Skip to content

Contact sales

By filling out this form and clicking submit, you acknowledge our privacy policy.

CISSP Examination Preparation Course

Course Summary

This CISSP Exam Prep explores the complete curriculum of CISSP and aims to provide deep knowledge on information systems, cyber security controls, security architecture and security operations. This course helps learners have a holistic understanding of security architecture and security controls in different parts of any Information System Architecture. It provides learners with a better and broader understanding of the common body of knowledge for cybersecurity.

The (ISC)2 Certified Information Systems Security Professional (CISSP) certification is one of the world’s premier cybersecurity certifications and increases the level of credibility of the candidate as a cybersecurity strategist.

 

Purpose
Gain a deep knowledge on information systems, cyber security controls, security architecture and security operations in preparation for the CISSP exam..
Audience
IT professionals with some experience in security that want to prepare for the CISSP certification exam.
Skill level
Intermediate
Style
Lectures | Hands-on Activities
Duration
5 days

 

Learning objectives
  • Apply knowledge of CISSP domains in preparation for the certification exam
  • Extend knowledge and expertise as an information security professional
  • Demonstrate a deep understanding of each CISSP domain
  • Prepare an exam preparation tracker along with proper time division
  • Choose the right CISSP preparation mechanisms
  • Understand security at holistic level and how different security domains work
  • Illustrate how to design, develop and manage an organization’s overall security

What you'll learn:

In this course, you'll learn:

  • Note: In 5 days instructor led training, following domains of CISSP will be discussed in depth with concept building, case studies, examples, learning activities and a good amount of practice questions.

 

  • Domain 1. Security and Risk Management
    • Security governance principles
    • Compliance and other requirements
    • Legal and regulatory issues that pertain to information security in a holistic context
    • Security policy, standards, procedures, and guidelines
    • Business Continuity (BC) requirements
    • Risk management concepts
    • Security awareness, education, and training program
  • Domain 2. Asset Security
    • Asset identification and classification
    • Asset Handling
    • Data lifecycle
    • Data security controls and compliance requirements
  • Domain 3. Security Architecture and Engineering
    • Secure Design Principles
    • Security Models
    • System Security Requirements
    • Vulnerability Management
    • Cryptography
    • Site and Facility Security Controls
  • Domain 4. Communication and Network Security
    • Network Security
    • Security Architecture
    • Secure Communication Channels
  • Domain 5. Identity and Access Management (IAM)
    • Physical and Logical Access
    • IAM Models
    • Federated Identity
    • Authentication Systems
    • Identity and access provisioning lifecycle
  • Domain 6. Security Assessment and Testing
    • Security Control Testing
    • Vulnerability Assessment and Penetration testing
    • Audit Strategies
    • Facility Security Audits
  • Domain 7. Security Operations
    • Logging and Monitoring
    • Configuration Management
    • Incident Management
    • Resource Protection
    • Change Management
    • BC and DR
    • Physical Security
  • Domain 8. Software Development Security
    • Secure SDLC Models
    • Secure Coding Guidelines

Dive in and learn more

When transforming your workforce, it’s important to have expert advice and tailored solutions. We can help. Tell us your unique needs and we'll explore ways to address them.

Let's chat

By filling out this form and clicking submit, you acknowledge our privacy policy.