close

close

Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.

close

close

Press esc to close

close close

Back to course information

Thank you for your enquiry!

One of our training experts will be in touch shortly to go overy your training requirements.

close close

Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.

Course Information

Certified Information Systems Security Professional Course Outline

Domain 1: Security and Risk Management

  • Understand and Apply Security Concepts
  • Evaluate and Apply Security Governance Principles
  • Determine Compliance and Other Requirements
  • Legal and Regulatory Issues that Pertain to Information Security in a Global Context
  • Requirements for Investigation Types
  • Develop, Document, and Implement Security Policy, Standards, Procedures, and Guidelines
  • Identify, Analyse, and Prioritise Business Continuity (BC) Requirements
  • Contribute to and Enforce Personnel Security Policies and Procedures
  • Understand and Apply Risk Management Concepts
  • Understand and Apply Threat Modelling Concepts and Methodologies
  • Apply Supply Chain Risk Management (SCRM) Concepts
  • Establish and Maintain a Security Awareness, Education, and Training Program

Domain 2: Asset Security

  • Identify and Classify Information and Assets
  • Establish Information and Asset Handling Requirements
  • Provision Resources Securely
  • Manage Data Lifecycle
  • Ensure Appropriate Asset Retention
  • Data Security Controls and Compliance Requirements

Domain 3: Security Architecture and Engineering

  • Research, Implement, and Manage Engineering Processes Using Secure Design Principles
  • Fundamental Concepts of Security Models
  • Select Controls Based Upon Systems Security Requirements
  • Security Capabilities of Information Systems
  • Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements
  • Cryptographic Life Cycle
  • Methods of Cryptanalytic Attacks
  • Apply Security Principles to Site and Facility Design
  • Design Site and Facility Security Controls

Domain 4: Communication and Network Security

  • Implement Secure Design Principles in Network Architectures
  • Secure Network Components
  • Implement Secure Communication Channels According to Design

Domain 5: Identity and Access Management (IAM)

  • Control Physical and Logical Access to Assets
  • Manage Identification and Authentication of People, Devices, and Services
  • Integrate Identity as a Third-Party Service
  • Implement and Manage Authorisation Mechanisms
  • Manage the Identity and Access Provisioning Lifecycle
  • Implement Authentication Systems

Domain 6: Security Assessment and Testing

  • Design and Validate Assessment, Test, and Audit Strategies
  • Conduct Security Control Testing
  • Collect Security Process Data
  • Analyse Test Output and Generate Report
  • Conduct or Facilitate Security Audits

Domain 7: Security Operations

  • Understand and Support Investigations
  • Requirements for Investigation Types
  • Conduct Logging and Monitoring Activities
  • Securely Provisioning Resources
  • Understand and Apply Foundational Security Operations Concepts
  • Apply Resource Protection Techniques
  • Conduct Incident Management
  • Operate and Maintain Detective and Preventative Measures
  • Implement and Support Patch and Vulnerability Management
  • Participate in Change Management Processes
  • Implement Recovery Strategies

Domain 8: Software Development Security

  • Integrate Security in the Software Development Life Cycle (SDLC)
  • Identify and Apply Security Controls in Development Environments
  • Assess the Effectiveness of Software Security
  • Assess Security Impact of Acquired Software
  • Define and Apply Secure Coding Guidelines and Standards

Show moredowndown

 

Prerequisites

There are no formal prerequisites in this Certified Information Systems Security Professional (CISSP) course. However, having prior knowledge of IS Security will be much more beneficial for delegates.

Audience

This Certified Information Systems Security Professional (CISSP) training course is suitable for anyone who wants to gain in-depth knowledge about IS Security. However, this course will be more beneficial for:

  • Chief Information Security Officers
  • Chief Security Officers
  • Senior Security Engineers
  • Security Consultants
  • Security Managers
  • Security Auditors
  • Security Architects
  • Network Architects

Certified Information Systems Security Professional Course Overview

CISSP (Certified Information Systems Security Professional) is an information security certification. It is a vendor-neutral standard to validate the technical skills and knowledge of the IT security professionals for implementing and managing a security program. Information Systems Security (InfoSec) refers to the methodologies and processes associated with saving information private, available, and ensuring its integrity. With great InfoSec, an organisation can reduce their risk of external and internal attacks on information technology systems. Organisations can also guard important data from cyber-attacks, assure business continuity, and give all stakeholders satisfaction by preserving confidential information secure from security threats. This training will help learners add skills to their profile, which will help them climb the ladder of success in terms of value and career opportunities.   

Our 5-day Certified Information Systems Security Professional (CISSP) Training course aims to provide delegates with a comprehensive knowledge of IS Security. During this course, delegates will learn about various essential topics such as managing data lifecycle, cryptographic lifecycle, securing network components, collecting security process data, applying resource protection techniques, and many more. Our highly professional trainer with years of experience in teaching such courses will conduct this training course and will help you get a complete understanding of this course.

This training will also cover the following concepts:

  • Requirements for investigation types
  • Ensure appropriate asset retention
  • Methods of cryptanalytic attacks
  • Integrate identity as a third-party service
  • Analyse test output and generate the report
  • Securely provisioning resources
  • Software development security

At the end of this Certified Information Systems Security Professional (CISSP) Training course, delegates will be able to integrate security in the Software Development Life Cycle (SDLC) effectively. They will also be able to implement secure communication channels properly according to the design.

The Knowledge Academy also provides more such courses, including ISSAP Training & Certification and Chief Information Security Officer Training under CISSP Training that can help you develop essential skills to enhance your career opportunities in this field.

Show moredowndown

What's included in this CISSP Training Course?

