Pack

Certified Information Systems Security Professional (CISSP) Training Course

£3695.00 + VAT

CISSP professionals are highly sought after

WE CAN PROVIDE A DISCOUNT FOR MULTIPLE PEOPLE

We can enrol you today, you will get the course details via email

Contact us.

CISSP Training
First
Last
Data Protection - Please give your explicit consent for the processing of your personal data.

Cyber Security 4 you
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.