Course Outline
Security and Risk Management
- Foundations of confidentiality, integrity, and availability (CIA)
- Security governance, policies, and frameworks (ISO 27001, NIST CSF)
- Risk analysis, assessment, and mitigation
- Business impact analysis, security awareness, and training
- Legal, regulations, compliance, and privacy issues (GDPR, HIPAA, local laws)
Asset Security
- Information classification, ownership, and protection
- Data handling (retention, deletion, backup, transfer)
- Privacy protection and data lifecycle management
- Secure use of assets and media control
Security Engineering
- Secure system and architecture design principles
- Cryptography: symmetric, asymmetric, hashing, PKI, key management
- Physical security considerations and hardware security modules (HSMs)
- Secure virtualization, cloud-native security patterns, and secure API usage
Communications and Network Security
- Network models, protocols, and secure communications (TLS, VPN, IPSec)
- Perimeter defenses, segmentation, firewalls, IDS/IPS
- Wireless security, remote access, and zero-trust network architectures
- Secure design of network architectures in cloud and hybrid environments
Identity and Access Management (IAM)
- Control access: identification, authentication, authorization, and accountability
- Identity providers, federation, SSO, and access federation in cloud
- Privileged access management (PAM) and role-based access control (RBAC)
- Lifecycle of identities: provisioning, deprovisioning, and entitlement review
Security Assessment and Testing
- Security control testing: SAST, DAST, penetration testing, vulnerability scanning
- Audit strategies and review frameworks
- Log management, monitoring, and continuous assessment
- Red teaming, blue teaming, and adversary simulation techniques
Security Operations
- Incident response planning, handling, and forensics
- Security operations center (SOC) design, monitoring, and threat intelligence integration
- Patching, vulnerability management, and configuration management
- Business continuity, disaster recovery, and resilience planning
Software Development Security
- Secure software lifecycle (SDLC) and devsecops practices
- Common vulnerabilities (beyond OWASP Top 10) and mitigation patterns
- Code review, static/dynamic analysis, and secure frameworks
- Supply chain risks, dependency management, and runtime protection
Exam Strategy, Practice and Wrap-Up
- CISSP exam format, question strategy, and time management
- Practice exams and domain-specific quizzes
- Gap analysis and personal study plans
- Recommended resources, communities, and continuous learning paths
Summary and Next Steps
Requirements
- At least 5 years of cumulative, paid work experience in two or more of the (ISC)² CISSP domains or equivalent experience
- Foundational knowledge of information security concepts, networks, and software systems
- Familiarity with risk management, cryptography, and IT operations
Audience
- Information security professionals preparing for the CISSP exam
- Security architects, managers, and consultants
- IT leaders, auditors, and governance professionals
Delivery Options
Private Group Training
Our identity is rooted in delivering exactly what our clients need.
- Pre-course call with your trainer
- Customisation of the learning experience to achieve your goals -
- Bespoke outlines
- Practical hands-on exercises containing data / scenarios recognisable to the learners
- Training scheduled on a date of your choice
- Delivered online, onsite/classroom or hybrid by experts sharing real world experience
Private Group Prices RRP from €11400 online delivery, based on a group of 2 delegates, €3600 per additional delegate (excludes any certification / exam costs). We recommend a maximum group size of 12 for most learning events.
Contact us for an exact quote and to hear our latest promotions
Public Training
Please see our public courses
Testimonials (7)
Being approachable and pushing us into interaction
Daniel - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CISSP - Certified Information Systems Security Professional
the topic was interesting itself and we had opportunity to discuss it with different perspectives.
Marcin - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CISSP - Certified Information Systems Security Professional
trainer competence
Evghenii - Arctic Stream
Course - CISSP - Certified Information Systems Security Professional
Good material organization and understandable instructor's English.
Ion Temciuc - Arctic Stream
Course - CISSP - Certified Information Systems Security Professional
Good material organization and understandable instructor's English.
Hanny - Arctic Stream
Course - CISSP - Certified Information Systems Security Professional
His knowledge, the way he explains and his kindness
Marcelo Martinez - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CISSP - Certified Information Systems Security Professional
I liked mix of theory and practical case example. Very good overview of each topic then going through slides.