Certified Information Systems Security Professional Course Outline

Domain 1: Security and Risk Management

  • Understand, Adhere to, and Promote Professional Ethics
    • Code of Professional Ethics
    • Organisational Code of Ethics
  • Understand and Apply Security Concepts
    • Overview
    • Confidentiality
    • Integrity
    • Availability
    • Authenticity
    • Nonrepudiation
  • Evaluate and Apply Security Governance Principles
    • Security Governance
    • Alignment of Security Function to Business Strategy, Goals, Mission, and Objectives
    • Organisational Processes
    • Organisational Roles and Responsibilities
    • Security Control Frameworks
    • Due Care and Due Diligence
  • Legal and Regulatory Issues that Pertain to Information Security in a Global Context
    • Cybercrimes and Data Breaches
    • Licensing and Intellectual Property Requirements
    • Import/Export Controls
    • Transborder Data Flow
    • Issues Related to Privacy
    • Contractual, Legal, Industry Standards, and Regulatory Requirements
  • Requirements for Investigation Types (i.e., Administrative, Criminal, Civil, Regulatory, Industry Standards) 
    • Understand Requirements for Investigation Types
  • Develop, Document, and Implement Security Policy, Standards, Procedures, and Guidelines 
    • Introduction
    • Security Policies
    • Security Policies and Individuals
    • Acceptable Use Policy
    • Security Standards, Baselines, and Guidelines
  • Identify, Analyse, and Prioritise Business Continuity (BC) Requirements
    • Introduction
    • Business Impact Analysis
    • External Dependencies
  • Contribute to and Enforce Personnel Security Policies and Procedures 
    • Candidate Screening and Hiring
    • Employment Agreements and Policy Driven Requirements
    • Onboarding, Transfers, and Termination Processes
    • Vendor, Consultant, and Contractor Agreements and Controls
  • Understand and Apply Risk Management Concepts 
    • Threat and Vulnerability Identification
    • Risk Analysis, Assessment, and Scope
    • Risk Response and Treatment
    • Applicable Types of Controls
    • Control Assessments
    • Continuous Monitoring and Measurement
    • Reporting
    • Continuous improvement 
    • Risk frameworks
  • Understand and Apply Threat Modeling Concepts and Methodologies
    • Introduction
    • Identifying Threats
    • Determining and Diagramming Potential Attacks
    • Performing Reduction Analysis
    • Prioritisation and Response
  • Apply Supply Chain Risk Management (SCRM) Concepts
    • Risks Associated with the Acquisition of Products and Services from Suppliers and Providers
    • Risk Mitigations
  • Establish and Maintain a Security Awareness, Education, and Training Program
    • Methods and Techniques to Increase Awareness and Training
    • Periodic Content Reviews to Include Emerging Technologies and Trends 
    • Program Effectiveness Evaluation

Domain 2: Asset Security

  • Identify and Classify Information and Assets
    • Data Classification
    • Asset Classification
  • Establish Information and Asset Handling Requirements
    • Establish Information and Asset Handling Requirements
  • Provision Information and Assets Securely
    • Information and Asset Ownership
    • Asset Inventory
    • Asset Management
  • Manage Data Lifecycle (e.g., EOL and EOS)
    • Data Roles
    • Data Collection
    • Data Location
    • Data Maintenance
    • Data Retention
    • Data Remanence
    • Data Destruction
  • Ensure Appropriate Asset Retention 
    • Ensure Appropriate Asset Retention (e.g., EOL and EOS)
  • Determine Data Security Controls and Compliance Requirements
    • Data States
    • Scoping and Tailoring
    • Standards Selection
    • Data Protection Methods

