The Knowledge Academy Logo
The Knowledge Academy Logo
+60 1800812339 - Available 24/7

Send us your message.


CISSP Certified Information Systems Security Professional (Evening)

Key points about this course

Duration: 5 Days*

Dates & Prices Enquire
  • CISSP Training in luxury nationwide venues
  • Exam Pass Guarantee: Enrol in any of our CISSP courses and we guarantee you will pass

Available delivery methods for this course

Classroom Icon


Onsite Icon


Virtual Icon

Live Virtual

Course Information

CISSP Certified Information Systems Security Professional (Evening) Overview

Please Note: This is an Evening Class
This class starts at 5:30pm and finishes at 10:30pm each day


Our Certified Information Systems Security Professional (CISSP) training course aims to supply delegates with a theory-based approach to learning the Information Systems security process and how to apply this process practically to real-life scenarios. The course is based around teaching the eight fundamental domains of Information Security, which provide delegates with all the information they require to obtain a broad understanding of Information Security and pass the CISSP exam. 

CISSP is globally recognised as the best Information Systems Security certification for Security Professionals. Our trainers use a theory-based training strategy, allowing for a clear explanation of CISSP terminology and methodology. Delegates can easily gain a comprehensive knowledge of the Information Security process by attending this course.
The content of this course is largely centred around the eight fundamental domains of Information Security, which encompass everything delegates need to know about the topic. Despite being wholly theory-based, the CISSP certification emphasises the necessity of practically applying what is learned and effectively trains delegates to do this. Hence, by the end of the course delegates will have acquired the knowledge and skills required to be able to design, develop, apply, and manage a security program to prevent malicious cyber attacks. Thus, these individuals become greatly desirable for employers and can greatly improve their employability prospects. CISSP’s are crucial additions to the team as they can prevent the occurrence of a number of potentially harmful attacks to an business’s systems.

CISSP Update

The CISSP exam is being updated for 2018. Many of the domain names have been changed to better reflect the content contained within. The following modules have been renamed:


Domain 3: Security Engineering

New Name: Domain 3: Security Architecture and Engineering


Domain 4: Communications and Network Security

New Name: Domain 4: Communication and Network Security


Domain 5: Identity and Access Management

New Name: Domain 5: Identity and Access Management (IAM)


Domain 6: Security and Assessment Testing

New Name: Domain 6: Security Assessment and Testing


The weighting of each module will also change. The new weights are as follows:

  • Domain 1: Security and Risk Management – 15%
  • Domain 2: Asset Security – 10%
  • Domain 3: Security Architecture and Engineering – 13%
  • Domain 4: Communication and Network Security – 14%
  • Domain 5: Identity and Access Management (IAM) – 13%
  • Domain 6: Security Assessment and Testing – 12%
  • Domain 7: Security Operations – 13%
  • Domain 8: Software Development Security – 10%

Nothing else, including the number of questions, time required to complete the exam, or experience requirements, have been altered.


CISSP Certified Information Systems Security Professional (Evening) Outline

Evening Classes start at 5:30pm and will last for five hours, delegates will be in class until 10:30pm

The fundamental eight domains of Information Security comprise the content of this CISSP course, supplying delegates with all the information they require to pass the exam. The eight domains are taught one-by-one and are each made up of a range of different relevant subjects:


Security and Risk Management:

  • Confidentiality, Integrity, and Availability Concepts

  • Security Governance Principles

  • Compliance

  • Legal and Regulatory Issues

  • Professional Ethic

  • Security Policies, Standards, Procedures, and Guidelines


Asset Security:

  • Information and Asset Classification

  • Ownership

  • Protect Privacy

  • Appropriate Retention

  • Data Security Controls

  • Handling Requirements


Security Engineering:

  • Engineering Processes using Secure Design Principles

  • Security Models Fundamental Concepts

  • Security Evaluation Models

  • Security Capabilities of Information Systems

  • Security Architectures, Designs, and Solution Elements Vulnerabilities

  • Web-based Systems Vulnerabilities

  • Mobile Systems Vulnerabilities

  • Embedded Devices and Cyber-Physical Systems Vulnerabilities

  • Cryptography

  • Site and Facility Design Secure Principles

  • Physical Security


Communications and Network Security:

  • Secure Network Architecture Design

  • Secure Network Components

  • Secure Communication Channels

  • Network Attacks


Identity and Access Management:

  • Physical and Logical Assets Control

  • Identification and Authentication of People and Devices

  • Identity as a Service

  • Third-party Identity Services

  • Access Control Attacks

  • Identity and Access Provisioning Lifecycle


Security Assessment and Testing:

  • Assessment and Test Strategies

  • Security Process Data

  • Security Control Testing

  • Test Outputs

  • Security Architectures Vulnerabilities


Security Operations:

  • Investigations Support and Requirements

  • Logging and Monitoring Activities

  • Provisioning of Resources

  • Foundational Security Operations Concepts

  • Resource Protection Techniques

  • Incident Management

  • Preventative Measures

  • Patch and Vulnerability Management

  • Change Management Processes

  • Recovery Strategies

  • Disaster Recovery Processes and Plans

  • Business Continuity Planning and Exercises

  • Physical Security

  • Personnel Safety Concerns


Software Development Security:

  • Security in the Software Development Lifecycle

  • Development Environment Security Controls

  • Software Security Effectiveness

  • Acquired Software Security Impact

Who should attend?

This CISSP training course is suitable for mid- and senior-level managers who are working towards, or have already achieved a position such as:

Chief Information Security Officer (CISO)

Chief Security Officer (CSO)

Senior Security Engineer

Security Consultant

Security Manager

Security Auditor

Security Architect

Network Architect



There are no pre-requisites for this course but it is suggested that you have around five years of  previous experience with IS security or 4 years plus an IS University degree.

It is required for delegates to obtain this book during the course -

Official (ISC)2 Guide to the CISSP CBK. 4th Edition. (ISC2 Press). Adam Gordon

It might also prove useful to briefly read over some of this guide prior to starting the course to supplement your learning and prepare you for CISSP training.

This CISSP course also includes some exercises and tasks which will be set as evening work. It is required that delegates complete this work to the best of their ability in order to effectively retain the information they have learned.

We offer CISSP training courses in locations all over the UK, as well as abroad. We make it easy to find a training venue near you!
Yes. Once you pass the CISSP exam, you become an associate of (ISC)2, then you will have up to six years to gain the relevant experience needed to officially become a CISSP.
An (ISC)2 CISSP certification is valid for three years in total. It is possible to retake the course and exam, or you can earn and submit 120 Continuing Professional Education credits (CPEs) during the three years.
CPE credits are earned by participating in Continuing Professional Education activities. To maintain certifications, you can earn and submit the minimum number of credits required to maintain your certification. The minimum number of CPE credits required to maintain the validity of a CISSP certification is 120 over three years.

CISSP Certified Information Systems Security Professional (Evening) Examination

In order to obtain the CISSP certification, the associated exam must be passed. The exam covers the eight domains of Information Systems Security. Please note that this exam is provided by (ISC)2 and is not included in this training course. Thus, this must be booked separately. The exam format is as follows:

  • Multiple choice

  • 6 hours

  • 250 questions

  • 70% required to pass

  • Computer-based 

Dates & Prices

Select your preferred delivery method

Choose a Region

Choose a Location

Choose a Month

Office Icon Attend your course from the office or home
Trainers Icon Interactive support from experienced trainers
Simple Icon Simple to setup and easy to use on any device

Complete the steps below to receive a quote or more information

How will you be funding your training?

Self funding

Company funding

Not sure

Key points about this course

Duration: 5 Days*

Why choose TKA logo

Gold Tag

Best price in the industry

You won't find better value in the marketplace. If you do find a lower price, we will beat it.

Delivery Icon

Various delivery methods

Flexible delivery methods are available depending on your learning style.

Resource Icon


Resources are included for a comprehensive learning experience.

Thames Water Logo

"Really good course and well organised. Trainer was great with a sense of humour - his experience allowed a free flowing course, structured to help you gain as much information & relevant experience whilst helping prepare you for the exam"

Joshua Davies, Thames Water

Google Logo
Samsung Logo
Shell Logo

"...the trainer for this course was excellent. I would definitely recommend (and already have) this course to others."

Diane Gray, Shell

  Looking for more information?


Early Black Friday Sales

Click here to Beat the Black Friday rush!