CISSP Certification - Certified Information Systems Security Professional Training

Enroll Now
No Image
⭐ 4.8 Ratings
10,080 Learners

Skills Covered

Security and Risk Management Security Architecture and Engineering Identity and Access Management IAM Security Operations Asset Security Communication and Network Security Security Assessment and Testing Software Development Security

Career Benefits of CISSP Certification - Certified Information Systems Security Professional Training

Advance your cybersecurity career with expert-led training designed to build both strategic and technical skills for managing enterprise-level security programs. Taught by (ISC)⊃2; authorized instructors, the course combines real-world insights with a globally aligned curriculum to prepare you for current and emerging cyber threats. You'll also receive the official CISSP study kit and an exam voucher to support your certification goals.  

Eligibility for CISSP Certification - Certified Information Systems Security Professional Training

To be eligible for CISSP certification, candidates must have at least five years of full-time, cumulative experience across two or more domains outlined in the CISSP exam framework. However, there are ways to reduce this requirement:

  • A bachelor's degree or higher in computer science, IT, or a closely related field can reduce the required experience by one year.
  • Possessing an approved credential from the recognized list can also count as one year of work experience.
  • Part-time roles and internships may be considered, provided proper documentation is submitted.

Prerequisites

  • Full-Time Roles: You must have worked a minimum of 35 hours per week for four consecutive weeks to be credited for one month of experience.
  • Part-Time Experience: Must range between 20–34 hours per week.

Course Content: CISSP Certification - Certified Information Systems Security Professional Training

Domain 01: Security and Risk Management

1.01 Introduction
1.02 Professional Ethics
1.03 (ISC)2 Code of Ethics
1.04 Organization Code of Ethics
1.05 Authenticity Non-Repudiation
1.06 Due Care Due Diligence
1.07 Security Controls
1.08 CIA Triad
1.09 OECD Privacy Principles
1.10 GDPR
1.11 Intellectual Property
1.12 Investigation Types
1.13 Security Policy
1.14 Business Continuity
1.15 Contingency Planning
1.16 Business Impact Analysis
1.17 Risk Management
1.18 Risk Identification
1.19 Risk Assessment
1.20 Risk Response
1.21 Risk Monitor
1.22 Threat Modelling
1.23 Threat Modelling Approaches
1.24 Threat Modelling Process
1.25 Minimum Security Requirements
1.26 Service Level Requirements
1.27 Awareness and Training

2.01 Introduction
2.02 Asset Classification
2.03 Data Lifecycle
2.04 Data Roles
2.05 Data Collection
2.06 Data Location
2.07 Data Maintenance
2.08 Data Remanence
2.09 Scoping and Tailoring