We Provide Real World Training In

CISSP Certification Training


CISSP Course Banner


What is this course about?


The Certified Information Systems Security Professional program governed by the International Information Systems Security Certification Consortium (ISC2) is globally recognized as a standardized body of knowledge for confirming professionals’ knowledge in the field of information security.


Our training in Certified Information Systems Security Professional (CISSP) is an ideal course package for every aspiring professional who wants to build their career in information security sector.


The CISSP professional will be able to define the architecture, design, and management which are important factors to assure security of an organization. They will also be able to create and operate duties related to information security programs.


The main aim of this course is to provide knowledge on information security and governance, risk management, software development security and related concepts which will enable a professional to cope up with the growing demand of protecting an organization’s information and assets.


Calendar v2

When does this course start?

Classes are available during the weekday and weekend at differing times. Please contact us for your preferred dates and we will notify you of the availability. Courses are repeated each month, so it’s very likely we will have a preferred start date for you.

What's covered in this course

What’s covered in this course?


1. Introduction

  • About (ISC)2
  • CISSP domains
  • Why CISSP?
  • How to certify?
  • About CISSP exam


2. Information Security Governance & Risk Management

  • Aligning security to support organizational goals, mission and objectives
  • Information security management
  • The BIG three – CIA
  • Information classification
  • Policy implementation
  • Information risk management
  • Risk analysis
  • Managing personnel security
  • Security awareness training


3. Access Control

  • Definitions
  • Access control terminologies
  • Types of access control
  • Access control models
  • Access control techniques
  • Access control administration
  • Accountability
  • Access control practices
  • Access control monitoring
  • Threats to access control


4. Security Architecture and Design

  • Architecture framework
  • Security models
  • Evaluation criteria
  • Enterprise criteria
  • Enterprise security architecture
  • System security architecture
  • Security threats and countermeasures


5. Telecom and Network Security

  • Secure network architecture and design
  • Securing network components
  • Secure communication channels
  • Attacks on network


6. Physical (Environment) Security

  • Need for physical and environmental security
  • Site and facility design criteria
  • Perimeter security
  • Access control
  • Building and inside security
  • Secure operational areas
  • Environmental controls


7. Software Development Security

  • System environments
  • System life cycle and systems development
  • Object-orientated programming
  • Software security assurance
  • Database and data warehousing environments
  • Malwares
  • Knowledge management
  • Web application environment
  • The 10 best practices


8. Business Continuity and Disaster Recovery Planning

  • Basic concepts
  • BCP/DRP Phases
    • Project scope and initiation
    • Business impact analysis
    • Preventive Controls Identification
    • Recovery strategy
    • Plan design and development
    • Implementation, testing and training
    • Plan maintenance
  • BCP/DRP frameworks
  • Best practices


9. Legal Regulations, Investigations and Compliance

  • Computer crimes
  • Major legal systems
  • Intellectual property law
  • Privacy
  • Incident response
  • Investigations
  • Compliance
  • (ISC)2 Code of Ethics


10. Cryptography

  • Cryptography concepts
  • Symmetric cryptography
  • Asymmetric cryptography
  • Public key infrastructure
  • Hash function
  • Key management
  • Internet security
  • Attacks on cryptography


11. Operations Security

  • Operations security concepts
  • Maintaining operational resilience
  • Maintaining resilient systems
  • Protecting valuable assets
  • Controlling system accounts
  • Managing security services effectively
  • Key operational processes and procedures


Prerequisites Icon (v2)

What are the prerequisites for the certification?


To attain the CISSP certification, a candidate must have five years of security work experience in two or more domains of (ISC)2 or four years of security work experience in two or more domains along with a college degree.


Teaching icon

How is this course taught?

This is a live online classroom based course. Just like a physical classroom environment, a live teacher presents the course. S/he uses diagrams, draws on a virtual board which you can see, presents material, and engages the class. You can ask questions and get an instant response. These are not pre-recorded lessons. You can interact with the teacher and other students. You will be able to see your teacher as they will have a webcam on them. Watch the video below to get an idea of how it works.

Laptop Icon v2

What do I need?


You will need access to a PC and an internet connection with a speed of at least 2MB per second. If you have broadband, then this should be more than enough. You will also need a webcam, set of speakers and a microphone to see, hear and speak with your tutor. If you have a laptop, all of these should be built in.  If you are unsure about anything, please feel free to ask us.

Purchase Course