Download Interent ExplorerDownload Apple SafariDownload OperaDownload FirefoxDownload Google Chrome

CISSP Certification Training

CISSP Certification Training

CISSP Certification Training:

CISSP Certification Training or Certified Information Systems Security Professional Training Course hands-on

Authorized CISSP training is often considered as a leading choice for IT personnel interested in information security training. Our CISSP certification Training prep course will review eight of the most relevant information security domains, all of which deliver a wealth of current information on the Common Body of Knowledge (CBK) for the CISSP exam.

Our partnership means everything you receive from this class, from the authorized instructor to the official (ISC)² course material, is always up-to-date and considered the best available.

Aside from a reserved seat in an upcoming CISSP Certification training seminar, you are also provided with a number of helpful CISSP exam resources. For starters, you will only receive official (ISC)² courseware. This guarantees the content you review is always the most current version and was developed by (ISC)². Additionally, you also receive a number of study tools. These resources include practice tests, flashcards, and a CISSP certification training student handbook. All things considered, our CISSP training program is a great resource for those who are interested in successfully preparing for the CISSP certification exam or simply refreshing their knowledge on various leadership and operational domains in information security.

What’s Included

  • Five days of training with an expert instructor
  • ISC2 approved CISSP Training Student Guide
  • ISC2 approved CISSP Training Practice Exams
  • 1 CISSP Exam voucher
  • 100% Satisfaction Guarantee
  • Exam Pass Guarantee


Related Courses

Customize It:

  • If you are familiar with some aspects of CISSP Certification Training, we can omit or shorten their discussion.
  • We can adjust the emphasis placed on the various topics or build the CISSP Certification Training course around the mix of technologies of interest to you (including technologies other than those included in this outline).
  • If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the CISSP Certification Training course in manner understandable to lay audiences.
CISSP Certification Training – Audience / Target Group:

The CISSP Certification training program, much like the certification itself, is intended for professionals who are involved in designing, developing and managing the overall security posture of an organization; from cybersecurity strategy to hands-on implementation. Some example job functions may include, but are not limited to:

  • Security Consultant
  • Security Analyst
  • Security Professionals
  • Security Manager
  • Security Auditor
  • Security Architect
  • IT Director/Manager
  • Director of Security
  • Network Architect
  • Security Systems Engineer
  • Chief Information Security Officer
  • IT professionals interested in obtaining the CISSP credential


Candidates must have a minimum of five years of work experience in two or more of the eight domains indicated in the CISSP Common Body of Knowledge® (CBK):

  • Security and Risk Management
  • Asset Security
  • Security Engineering
  • Communications and Network Security
  • Identity and Access Management
  • Security Assessment and Testing
  • Security Operations
  • Software Development Security
  • You should have a minimum of five years of experience working in IT Infrastructure and Cybersecurity.
  • Cybersecurity Foundations
  • Security+ Certification Prep Course


Our official CISSP Certification training course reviews the eight CISSP certification domains featured in the (ISC)² Common Body of Knowledge (CBK). Reviewing the CBK will help students successfully prepare for the CISSP exam while also develop their overall competencies in information security.

Additional information on what you can expect to learn while reviewing each domain is found below.

  • Domain 1: Security and Risk Management
  • Domain 2: Asset Security
  • Domain 3: Security Engineering
  • Domain 4: Communications and Network Security
  • Domain 5: Identity and Access Management
  • Domain 6: Security Assessment and Testing
  • Domain 7: Security Operations
  • Domain 8: Software Development Security

Course Outline:

Domain 1: Security and Risk Management

The first domain reviewed in this official CISSP Certification training program covers a broad spectrum of general information security and risk management topics. This domain will begin by reviewing the fundamental security principles of confidentiality, availability, and integrity upon which all information security functions are based. Additionally, this domain will also build upon these concepts in the areas of security governance and compliance.

CISSP Training / Exam Topics

  • Confidentiality, Integrity and Availability (CIA) Concepts
  • Security Governance Principles
  • Compliance Requirements
  • Global Legal and Regulatory Issues
  • Professional Ethics
  • Security Policies, Standards, Procedures and Guidelines
  • Business Continuity Requirements
  • Personnel Security Policies and Procedures
  • Risk Management Concepts
  • Threat Modeling Concepts and Methodologies
  • Risk-Based Management and the Supply Chain
  • Security Awareness, Education, and Training Program

Domain 2: Asset Security

Asset Security is the second domain reviewed in this (ISC)² authorized training seminar for CISSP. In it, students cover the collection, handling, and protection of information throughout its lifecycle.

