Logo

CISSP Training

Home / Security Training / CISSP Training Course

CISSP is recognised globally as an excellent security accreditation

Who is the course aimed at?

The Certified Information Systems Security Professional (CISSP) Training Course is a globally acknowledged credential that demonstrates a high level of expertise in Information Security.

It’s aimed at people in roles such as:

Information Security

Professionals

Security Consultants

Security Managers

Security Analysts

Risk Management Specialists

Network Architects

Compliance Officers

Course overview

The Certified Information Systems Security Professional (CISSP) Training Course is a critical pillar in cyber security. In an era marked by escalating cyber threats, the need for individuals with comprehensive knowledge of Information Security is paramount. This course equips professionals with the expertise needed to safeguard critical data, mitigate risks and ensure that robust security measures are in place.

Proficiency in CISSP Training is imperative in a world where cyber attacks are relentless. This qualification is indispensable for professionals such as IT Managers, Security Consultants and Network Architects who are entrusted with protecting sensitive data. Mastery of CISSP opens doors to career growth and exemplifies commitment to securing organisations against evolving cyber threats. Individuals aiming to lead and excel in the field of Information Security can benefit from attending this course.

The 5-day Online CISSP Training is designed to provide delegates with a rapid and comprehensive understanding of key CISSP concepts. Through interactive sessions, real-world case studies and expert guidance, delegates will gain valuable insights into security policies, risk management, cryptography and access control systems.

What is the course curriculum?

The course consists of 8 domains covered over a 5 day period.

Privacy by Design

CISSP Training

£3695.00 + VAT

Online or classroom based course. Discounts are available for multiple people.

Thinking of implementing ISO 27001?

We can fast-track your implementation.

Domain 1: Security and Risk Management

Understand and Apply Security Concepts
Evaluate and Apply Security Governance Principles
Legal and Regulatory Issues that Pertain to Information Security in a Global Context
Requirements for Investigation Types
Develop, Document and Implement Security Policy, Standards, Procedures and Guidelines
Identify, Analyse and Prioritise Business Continuity (BC) Requirements
Contribute to and Enforce Personnel Security Policies and Procedures
Understand and Apply Risk Management Concepts
Understand and Apply Threat Modelling Concepts and Methodologies
Apply Supply Chain Risk Management (SCRM) Concepts
Establish and Maintain a Security Awareness, Education and Training Programme

Domain 2: Asset Security

Identify and Classify Information and Assets
Establish Information and Asset Handling Requirements
Provision Resources Securely
Manage Data Lifecycle
Ensure Appropriate Asset Retention
Determine Data Security Controls and Compliance Requirements

Domain 3: Security Architecture and Engineering

Research, Implement and Manage Engineering Processes Using Secure Design Principles
Understand the Fundamental Concepts of Security Models
Select Controls Based Upon Systems Security Requirements
Understand Security Capabilities of Information Systems
Assess and Mitigate the Vulnerabilities of Security Architectures, Designs and Solution Elements
Cryptographic Life Cycle
Understand Methods of Cryptanalytic Attacks
Apply Security Principles to Site and Facility Design
Design Site and Facility Security Controls
Manage the information system life-cycle

Domain 4: Communication and Network Security

Implement Secure Design Principles in Network Architectures
Secure Network Components
Implement Secure Communication Channels According to Design

Domain 5: Identity and Access Management

Control Physical and Logical Access to Assets
Manage Identification and Authentication of People, Devices and Services
Integrate Identity as a Third-Party Service
Implement and Manage Authorisation Mechanisms
Manage the Identity and Access Provisioning Lifecycle
Implement Authentication Systems

Domain 6: Security Assessment and Testing

Design and Validate Assessment, Test and Audit Strategies
Conduct Security Control Testing
Collect Security Process Data
Analyse Test Output and Generate Report
Conduct or Facilitate Security Audits

Domain 7: Security Operations

Understand and Support Investigations
Conduct Logging and Monitoring Activities
Securely Provisioning Resources
Understand and Apply Foundational Security Operations Concepts
Apply Resource Protection Techniques
Conduct Incident Management
Operate and Maintain Detective and Preventative Measures
Implement and Support Patch and Vulnerability Management
Participate in Change Management Processes
Implement Recovery Strategies
Implement Disaster Recovery (DR) Processes
Test Disaster Recovery Plans (DRP)
Participate in Business Continuity (BC) Planning and Exercises
Implement and Manage Physical Security
Address Personnel Safety and Security Concerns

Domain 8: Software Development Security

Integrate Security in the Software Development Life Cycle (SDLC)
Identify and Apply Security Controls in Development Environments
Assess the Effectiveness of Software Security
Assess Security Impact of Acquired Software
Define and Apply Secure Coding Guidelines and Standards

DPO for Tech Startup
Online Training

Additional information

The course is provided by our certified training partners.  

Whats included?

World-Class Training Sessions from Experienced Instructors

CISSP Certificate

Digital Delegate Pack

Current Incentives

We are offering discounts of 10% for a second person of 15% for three people or more

Easy Enrolment

It’s very easy to enrol on one of our online or classroom based training courses.

Simply fill out the contact form and we will be in touch to find out your exact requirements e.g. number of licenses, desired date and preferred location (if classroom based).

Contact Us

CISSP Training Contact Us
First
Last
Data Protection

Thank you for contacting us

We will respond shortly

Note – if you do not receive an email from us please check your spam folder as we normally respond within 2 hours.

Data Privacy Services
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.