This CISSP course will include: 

  • Exam Pass Guarantee
  • Course Completion Certificate
  • Experienced Instructor
  • Refreshments 

 

Show moredowndown

Why choose us

Ways to take this course

Our easy to use Virtual platform allows you to sit the course from home with a live instructor. You will follow the same schedule as the classroom course, and will be able to interact with the trainer and other delegates.

Our fully interactive online training platform is compatible across all devices and can be accessed from anywhere, at any time. All our online courses come with a standard 90 days access that can be extended upon request. Our expert trainers are constantly on hand to help you with any questions which may arise.

This is our most popular style of learning. We run courses in 1200 locations, across 200 countries in one of our hand-picked training venues, providing the all important ‘human touch’ which may be missed in other learning styles.

best_trainers

Highly experienced trainers

All our trainers are highly qualified, have 10+ years of real-world experience and will provide you with an engaging learning experience.

venues

State of the art training venues

We only use the highest standard of learning facilities to make sure your experience is as comfortable and distraction-free as possible

small_classes

Small class sizes

We limit our class sizes to promote better discussion and ensuring everyone has a personalized experience

value_for_money

Great value for money

Get more bang for your buck! If you find your chosen course cheaper elsewhere, we’ll match it!

This is the same great training as our classroom learning but carried out at your own business premises. This is the perfect option for larger scale training requirements and means less time away from the office.

tailored_learning_experience

Tailored learning experience

Our courses can be adapted to meet your individual project or business requirements regardless of scope.

budget

Maximise your training budget

Cut unnecessary costs and focus your entire budget on what really matters, the training.

team_building

Team building opportunity

This gives your team a great opportunity to come together, bond, and discuss, which you may not get in a standard classroom setting.

monitor_progress

Monitor employees progress

Keep track of your employees’ progression and performance in your own workspace.

What our customers are saying

CISSP Certified Information Systems Security Professional FAQs

FAQ's

We offer CISSP training courses in locations all over the UK, as well as abroad. We make it easy to find a training venue near you!
Yes. Once you pass the exam, then you will have up to six years to gain the relevant experience needed to officially become a CISSP.
An CISSP certification is valid for three years in total. It is possible to retake the course and exam, or you can earn and submit 120 Continuing Professional Education credits (CPEs) during the three years.
CPE credits are earned by participating in Continuing Professional Education activities. To maintain certifications, you can earn and submit the minimum number of credits required to maintain your certification. The minimum number of CPE credits required to maintain the validity of a CISSP certification is 120 over three years.
System security plays a very important role in the computer system because it protects users' information. It is also crucial for users' system health because it assists in blocking malware and viruses, which helps users to operate quicker and smoother.
The term "Security Governance" indicates that security needs to be governed and managed throughout the organisation and not only the IT department. It is a group of activities, including defining, directing, and supporting an organisation's security efforts.
Administrative investigations, criminal investigations, civil investigations, electronic discovery, and regulatory investigations are five main types of investigation.
Choosing this Certified Information Systems Security Professional training increase your hiring chances, getting a higher salary, improving IT security skills and enhancing productivity, staying on top of cybersecurity trends, gaining credibility as a security expert, etc.
This Certified Information Systems Security Professional (CISSP) Training course aims to provide you with a comprehensive knowledge of IS Security. You will also learn about various essential topics such as data lifecycle, secure network components, cryptographic life cycle, applying resource protection techniques, collecting security process data, and many more.
The price for CISSP Certified Information Systems Security Professional certification in Australia starts from AUD2695
The Knowledge Academy is the Leading global training provider in the world for CISSP Certified Information Systems Security Professional.
Please see our CISSP Training courses available in Australia

Why choose us

icon

Best price in the industry

You won't find better value in the marketplace. If you do find a lower price, we will beat it.

icon

Many delivery methods

Flexible delivery methods are available depending on your learning style.

icon

High quality resources

Resources are included for a comprehensive learning experience.

barclays Logo
deloitte Logo
Thames Water Logo

"Really good course and well organised. Trainer was great with a sense of humour - his experience allowed a free flowing course, structured to help you gain as much information & relevant experience whilst helping prepare you for the exam"

Joshua Davies, Thames Water

santander logo
bmw Logo
Google Logo
backBack to course information

Security Certification

Save upto 40%
4 courses
Included courses:

ISO 27001 Lead AuditorAUD4495

CISA Certified Information Systems AuditorAUD3595

CISM Certified Information Security ManagerAUD3595

CISSP Certified Information Systems Security ProfessionalAUD3595

Total without package:  AUD15280

Package price:  AUD9195 (Save AUD6085)

Purchase now

Advanced Data Protection Bundle

Save upto 40%
4 courses
Included courses:

ISO 27001 Lead AuditorAUD4495

CISSP Certified Information Systems Security ProfessionalAUD3595

Certified EU General Data Protection Regulation (EU GDPR) Foundation and PractitionerAUD3995

Systems Security Certified Practitioner (SSCP)AUD3995

Total without package:  AUD16080

Package price:  AUD9695 (Save AUD6385)

Purchase now

Complete Enterprise Architect Certification

Save upto 40%
4 courses
Included courses:

ITIL® 4 Foundation Certification Training CourseAUD2695

TOGAF® 9 Training Course: Combined (level 1 & 2)AUD3495

CISSP Certified Information Systems Security ProfessionalAUD3595

Architecting on AWS - Associate CertificationAUD4495

Total without package:  AUD14280

Package price:  AUD8595 (Save AUD5685)

Purchase now

Information Security Bundle

Save upto 40%
3 courses
Included courses:

ISO 27001 Lead AuditorAUD4495

CISM Certified Information Security ManagerAUD3595

CISSP Certified Information Systems Security ProfessionalAUD3595

Total without package:  AUD11685

Package price:  AUD6995 (Save AUD4690)

Purchase now