The Knowledge Academy Logo
The Knowledge Academy Logo
+61 1-800-150644 - Available 24/7
Empty

Send us your message.

X

CISSP Certified Information Systems Security Professional Weekend

Key points about this course


Duration: 4 Days*

Dates & Prices Enquire
  • Become a cybersecurity expert
  • Learn about the eight domains of the (ISC)2  Common Body of Knowledge
  • Complete preparation for the CISSP exam

Available delivery methods for this course

Classroom Icon

Classroom

Onsite Icon

In-house

Virtual Icon

Live Virtual

Course Information

CISSP Weekend Overview

Our Certified Information Systems Security Professional (CISSP) training course aims to supply delegates with a theory-based approach to learning the Information Systems security process and how to apply this process practically to real-life scenarios.

The course is based around teaching the eight fundamental domains of Information Security, which provide delegates with all the information they require to obtain a broad understanding of Information Security and pass the CISSP exam.

The CISSP certification is globally recognised as the best Information Systems Security certification for Security Professionals. Our trainers use a theory-based training strategy, allowing for a clear explanation of CISSP terminology and methodology. Delegates can easily gain a comprehensive knowledge of the Information Security process by attending this course.

The content of this course is largely centred on the eight fundamental domains of Information Security, which encompass everything delegates need to know about the topic. Despite being wholly theory-based, the CISSP certification emphasises the necessity of practically applying what is learned and effectively trains delegates to do this.

Hence, by the end of the course, delegates will have acquired the knowledge and skills required to be able to design, develop, apply, and manage a security program to prevent malicious cyber-attacks. Thus, these individuals become greatly desirable for employers and can greatly improve their employability prospects. Certified Information Systems Security Professionals are crucial additions to the team as they can prevent the occurrence of a number of potentially harmful attacks to a business’s systems.

 

Please Note this is a weekend course and will be delivered over 2 weekends. For more information please give us a call.

*CISSP 2018 Update*

The CISSP exam has been updated for April 2018. Many of the domain names have been changed to better reflect the content contained within. The following modules have been renamed:

Domain 3: Security Engineering

New Name: Domain 3: Security Architecture and Engineering

Domain 4: Communications and Network Security

New Name: Domain 4: Communication and Network Security

Domain 5: Identity and Access Management

New Name: Domain 5: Identity and Access Management (IAM)

Domain 6: Security and Assessment Testing

New Name: Domain 6: Security Assessment and Testing

The weighting of each module will also change. The new weights are as follows:

  • Domain 1: Security and Risk Management – 15%
  • Domain 2: Asset Security – 10%
  • Domain 3: Security Architecture and Engineering – 13%
  • Domain 4: Communication and Network Security – 14%
  • Domain 5: Identity and Access Management (IAM) – 13%
  • Domain 6: Security Assessment and Testing – 12%
  • Domain 7: Security Operations – 13%
  • Domain 8: Software Development Security – 10%

Nothing else, including the number of questions, the time required to complete the exam, or experience requirements, have been altered.


CISSP Weekend Training Outline

The fundamental eight domains of Information Security are taught during this certification, providing delegates with all the information they require to pass the exam.

The following subjects will be taught during the CISSP Certification:

Security and Risk Management:

  • Confidentiality, Integrity, and Availability Concepts
  • Security Governance Principles
  • Compliance
  • Legal and Regulatory Issues
  • Professional Ethics
  • Security Policies, Standards, Procedures, and Guidelines

Asset Security:

  • Information and Asset Classification
  • Ownership
  • Protect Privacy
  • Appropriate Retention
  • Data Security Controls
  • Handling Requirements

Security Architecture and Engineering:

  • Engineering Processes using Secure Design Principles
  • Security Models Fundamental Concepts
  • Security Evaluation Models
  • Security Capabilities of Information Systems
  • Security Architectures, Designs, and Solution Elements Vulnerabilities
  • Web-based Systems Vulnerabilities
  • Mobile Systems Vulnerabilities
  • Embedded Devices and Cyber-Physical Systems Vulnerabilities
  • Cryptography
  • Site and Facility Design Secure Principles
  • Physical Security

Communication and Network Security:

  • Secure Network Architecture Design
  • Secure Network Components
  • Secure Communication Channels
  • Network Attacks

Identity and Access Management (IAM):

  • Physical and Logical Assets Control
  • Identification and Authentication of People and Devices
  • Identity as a Service
  • Third-party Identity Services
  • Access Control Attacks
  • Identity and Access Provisioning Lifecycle

Security Assessment and Testing:

  • Assessment and Test Strategies
  • Security Process Data
  • Security Control Testing
  • Test Outputs
  • Security Architectures Vulnerabilities

Security Operations:

  • Investigations Support and Requirements
  • Logging and Monitoring Activities
  • Provisioning of Resources
  • Foundational Security Operations Concepts
  • Resource Protection Techniques
  • Incident Management
  • Preventative Measures
  • Patch and Vulnerability Management
  • Change Management Processes
  • Recovery Strategies
  • Disaster Recovery Processes and Plans
  • Business Continuity Planning and Exercises
  • Physical Security
  • Personnel Safety Concerns

Software Development Security:

  • Security in the Software Development Lifecycle
  • Development Environment Security Controls
  • Software Security Effectiveness
  • Acquired Software Security Impact

Delegates should purchase the following book which will be used during the course: Official (ISC)Guide to the CISSP CBK, 4th Edition, (ISC2 Press), by Adam Gordon

It might also prove useful to briefly read over some of this guide prior to starting the course to supplement your learning and prepare you for your CISSP training.

