top of page

CISSP Training

The CISSP (Certified Information Systems Security Professional) certification is a globally recognized
credential that validates advanced knowledge in information security. This training program is ideal
for professionals in various cybersecurity and IT security roles.

REASONS TO CHOOSE

✔ World-Class Training Sessions from Experienced Instructors
 Letter of Completion
✔ Digital Delegate Pack

CISSP Course Training Details

Untitled design (65).png

Certified Information Systems Security Professional Course Outline

Domain 1: Security and Risk Management

  • Comprehend and implement core security principles

  • Apply governance frameworks for security management

  • Address global legal and regulatory requirements related to information security

  • Understand investigative procedures and requirements

  • Develop, document, and enforce security policies, standards, and procedures

  • Analyze and prioritize business continuity (BC) needs

  • Contribute to and uphold personnel security policies

  • Utilize risk management methodologies

  • Understand and apply threat modeling techniques

  • Implement supply chain risk management strategies

  • Develop and maintain security awareness, education, and training programs

Domain 2: Asset Security

  • Classify and manage data and assets

  • Define and enforce handling procedures for sensitive information

  • Securely allocate and manage resources

  • Oversee data lifecycle processes

  • Ensure proper asset retention practices

  • Implement security controls and compliance measures for data protection

 

Domain 3: Security Architecture and Engineering

  • Apply secure design principles in engineering processes

  • Understand security models and foundational concepts

  • Select appropriate security controls based on system requirements

  • Evaluate and enhance security features of information systems

  • Identify and address vulnerabilities in security architectures and designs

  • Understand cryptographic lifecycle management

  • Recognize cryptanalytic attack techniques

  • Apply security principles in facility and site design

  • Implement security measures for physical locations

  • Manage information system lifecycle security

 

Domain 4: Communication and Network Security

  • Design and implement secure network architectures

  • Protect network components against threats

  • Establish secure communication channels aligned with design principles

 

Domain 5: Identity and Access Management (IAM)

  • Control both physical and logical access to resources

  • Manage authentication and identification for users, devices, and services

  • Integrate third-party identity management solutions

  • Implement and oversee authorization mechanisms

  • Administer identity and access lifecycle processes

  • Deploy authentication technologies

 

Domain 6: Security Assessment and Testing

  • Develop and validate assessment, testing, and auditing strategies

  • Perform security control evaluations

  • Collect and analyze security-related process data

  • Interpret test results and generate reports

  • Conduct or support security audits

Domain 7: Security Operations

  • Assist in security investigations

  • Perform logging and monitoring to detect threats

  • Securely allocate and manage system resources

  • Apply fundamental security operations principles

  • Utilize resource protection methods

  • Execute incident response strategies

  • Maintain and operate security measures for threat detection and prevention

  • Manage patching and vulnerability remediation

  • Participate in change management processes

  • Develop and implement recovery strategies

  • Establish and test disaster recovery (DR) plans

  • Engage in business continuity (BC) planning and exercises

  • Manage physical security measures

  • Address personnel safety and security considerations

 

Domain 8: Software Development Security

  • Incorporate security throughout the Software Development Life Cycle (SDLC)

  • Apply security controls within development environments

  • Evaluate software security effectiveness

  • Assess security implications of acquired software

  • Implement secure coding best practices and standards

Show more

bottom of page