Aimed at security professionals, this course surveys the entire information security landscape and the technologies involved. The course addresses the eight knowledge domains that comprise the common body of knowledge (CBK) for information systems security professionals and will help delegates prepare for CISSP certification.
The course offers a theory based approach to the security process, with opportunities to discuss the immediate application of concepts and techniques described in the CBK to the real world. It can be considered as providing a good introduction to security management, architecture and engineering.
The course comprises of eight sessions that map directly to the (CBK), each one is theory based with instructor led discussions; there are no hands on labs.
To book the CBT exam requires the candidate to acquire a Pearson VUE testing voucher. Please note, the price of the voucher is not included in the RRP of this course
Question format – Multiple choice and advanced innovative questions
Passing grade – A passing score is 700 out of 1000 points
Q. If I have been studying for the CISSP exam with material that focuses on the current domains, will I be sufficiently prepared to take the new exam without additional study?
A. (ISC)² exams are experience-based that include experience-based questions that cannot be learned by studying alone. If you already have the experience in the domains covered in CISSP and believe that you have sufficiently studied those domains, you should feel confident that you are qualified to take the new exam and pass it. (ISC)² cannot guarantee you will pass the exam.
The CISSP is designed for experienced security professionals who want to expand their knowledge and gain an internationally recognised accreditation. It is is ideal for those working in positions such as:
Security Systems Engineer
Chief Information Security Officer
Director of Security
Whilst anyone can attend the course, please note that the CISSP accreditation is only available to those who meet the (ISC)2 entry requirements. Refer to the EXAMS section below for more information .
"Very thorough course. Expert trainer with great communication skills. Overall very happy."
This 5-day training program is designed to fully prepare you for the CISSP exam. It focuses on the 8 Common Body of Knowledge areas designated by (ISC)2:
Security and Risk Management
Security Assessment and Testing
Communications and Network Security
Identity and Access Management
Security in the Software Development Life Cycle
Delegates should have experience in at least two of the domains in the (CBK), for 5 years or more (4 years if they have achieved relevant industry or degree level certifications) to achieve full certification. Associate status can be achieved without the full 4/5 years experience; full certification will be assigned when the correct amount of experience is obtained.
We recommend delegates have some knowledge of all CBK domains and are encouraged to read one or two of the books on the Reading List at ISC2.org.
We recommend that work completed in the classroom is complemented by extra reading to ensure success in the exam. The amount of extra reading required will depend on the amount of experience the delegate has. The 'mile wide, inch deep' description indicates the challenge to most delegates, not all will have 'hands on' experience spanning all 8 domains of the CBK.
This course covers the 8 domains of the CISSP Common Body of Knowledge as reorganised and updated in early 2015. The order of some topics has been altered to provide a better structure and a more consistent conceptual model. All topics of the new CBK are fully covered and the course provides full prep for the CISSP exam.
Welcome and Administrivia
Review and Revision Techniques
Specialised References and Additional Reading
The “CISSP World-View”
On the Day of the Exam
After the Exam
Blended Learning Follow-up
2. Security and Risk Management
Security Properties of Information and Systems – The CIA Triad
Organizational Structure and Processes
Security Roles and Responsibilities
Governance of Third Parties
Compliance, Legal and Regulatory Requirements
Transborder Data Flows
Computer Ethics and Professional Ethics
Risk Management Concepts
Definitions of Risk
Risk Management Processes (SP800-30, ISO27005)
Information Risk Analysis, Audit Frameworks and Methodologies
Countermeasures and Controls
Control Assessment, Testing and Monitoring
Business Continuity Requirements
Development of Business Continuity and Disaster Recovery Plans
If you need training for 3 or more people, you should ask us about onsite training. Putting aside the obvious location benefit, content can be customised to better meet your business objectives and more can be covered than in a public classroom. It's a cost effective option.
Submit an enquiry from any page on this site, and let us know you are interested in the requirements box, or simply mention it when we contact you.