Who Should Attend the CISSP Certification?

This CISSP training course is suitable for mid- and senior-level managers who are working towards or have already achieved a position such as:

  • Chief Information Security Officer (CISO)

  • Chief Security Officer (CSO)

  • Senior Security Engineer

  • Security Consultant

  • Security Manager

  • Security Auditor

  • Security Architect

  • Network Architect

Prerequisites

No prior certifications are required, but delegates will thrive if they possess experience or knowledge of IS Security

All of our instructors have many years’ experience in information security.
The CISSP Certified Information Systems Security Professional Weekend course is delivered over two consecutive weekends: Week 1 Friday, Saturday & Sunday and Week 2 Saturday & Sunday
You will be provided with learning materials including exam guidance and presentation slides, a certificate, an experienced instructor and refreshments. We recommend you purchase in advance the Official (ISC)2 Guide to the CISSP CBK, Fourth Edition (ISBN: 978-1482262759).
No, you will need to book the CISSP exam separately here.
Yes, certification requires a minimum of either five years full-time paid work experience, or four years’ experience, plus an information security university degree, in two or more of the following 8 CISSP domains.
The CISSP exam is multiple choice, has 250 questions and lasts 6 hours.
Our exam pass guarantee gives you confidence that we will support your learning until you pass your (ISC)2 CISSP exam. We guarantee that you will pass your (ISC)2 CISSP exam after completing our CISSP course. All we require is for you to take the exam within 30 days of completing the course, attend all course days and complete all course assignments, including your CISSP practice exams. If you do not pass the exam after the 1st attempt, we will allow you to attend the course again free of charge. Should you fail the exam on your 2nd attempt, you will be eligible to enrol in the course again, free of charge. (ISC)2 CISSP examination results must be verified to confirm re-enrolment and is subject to availability.
You can either retake and pass the examinations every 3 years, OR earn 120 Continuing Professional Education (CPE) credits over a 3-year period.
The training hours are 9am to 5pm.
There will be some homework throughout the course. Completing this will ensure you have the best possible chance of passing the exam.
Please arrive at your training venue for 08:45am.
You will receive confirmation details as soon as your place has been booked and confirmed.

CISSP Exam

In order to obtain the CISSP certification, the associated exam must be passed. The exam covers the eight domains of Information Systems Security. Please note that this exam is provided by (ISC)2 and is not included in this training course. It must be booked separately. The exam follows a computerised format and is as follows:

  • Multiple choice

  • 3 hours

  • 100-150 questions

  • Pass mark is 700 out of 1000

  • Computer-based 

If you are ready to take the CISSP exam, you can register on this link: https://www.isc2.org/Register-for-Exam

 

This CISSP course will include: 

  • The Knowledge Academy's Certified Information Systems Security Professional Manual

  • Exam Pass Guarantee

  • Certificate

  • Experienced Instructor

  • Refreshments 

 

The following book is required for this training course: Official (ISC)2 Guide to the CISSP CBK, 4th Edition, (ISC2 Press), by Adam Gordon, however this book is not included with the course fee and will need to be purchased separately. This can be done through The Knowledge Academy.

Dates & Prices

Select your preferred delivery method

Choose a Region

Choose a Location

Choose a Month

Office Icon Attend your course from the office or home
Trainers Icon Interactive support from experienced trainers
Simple Icon Simple to setup and easy to use on any device

Complete the steps below to receive a quote or more information

How will you be funding your training?

Self funding

Company funding

Not sure

Key points about this course


Duration: 4 Days*


Why choose TKA logo


Gold Tag

Best price in the industry

You won't find better value in the marketplace. If you do find a lower price, we will beat it.

Delivery Icon

Various delivery methods

Flexible delivery methods are available depending on your learning style.

Resource Icon

Resources

Resources are included for a comprehensive learning experience.

Thames Water Logo

"Really good course and well organised. Trainer was great with a sense of humour - his experience allowed a free flowing course, structured to help you gain as much information & relevant experience whilst helping prepare you for the exam"

Joshua Davies, Thames Water

Google Logo
Samsung Logo
Shell Logo

"...the trainer for this course was excellent. I would definitely recommend (and already have) this course to others."

Diane Gray, Shell

  Looking for more information?

Trustpilot