CISSP Certification Training

Duration: 5-6 days


(ISC)2 requires exam candidates to have a minimum of five years of relevant work experience in two or more of the ten domains, four years of work experience with an applicable college degree, or a credential from the (ISC)2-approved list.

The CISSP certification requires successfully passing the CISSP exam (administered by (ISC)2) and having met the experience requirements. After class, we recommend self-study to sharpen your weak areas before taking the exam.

Interested in group training toward 8570.1 compliancy? This course can be a component of our 8570.1 Training Solution that can also include assessments, certification preparation and program management, post training and testing, 8570 compliancy tracking and reporting, and continuing education.

CISSP Certification Training

Related Courses

After completing this course, attendees will be able to:

  • Security Operations
  • Access Control
  • Cryptography
  • Security Architecture and Design
  • Telecommunications and Network Security
  • Disaster Recovery and Business Continuity Planning
  • Legal, Regulations, Compliance, and Investigations
  • Software Development Security
  • Information Security Governance and Risk Management
  • Physical (Environmental) Security


  • Course Overview
  • CISSP Candidate Requirements
  • CISSP Exam Review

Security Operations

  • Operation Security Principles, Techniques, and Mechanisms
  • Principles and Practices of Good Security
  • Resource Protection Mechanisms and Techniques
  • Attacks and Prevention Methods

Access Control

  • Authentication
  • Authorization
  • Accountability
  • Threats to Access Control


  • History of Cryptography
  • Symmetric Encryption
  • Asymmetric Encryption
  • Hashing and Digital Signatures
  • Public Key Infrastructure
  • Cryptographic Attacks

Security Architecture and Design

  • Computer Architecture
  • Rings of Protection
  • Security Models
  • System Evaluation

Telecommunications and Network Security

  • The OSI Model
  • The TCP/IP Model
  • WAN Protocols
  • Routing
  • Wireless Systems
  • Fault Tolerance

Disaster Recovery and Business Continuity Planning

  • Disaster Recovery Planning
  • Business Impact Analysis
  • Business Continuity Planning
  • Backup and Off-Site Facilities
  • Testing Contingency Plans

Legal, Regulations, Compliance, and Investigations

  • Laws and Ethics
  • Computer Crime
  • Incident Response and Forensics

Software Development Security

  • Database Security
  • System Development
  • Software Development Methods

Threats and Vulnerabilities

Information Security Governance and Risk Management

  • Security Management
  • Risk Analysis
  • Classification Controls

Physical (Environmental) Security

  • Threats to Physical Security
  • Administrative Controls
  • Environmental and Safety Controls
  • Physical and Technical Controls

Test Review and Preparation

  • Test Review
  • Test Registration
  • Test Preparation
  • Certification Maintenance

Your Name*



Your Email*



Number of Participants *

Time Frame*


Your Message*