Domain 3: Security Architecture and Engineering

  • Research, Implement and Manage Engineering Processes Using Secure Design Principles
    • Overview of Research, Implement and Manage Engineering Processes
  • Understand the Fundamental Concepts of Security Models
    • Fundamental Concepts of Security Models 
  • Select Controls Based Upon Systems Security Requirements
    • Overview of Select Controls Based Upon Systems Security Requirements
  • Understand Security Capabilities of Information Systems
    • Security Capabilities of Information Systems
  • Assess And Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements
    • Assess and Mitigate Security Vulnerabilities
  • Select and Determine Cryptographic Solutions
    • Cryptographic Lifecycle
    • Cryptographic Methods
    • Public Key Infrastructure
  • Understand Methods of Cryptanalytic Attacks
    • Methods of Cryptanalytic Attacks
  • Apply Security Principles to Site And Facility Design
    • Overview of Apply Security Principles to Site and Facility Design
  • Design Site And Facility Security Controls
    • Design Site and Facility Security Controls
    • Wiring Closets
    • Server Rooms/Data Centres
    • Media Storage Facilities
    • Evidence Storage
    • Restricted and Work Area Security
    • Utilities and HVAC
    • Environmental Issues
    • Fire prevention, detection, and suppression
    • Power
  • Manage the information system lifecycle
    • Stakeholders Needs and Requirements
    • Requirements Analysis
    • Architectural Design
    • Development/Implementation
    • Integration
    • Verification and Validation
    • Transition/Deployment
    • Operations and Maintenance/Sustainment
    • Retirement/Disposal

Domain 4: Communication and Network Security

  • Apply Secure Design Principles in Network Architectures
    • Open System Interconnection (OSI) and Transmission Control Protocol
    • Internet Protocol (IP) Version 4 and 6 (IPv6)
    • Secure Protocols 
    • Implications of Multilayer Protocols
    • Converged Protocols
    • Transport Architecture
    •  Performance Metrics
    • Traffic Flows
    • Physical Segmentation
    • Logical Segmentation
    • Micro-Segmentation
    • Edge Networks
    • Wireless Networks
    • Cellular/Mobile Networks 
    • Content Distribution Networks
    • Software Defined Networks (SDN)
    • Virtual Private Cloud (VPC)
    • Monitoring and Management
  • Secure Network Components
    • Operation of Infrastructure
    • Transmission Media
    • Network Access Control
    • Endpoint Security
  • Implement Secure Communication Channels According to Design 
    • Voice, Video, and Collaboration 
    • Remote Access
    • Data Communications
    • Third-party Connectivity

Domain 5: Identity and Access Management (IAM)

  • Control Physical and Logical Access to Assets
    • Information
    • Systems
    • Devices
    • Facilities
    • Applications
    • Services 
  • Design Identification and Authentication Strategy
    • Groups and Roles
    • Authentication, Authorisation and Accounting (AAA)
    • Session Management
    • Registration, Proofing, and Establishment of Identity
    •  Federated Identity Management (FIM)
    • Credential Management Systems
    • Single sign-on (SSO)
    • Just-In-Time
  • Integrate Identity as a Third-Party Service 
    • On-premises
    • Cloud
    • Hybrid 
  • Implement and Manage Authorisation Mechanisms
    • Role-Based Access Control (RBAC)
    • Rule based access control
    • Mandatory Access Control (MAC)
    • Discretionary Access Control (DAC)
    • Attribute-based Access Control (ABAC)
    •  Risk-based Access Control
    • Access Policy Enforcement
  • Manage the Identity and Access Provisioning Lifecycle 
    • Account Access Review
    • Provisioning and Deprovisioning
    • Role Definition and Transition
    • Privilege Escalation
    • Service Accounts Management
  • Implement Authentication Systems 
    • Overview of Implement Authentication Systems 

Domain 6: Security Assessment and Testing

  • Design and Validate Assessment, Test, and Audit Strategies 
    • Internal
    • External
    • Third-party
    • Location 
  • Conduct Security Control Testing 
    • Vulnerability Assessment
    • Penetration Testing
    • Log Reviews
    • Synthetic Transactions/Benchmarks
    • Code Review and Testing
    • Misuse Case Testing
    • Coverage Analysis
    • Interface Testing
    • Breach Attack Simulations
    • Compliance Checks 
  • Collect Security Process Data 
    • Account Management
    • Management Review and Approval
    • Key Performance and Risk Indicators
    • Backup Verification Data
    • Training and Awareness
    • Disaster Recovery (DR) and Business Continuity (BC)
  • Analyse Test Output and Generate Report 
    • Remediation
    • Exception Handling
    • Ethical Disclosure
  • Conduct or Facilitate Security Audits 
    • Internal
    • External
    • Third-party
    • Location