CISSP Training / Exam Topics

  • Information and Asset Classification
  • Information and Asset Ownership (ex. Data Owners, System Owners)
  • Protect Privacy
  • Asset Retention
  • Data Security Controls
  • Information and Asset Handling Requirements (ex. Markings, Labels, Storage)

Domain 3: Security Engineering

Security Engineering is the third CISSP domain. The information students review focuses on the implementation and management of security engineering processes by using secure design principles.

CISSP Training / Exam Topics

  • Engineering Processes Using Secure Design Principles
  • Fundamental Concepts of Security Models
  • Security Evaluation Models
  • Security Capabilities of Information Systems
  • Vulnerabilities Relating to Security Architectures, Designs, and Solution Elements
  • Web-Based System Vulnerabilities
  • Mobile System Vulnerabilities
  • Embedded Device Vulnerabilities
  • Cryptography
  • Site and Facility Security Principles
  • Physical Security Controls (Design and Implement)

Domain 4: Communications and Network Security

Domain 4 prepares students for the CISSP certification exam by focusing on the network architecture, transmission methods, transport protocols, control devices, and the security measures used to maintain the confidentiality, integrity and availability of information transmitted over both private and public communication networks.

CISSP Training / Exam Topics

  • Secure Network Architecture Designs (ex. IP & Non-IP Protocols, Segmentation)
  • Secure Network Components
  • Secure Communication Channels

Domain 5: Identity and Access Management

The fifth domain students review in our CISSP Certification training is called “Identity and Access Management”. This domain will cover the identification and authorization of users, systems and services.

CISSP Training / Exam Topics

  • Controlling Access to Physical and Logical Assets
  • Identification and Authentication of People, Device, and Services
  • Integrating Identity as a Third-Party Service
  • Authorization Mechanisms
  • Identity and Access Provisioning Lifecycle (ex. Provisioning Review)

Domain 6: Security Assessment and Testing

The Security Assessment and Testing domain focuses on the evaluation of information assets and associated infrastructure using various tools and techniques for the purposes of identifying and mitigating risk due to architectural issues, design flaws, configuration errors, hardware and software vulnerabilities, coding errors, and any other weaknesses that may affect an information systems ability to deliver its intended functionality in a secure manner. Additionally, students will also review the continuous validation of the application of organizational information security plans, policies, processes and procedures.

CISSP Training / Exam Topics

  • Assessment, Test, and Audit Strategies
  • Security Control Testing
  • Collecting Security Process Data
  • Test Outputs and Reports
  • Security Audits

Domain 7: Security Operations

Domain 7, “Security Operations”, covers a broad range of topics involving the application of information security concepts and best practices to the operation of enterprises computing systems. This domain is practical in nature and highlights the tasks and situations that information security professionals are expected to perform or are presented with daily. This domain also reviews the areas where security professionals spend most of their time, making domain 7 the largest in terms of individual topics on the CISSP certification exam.

CISSP Training / Exam Topics

  • Support and Requirements for Investigations
  • Investigation Types
  • Logging and Monitoring Activities
  • Securely Provisioning Resources
  • Foundational Security Operations Concepts
  • Resource Protection
  • Incident Management
  • Detective and Preventative Measures
  • Patch and Vulnerability Management
  • Change Management Processes
  • Recovery Strategies
  • Disaster Recovery Processes and Plans
  • Business Continuity Planning and Exercises
  • Physical Security
  • Personnel Safety and Security Concerns

Domain 8: Software Development Security

The last domain in this official CISSP training seminar is “Software Development Security”. It covers the application of security concepts and best practices to production and development software environments.

CISSP Training / Exam Topics

  • Security in the Software Development Life Cycle (SDLC)
  • Development Environments and Security Controls
  • Software Security Effectiveness
  • Acquired Software Security Impact
  • Secure Coding Guidelines and Standards

Whether you are looking for general information or have a specific question, we want to help!

Request More Information

    Time frame: