Key points about this course
Duration: 5 Days
Exams: NoDates & Prices Enquire
Send us your message.X
We have your course. Please kindly fill below your contact details to receive full course information and pricing.
At The Knowledge Academy, our classroom-based training courses allow delegates to study and learn in a friendly, engaging,
and interactive environment. We ensure the very best level of teaching, with first-rate instructors, resources,
and state-of-the-art facilities. We provide courses of varying durations and can arrange weekend and residential
courses in order to suit your requirements.
Furthermore, our classroom courses are carried out in thousands of locations worldwide, making training easily accessible wherever you are. Our courses typically begin at 9.00 am and continue until 5.00 pm each day, with breaks and refreshments provided. , As our most popular form of training available, we pride ourselves in continuously delivering an outstanding learning experience for our delegates in the classroom.
Our online-based training courses aim to provide you with a complete training experience. Due to their
flexibility, these courses are greatly suited to busy working professionals, or any individual who would prefer the
convenience of an online training course.
Our Computer-Based Training (CBT) courses remove the time and cost associated with travelling to course locations. You can complete your chosen course in any location, and work at your own pace, as the learning portal can be accessed 24/7. All of our online training courses have technical and administrative support and mobile access. Furthermore, each course has been carefully designed to incorporate informative, instructive, and engaging content. In this way, online learning can guarantee a valuable and enjoyable training solution.
Our In-house training option allows you to select any of our courses and receive training at a venue of your choice,
by any method of your choice.
In-house courses deliver training to multiple employees at once, thus reducing travel expenses and providing you with the ultimate convenience and value for money. In addition, this option allows you to receive a training course that has been specifically tailored to meet your business needs, ensuring first-class quality, applicability, and value.
By choosing to bring bespoke training to the office, you can improve business performance, and make your organisation more streamlined, resourceful, and profitable. With over 25 years’ of experience, we are the market-leaders of In-house training.
Our Virtual training courses provide you with the option to learn using a specialised simulated virtual environment.
In this environment, our expert training instructors will be able to convey information and provide you with the
all the knowledge you require to earn your qualification with The Knowledge Academy. As the largest global
training provider, this method of training allows us to extend our training scope to those who may not
be able to attend a classroom course itself, but would like to receive direct training and support from an instructor.
Using this training delivery method, you would benefit from the convenience of remote access and the elimination of the time and cost associated with travelling to a training venue.
Available delivery methods for this course
Please Note: This is an Evening Class
This class starts at 5:30pm and finishes at 10:30pm each day
Our Certified Information Systems Security Professional (CISSP) training course aims to supply delegates with a theory-based approach to learning the Information Systems security process and how to apply this process practically to real-life scenarios. The course is based around teaching the eight fundamental domains of Information Security, which provide delegates with all the information they require to obtain a broad understanding of Information Security and pass the CISSP exam.
CISSP is globally recognised as the best Information Systems Security certification for Security Professionals. Our trainers use a theory-based training strategy, allowing for a clear explanation of CISSP terminology and methodology. Delegates can easily gain a comprehensive knowledge of the Information Security process by attending this course.
The content of this course is largely centred around the eight fundamental domains of Information Security, which encompass everything delegates need to know about the topic. Despite being wholly theory-based, the CISSP certification emphasises the necessity of practically applying what is learned and effectively trains delegates to do this. Hence, by the end of the course delegates will have acquired the knowledge and skills required to be able to design, develop, apply, and manage a security program to prevent malicious cyber attacks. Thus, these individuals become greatly desirable for employers and can greatly improve their employability prospects. CISSP’s are crucial additions to the team as they can prevent the occurrence of a number of potentially harmful attacks to an business’s systems.
The CISSP exam is being updated for 2018. Many of the domain names have been changed to better reflect the content contained within. The following modules have been renamed:
Domain 3: Security Engineering
New Name: Domain 3: Security Architecture and Engineering
Domain 4: Communications and Network Security
New Name: Domain 4: Communication and Network Security
Domain 5: Identity and Access Management
New Name: Domain 5: Identity and Access Management (IAM)
Domain 6: Security and Assessment Testing
New Name: Domain 6: Security Assessment and Testing
The weighting of each module will also change. The new weights are as follows:
Nothing else, including the number of questions, time required to complete the exam, or experience requirements, have been altered.
Evening Classes start at 5:30pm and will last for five hours, delegates will be in class until 10:30pm
The fundamental eight domains of Information Security comprise the content of this CISSP course, supplying delegates with all the information they require to pass the exam. The eight domains are taught one-by-one and are each made up of a range of different relevant subjects:
Security and Risk Management:
Confidentiality, Integrity, and Availability Concepts
Security Governance Principles
Legal and Regulatory Issues
Security Policies, Standards, Procedures, and Guidelines
Information and Asset Classification
Data Security Controls
Engineering Processes using Secure Design Principles
Security Models Fundamental Concepts
Security Evaluation Models
Security Capabilities of Information Systems
Security Architectures, Designs, and Solution Elements Vulnerabilities
Web-based Systems Vulnerabilities
Mobile Systems Vulnerabilities
Embedded Devices and Cyber-Physical Systems Vulnerabilities
Site and Facility Design Secure Principles
Communications and Network Security:
Secure Network Architecture Design
Secure Network Components
Secure Communication Channels
Identity and Access Management:
Physical and Logical Assets Control
Identification and Authentication of People and Devices
Identity as a Service
Third-party Identity Services
Access Control Attacks
Identity and Access Provisioning Lifecycle
Security Assessment and Testing:
Assessment and Test Strategies
Security Process Data
Security Control Testing
Security Architectures Vulnerabilities
Investigations Support and Requirements
Logging and Monitoring Activities
Provisioning of Resources
Foundational Security Operations Concepts
Resource Protection Techniques
Patch and Vulnerability Management
Change Management Processes
Disaster Recovery Processes and Plans
Business Continuity Planning and Exercises
Personnel Safety Concerns
Software Development Security:
Security in the Software Development Lifecycle
Development Environment Security Controls
Software Security Effectiveness
Acquired Software Security Impact
This CISSP training course is suitable for mid- and senior-level managers who are working towards, or have already achieved a position such as:
● Chief Information Security Officer (CISO)
● Chief Security Officer (CSO)
● Senior Security Engineer
● Security Consultant
● Security Manager
● Security Auditor
● Security Architect
● Network Architect
There are no pre-requisites for this course but it is suggested that you have around five years of previous experience with IS security or 4 years plus an IS University degree.
It is required for delegates to obtain this book during the course -
● Official (ISC)2 Guide to the CISSP CBK. 4th Edition. (ISC2 Press). Adam Gordon
It might also prove useful to briefly read over some of this guide prior to starting the course to supplement your learning and prepare you for CISSP training.
This CISSP course also includes some exercises and tasks which will be set as evening work. It is required that delegates complete this work to the best of their ability in order to effectively retain the information they have learned.
In order to obtain the CISSP certification, the associated exam must be passed. The exam covers the eight domains of Information Systems Security. Please note that this exam is provided by (ISC)2 and is not included in this training course. Thus, this must be booked separately. The exam format is as follows:
70% required to pass
Select your preferred delivery method
Choose a Region
Choose a Location
Choose a Month
Best price in the industry
You won't find better value in the marketplace. If you do find a lower price, we will beat it.
Various delivery methods
Flexible delivery methods are available depending on your learning style.
Resources are included for a comprehensive learning experience.
"Really good course and well organised. Trainer was great with a sense of humour - his experience allowed a free flowing course, structured to help you gain as much information & relevant experience whilst helping prepare you for the exam"
Joshua Davies, Thames Water
"...the trainer for this course was excellent. I would definitely recommend (and already have) this course to others."
Diane Gray, Shell