Domain 7: Security Operations

  • Understand and Comply with Investigations 
    • Evidence Collection and Handling  
    • Reporting and Documenting
    • Investigative Techniques
    • Digital Forensics Tools, Tactics, and Procedures
    • Artifacts (E.G., Data, Computer, Network, Mobile Device) 
  • Conduct Logging and Monitoring Activities 
    • Intrusion Detection and Prevention
    • Security Information and Event Management
    • Continuous Monitoring
    • Egress Monitoring
    • Log Management
    • Threat Intelligence (E.G., Threat Feeds, Threat Hunting)
    • User and Entity Behaviour Analytics (UEBA)
  • Perform Configuration Management
    • Apply Foundational Security Operations Concepts 
    • Applying Security Operations 
    • Need-to-know and Least Privilege 
    • Separation of Duties and Responsibilities 
    • Privileged Account Management 
    • Job Rotation
    • Service-Level Agreements 
  • Apply Resource Protection
    • Media Management
    • Media Protection Techniques
    • Data at Rest/Data in Transit
  • Conduct Incident Management
    • Detection
    • Response
    • Mitigation
    • Reporting
    • Recovery
    • Remediation
    • Lessons learned
  • Operate and Maintain Detective and Preventative Measures 
    • Sandboxing
    • Honeypots/Honeynets 
    • Anti-Malware 
    • Machine Learning and Artificial Intelligence (AI) Based Tools
  • Implement and Support Patch and Vulnerability Management
  • Participate in Change Management Processes
    • Change Management 
  • Implement Recovery Strategies
    • Backup Storage Strategies
    • Recovery Site Strategies
    • Multiple Processing Sites
    • System Resilience, High Availability (HA), Quality of Service (Qos), and Fault Tolerance
  • Implement Disaster Recovery Processes
    • Response
    • Personnel
    • Communications
    • Assessment
    • Restoration
    • Training and Awareness
    • Lessons learned
  • Test Disaster Recovery Plans
  • Participate in Business Continuity (BC) Planning and Exercises 
  • Implement and Manage Physical Security
  • Address Personnel Safety and Security Concerns 
    • Travel
    • Security Training and Awareness 
    • Emergency Management
    • Duress

Domain 8: Software Development Security

  • Understand and Integrate Security in the Software Development Life Cycle (SDLC)
    • Development Methodologies
    • Maturity Models 
    • Operation and Maintenance
    • Change Management
    • Integrated Product Team
  • Identify and Apply Security Controls in Software Development Ecosystems
    • Programming Languages
    • Libraries
    • Tool Sets
    • Integrated Development Environment
    • Runtime
    • Continuous Integration and Continuous Delivery (CI/CD)
    • Software Configuration Management (CM)
    • Code Repositories
    • Application Security Testing
  • Assess the Effectiveness of Software Security
    • Auditing and Logging of Changes
    • Risk Analysis and Mitigation
  • Assess Security Impact of Acquired Software 
    • Commercial-off-the-shelf (COTS)
    • Open Source
    • Third-party
    • Managed Services
    • Cloud Services
  • Define and Apply Secure Coding Guidelines and Standards
    • Security Weaknesses and Vulnerabilities at the Source-code Level 
    • Security of Application Programming Interfaces (API)
    • Secure Coding Practices
    • Software-defined Security
       
Show more blue-arrow

Who Should Attend this CISSP Training Course?

The Certified Information Systems Security Professional (CISSP) Training Course is a globally acknowledged credential that demonstrates a high level of expertise in Information Security. This course can be beneficial for a wide range of professionals, including:

  • Information Security Professionals
  • Security Consultants
  • Security Managers
  • Security Analysts
  • Risk Management Specialists
  • Network Architects
  • Compliance Officers

Prerequisites of the CISSP Training Course

There are no formal prerequisites for this CISSP Training.

CISSP Training Overview

CISSP Training equips delegates with essential knowledge of information security principles to protect organisational assets. It covers risk management, operations, access control, and security governance.

This training strengthens delegates’ ability to manage risks and apply effective incident response practices. It supports organisational resilience by improving readiness for security threats.

This 5-Day course offered by The Knowledge Academy enables delegates to apply information security and incident response principles confidently in real-world situations. Delegates gain practical insight to support robust security operations.

CISSP Training Course Objectives

  • To master key CISSP domains, including security and risk management, asset security, and communication and network security
  • To gain proficiency in security engineering, identity and access management, and security assessment and testing
  • To understand the legal, ethical, and regulatory issues pertaining to information security
  • To learn to develop and manage security policies, standards, procedures, and guidelines
  • To explore cryptography and its applications in securing data
  • To acquire expertise in security architecture and design

After completing this CISSP Training, delegates will be armed with the knowledge and skills required to advance their careers in the Information Security domain. This course is the launchpad for individuals aspiring to become elite professionals in the ever-changing landscape of cybersecurity.

Show more blue-arrow

What’s Included in this CISSP Training Course?

  • World-Class Training Sessions from Experienced Instructors
  • Interactive Learning with 24*7 Support
  • Digital Delegate Pack

You’ll also get access to the MyTKA Training Portal, which will be your go to hub for all your training.
Show more blue-arrow
Show more blue-arrow

Experience live, interactive learning from home with The Knowledge Academy's Online Instructor-led CISSP Training. Engage directly with expert instructors, mirroring the classroom schedule for a comprehensive learning journey. Enjoy the convenience of virtual learning without compromising on the quality of interaction.

classes

Live classes

Join a scheduled class with a live instructor and other delegates.

interactive

Interactive

Engage in activities, and communicate with your trainer and peers.

degree

Global Pool of the Best Trainers

We handpick from a global pool of expert trainers for our Online Instructor-led courses.

expertise

Expertise

With 10+ years of quality, instructor-led training, we equip professionals with lasting skills for success.

global

Scalable Training Delivery

Access CISSP Training in Hungary delivered by one of the largest training providers, with scalable instructor-led classes, accessible worldwide.

Master CISSP Training with a flexible yet structured approach that combines live, expert-led sessions and self-paced study. With weekly one-to-one tutor support and consistently high pass rates, you’ll receive tailored guidance and achieve real results.

trainer

Structured Yet Flexible Learning

Take part in scheduled, instructor-led sessions with real-time feedback, while enjoying the freedom to study independently. Interactive resources and progress tracking tools help you stay motivated and on target.

venue

Engaging & Interactive Training

Join dynamic live sessions featuring discussions, practical activities, and peer collaboration. Learn from CISSP Training industry experts and reinforce your knowledge with self-paced modules—plus, connect with professionals in your field.

classes

Expert-Led Course

Gain valuable insight from experienced trainers during live sessions, and revisit course materials anytime to deepen your understanding. This method offers the ideal balance between expert guidance and independent learning.

money

Global Training Accessibility

Access top-quality training across time zones—anytime, anywhere. Whether at home or on the go, our expert-led sessions and flexible study materials support your goals, and help you on the journey towards the certification.

Learn CISSP Training through The Knowledge Academy’s Online Self-Paced Learning. This flexible and structured format supports your training goals and enables every professional to build skills with confidence.

flexiblelearning

Flexible Learning

Access CISSP Training resources 24/7 to maintain steady progress, complete regular assessments or tasks, and upskill effectively alongside work commitments.

expert-developed

Expert-Developed Content

Our Online Course content is designed by experienced trainers to ensure accuracy, relevance, and practical value.

global-access

Global Training Provider

Access CISSP Training in Hungary from a trusted global training provider delivering consistent learning to professionals worldwide.

cost-effective

Cost-Effective Training

Benefit from the cost-effective CISSP Training that delivers high-quality course content without compromising learning outcomes.

interactive-lms

Interactive LMS

Track performance, download resources, and receive AI-enabled support through The Knowledge Academy’s dedicated Learning Management System.

Experience the most sought-after learning style with The Knowledge Academy's CISSP Training. Available in 490+ locations across 190+ countries, our hand-picked Classroom venues offer an invaluable human touch. Immerse yourself in a comprehensive, interactive experience with our expert-led CISSP Training sessions.

trainer

Highly experienced trainers

Boost your skills with our expert trainers, boasting 10+ years of real-world experience, ensuring an engaging and informative training experience

venue

State of the art training venues

We only use the highest standard of learning facilities to make sure your experience is as comfortable and distraction-free as possible

classes

Small class sizes

Our Classroom courses with limited class sizes foster discussions and provide a personalised, interactive learning environment

money

Great value for money

Achieve certification without breaking the bank. Find a lower price elsewhere? We'll match it to guarantee you the best value

Streamline large-scale training requirements with The Knowledge Academy’s In-house/Onsite CISSP Training at your business premises. Experience expert-led classroom learning from the comfort of your workplace and engage professional development.

tailored

Tailored learning experience

Leverage benefits offered from a certification that fits your unique business or project needs

budget

Maximise your training budget

Cut unnecessary costs and focus your entire budget on what really matters, the training.

building

Team building opportunity

Our CISSP Training offers a unique chance for your team to bond and engage in discussions, enriching the learning experience beyond traditional classroom settings

monitor

Monitor employees progress

The course know-how will help you track and evaluate your employees' progression and performance with relative ease

Package deals for CISSP Training

Our training experts have compiled a range of course packages on a variety of categories in CISSP Training, to boost your career. The packages consist of the best possible qualifications with CISSP Training, and allows you to purchase multiple courses at a discounted rate.

CISSP Training FAQs

What is CISSP?

CISSP stands for Certified Information Systems Security Professional. It’s a globally recognised training in cybersecurity that validates a professional’s ability to design, implement, and manage a best-in-class Cybersecurity Training.

What are the benefits of this CISSP Course?

This CISSP Course builds in-depth knowledge of information security, risk management, and governance across key security domains. It enhances career readiness for senior cyber security roles and strengthens leadership capabilities in enterprise security environments.

What is the scope of this CISSP Course?

The scope of this CISSP Course covers comprehensive information security knowledge across governance, risk management, asset security, network security, and secure software development. It supports roles requiring strategic oversight, security leadership, and enterprise-level cyber security management.

Can a beginner pursue CISSP Courses?

Yes, beginners can pursue CISSP Courses to build a strong foundation in information security concepts. However, the course is best suited for professionals aiming to progress into advanced or senior cyber security roles, as it covers broad, in-depth security domains.

Are CISSP Courses in demand?

Yes, CISSP Courses are in strong demand worldwide, as organisations seek professionals with deep expertise in information security, risk management, and governance. Certified security skills help meet growing cyber threats and support leadership roles in securing enterprise environments.

Who should take this CISSP Training?

This CISSP Training is designed for professionals preparing for the CISSP exam and seeking to strengthen their understanding of advanced information security concepts. It is well suited for experienced IT and cyber security practitioners aiming to validate their knowledge across key security domains.

Why choose The Knowledge Academy in Hungary over others?

The Knowledge Academy stands out as a prestigious training provider known for its extensive course offerings, expert instructors, adaptable learning formats, and industry recognition. It's a dependable option for those seeking this training.

What is the cost/training fees for CISSP Training in Hungary?

The training fees for CISSP Training in Hungary starts from €2795

Which is the best training institute/provider of CISSP Training in Hungary?

The Knowledge Academy is one of the Leading global training provider for CISSP Training.

What are the best CISSP Courses courses in Hungary?

Please see our CISSP Courses courses available in Hungary

Show more blue-arrow

Customers Reviews

Request For Pricing

WHO WILL BE FUNDING THE COURSE?
+44

Corporate Training

Unlock tailored pricing and customised training solutions for your team’s needs.

Request your quote today!

Courses Related to CISSP Training

Why choose The Knowledge Academy

price

Best price in the industry

You won't find better value in the marketplace. If you do find a lower price, we will beat it.

learning

Many delivery methods

Flexible delivery methods are available depending on your learning style.

resources

High quality resources

Resources are included for a comprehensive learning experience.

Our Clients

"Really good course and well organised. Trainer was great with a sense of humour - his experience allowed a free flowing course, structured to help you gain as much information & relevant experience whilst helping prepare you for the exam"

Joshua Davies, Thames Water
santander barclays bmw google thames-water deloitte bupa tesla

CISSP Training in Hungary

cross

Exclusive Deals Big Savings This March!

Grab up to 40% OFF and level up your skills this spring! march-madness

WHO WILL BE FUNDING THE COURSE?

close

close

Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.

close

close

Press esc to close

close close

Back to course information

Thank you for your enquiry!

One of our training experts will be in touch shortly to go overy your training requirements.

close close

Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.