Skip to Scheduled Dates
Course Overview
Cybercrime damages are projected to cost the world $10.5 trillion annually by 2025. Organizations need leaders who can design and defend secure IT systems against today’s complex threats.
The Certified Information Systems Security Professional (CISSP) Training equips you with the expertise to build, manage, and secure enterprise IT environments. Covering the eight domains of the (ISC)² CISSP Common Body of Knowledge (CBK), this course prepares you to design, implement, and oversee security programs that protect critical data and infrastructure.
More than just exam prep, this training validates your ability to balance governance, risk, compliance, and technical defenses—skills that make CISSPs among the most respected and highest-paid professionals in cybersecurity.
Who Should Attend
This course is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and engineers, network administrators, information security specialists, and risk management professionals, who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career.
Through the study of all eight CISSP Common Body of Knowledge (CBK) domains, students will validate their knowledge by meeting the necessary preparation requirements to qualify to sit for the CISSP certification exam. Additional CISSP certification requirements include a minimum of five years of direct professional work experience in two or more fields related to the eight CBK security domains, or a college degree and four years of experience.
It is also highly recommended that students complete the CompTIA Network+ CompTIA and Security+ certifications or possess equivalent professional experience upon beginning CISSP training. Students will also benefit from having one or more of the following security-related or technology-related certifications or equivalent industry experience: MCSE, MCTS, MCITP, SCNP, CCNP, RHCE, LCE, CNE, SSCP®, GIAC, CISA™, or CISM®.
Course Objectives
By the end of this CISSP certification training course, participants will be able to apply knowledge across all eight (ISC)² CISSP domains and demonstrate the skills needed to earn the certification.
- Analyze security and risk management principles
- Apply asset security controls and data protection strategies
- Design secure architectures and apply security engineering concepts
- Implement communication, network, and identity management solutions
- Conduct security assessments, testing, and operations management
- Apply secure software development practices
- Prepare effectively for the CISSP certification exam with official (ISC)² resources
Course Prerequisites
Other Prerequisites
It is highly recommended that students have certifications in Network+ or Security+, or possess equivalent professional experience upon entering CISSP training. It will be beneficial if students have one or more of the following security-related or technology-related certifications or equivalent industry experience: MCSE, MCTS, MCITP, SCNP, CCNP, RHCE, LCE, CNE, SSCP®, GIAC, CISA™, or CISM®.
Course Outline
Module 1: Security and Risk Management
- Governance, compliance, and ethics
- Risk management frameworks
- Business continuity planning
- Personnel security and awareness training
Module 2: Asset Security
- Classification and privacy protection
- Data retention and security controls
- Secure data handling
Module 3: Security Engineering
- Security models and lifecycle integration
- Cryptography concepts and techniques
- Facility and physical security design
Module 4: Communications and Network Security
- Network architecture and security controls
- Secure communication channels
- Threats to networked systems
Module 5: Identity and Access Management
- Access control models
- Authentication and authorization methods
- Identity as a service (IDaaS)
Module 6: Security Assessment and Testing
- Vulnerability assessment and penetration testing
- Security audits and evaluations
- Continuous monitoring
Module 7: Security Operations
- Incident detection and response
- Disaster recovery procedures
- Operational resilience strategies
Module 8: Software Development Security
- Secure coding practices
- Database security
- Software configuration management