Overview
The Certified Information Systems Security Professional (CISSP) certification is a globally recognised credential that signifies expertise in designing, implementing, and managing a best-in-class cybersecurity program. With a CISSP, you demonstrate your ability to effectively design, manage, and oversee an organisation’s overall security posture, from governance and architecture to controls, operations, and compliance.
This comprehensive certification covers eight core domains of information security:
- Security and Risk Management: Essential security concepts, risk management techniques, and compliance issues.
- Asset Security: Protecting security of assets, information, and resources.
- Security Architecture and Engineering: Concepts, principles, structures, and standards used to design secure systems.
- Communication and Network Security: Designing and protecting network security.
- Identity and Access Management (IAM): Controlling access to protect information assets and systems.
- Security Assessment and Testing: Designing, performing, and analysing security testing.
- Security Operations: Foundational concepts, investigations, incident management, and disaster recovery.
- Software Development Security: Understanding, applying, and enforcing software security.
Professionals who earn their CISSP certification join an elite group of security leaders empowered to:
- Develop and manage organisational security practices.
- Understand and apply international security standards.
- Guide and direct policies and procedures with a deep knowledge of threats, laws, and regulations.
- Utilise a holistic approach to security that encompasses both operational and strategic applications.
Whether you are an IT manager, analyst, system engineer, or security consultant, a CISSP certification is your passport to achieving higher credibility, better opportunities, and increased job security in the field of information security."
Who Should Attend?
Chief Information Security Officer | Chief Information Officer | Director of Security | IT Director/Manager | Security Systems Engineer | Security Analyst | Security Manager | Security Auditor | Security Architect | Security Consultant | Network Architect
Learning Outcomes
By the end of this course, you will be able to:
Master foundational principles of information security, including confidentiality, integrity, and availability, and gain expertise in risk identification and mitigation strategies.
Learn to identify and classify information and assets, apply appropriate controls, and ensure compliance with legal and organisational requirements.
Develop skills in designing secure network architectures and implementing robust security mechanisms to prevent, detect, and mitigate attacks.
Acquire the ability to design and protect network security and manage secure communication channels across organisations.
Implement comprehensive strategies for identity management and access control, understanding authentication, authorisation, and session management.
Conduct security control testing, participate in risk assessments and audits, and master techniques for assessing and improving security measures within the organisation.
In-house Training
ISC2 CISSP Certified Information Systems Security Professional Course
Session details
- Equip yourself with essential exam skills
- Hands-on training customised to meet your business needs
- Award winning trainers
Some familiarity with topic is recommended
Key Sessions
- Understand confidentiality, integrity, and availability concepts.
- Apply security governance principles and establish a compliance framework.
- Develop and implement documented security policies, standards, procedures, and guidelines.
- Understand legal and regulatory issues that pertain to information security in a global context.
- Manage data classification and data lifecycle processes to enhance confidentiality and value.
- Identify and classify information and assets to apply appropriate controls.
- Establish information and asset handling requirements to maintain information security.
- Ensure appropriate retention of information and disposal processes.
- Determine data security controls and compliance requirements.
- Protect privacy, ensuring proper storage and handling of sensitive information.
- Analyse and implement security designs in hardware, software, and network architecture.
- Assess and mitigate vulnerabilities in web-based systems, mobile systems, and other digital systems.
- Apply cryptography to protect data in transit, at rest, and in use.
- Understand principles of secure engineering and secure application design.
- Evaluate and apply security models to maintain system integrity.
- Design and protect network architecture including IP networking, LANs, WANs, and remote access technology.
- Secure network components and implement secure communication channels.
- Manage secure network management and operational controls.
- Understand network attacks and apply defensive strategies.
- Implement secure network architecture concepts and systems design.
- Control physical and logical access to assets.
- Manage identification and authentication of people, devices, and services.
- Integrate identity as a third-party service (IDaaS, Federated Identity).
- Implement and manage authorisation mechanisms.
- Manage the identity and access provisioning lifecycle.
- Design and validate assessment, test, and audit strategies to ensure proper security controls.
- Conduct security control testing and review of configuration and patch management processes.
- Perform vulnerability assessments and penetration testing.
- Use logging and monitoring activities to provide security analysis.
- Ensure the effectiveness of security controls through regular assessment and testing.
- Understand and support investigations according to incident response protocols.
- Manage physical security, personnel security, and the safe design of facilities.
- Apply resource protection techniques and manage incident response.
- Operate and configure technologies to detect and prevent attacks.
- Understand disaster recovery processes and develop disaster recovery plans.
- Understand and integrate security in the Software Development Lifecycle (SDLC).
- Manage security risks in software development and enforce software security controls.
- Secure software applications by applying security best practices.
- Assess the security impact of acquired software and manage the security aspects of the end-user environment.
- Enforce compliance with secure coding standards and effectively manage software vulnerabilities.
Meet Your Facilitator
ISC2 Expert Speakers
More details coming soon
Get in touch today to find out more about this course.
Customised in-house options available for teams
Interested in any of our online trainings?
You can also choose to have them delivered in house. We will work closely with our inspiring session facilitators to tailor the content around the key development areas your team are prioritising, shape the learning outcomes around your core departmental challenges and make the most of your L&D and upskilling budget.
Can't see what you need?
Download our training catalogue to review all available topics