CISSP ® Certified Information Systems Security Professional cybersecurity (exam included) PREMIUM Live class + eLearning

Total time

CISSP ® Certified Information Systems Security Professional cybersecurity (exam included) PREMIUM Live class + eLearning

Adding Value Consulting EN
Logo Adding Value Consulting EN
Provider rating: starstarstarstarstar 9.9 Adding Value Consulting EN has an average rating of 9.9 (out of 24 reviews)

Ready to work on your personal development? Book now!

Starting dates and places
There are no known starting dates for this product.

Description

CISSP® Certified Information Systems Security Professional (Exam Included)

Delivery method

Blended - Online self-study and live virtual classroom (10 or 20 sessions)

10 times online classroom sessions, 4 hours each, or

20 times shorter online classroom sessions, 2 hours each.

Perfect to combine with your work!

  • Gain expertise in cybersecurity principles, security concepts, and risk management methods to excel in organizational security.
  • Enhance your preparation with cheat sheets, mind maps, and access to official (ISC)² CISSP course materials.

If you want to take your career to the next level in security, Certified Information Systems Security Professional (CISSP) is a powerful op…

Read the complete description

Frequently asked questions

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.

Didn't find what you were looking for? See also: Business Information Systems, Security, CISSP, CompTIA A+ / Network+ / Security+, and Internet Security.

CISSP® Certified Information Systems Security Professional (Exam Included)

Delivery method

Blended - Online self-study and live virtual classroom (10 or 20 sessions)

10 times online classroom sessions, 4 hours each, or

20 times shorter online classroom sessions, 2 hours each.

Perfect to combine with your work!

  • Gain expertise in cybersecurity principles, security concepts, and risk management methods to excel in organizational security.
  • Enhance your preparation with cheat sheets, mind maps, and access to official (ISC)² CISSP course materials.

If you want to take your career to the next level in security, Certified Information Systems Security Professional (CISSP) is a powerful option. Learn from our expert with real-world experience on this course covering all aspects of the certification. Participants will also receive a copy of the CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide.

Program Features

  • Course and materials are in English
  • Intermediate-Advanced level for professionals
  • 9 hours of total video content from online self-study
  • 40 hours of instructor-led training (weekdays/weekends. Ask us first for a detailed lesson schedule!)
  • 1 year access to the eLearning platform & class recordings
  • 70-100 hours minimum recommended study time
  • 5 simulation tests 
  • Provides the required 30 CPEs for taking the CISSP exam
  • Up-to-date CISSP curriculum with interactive exercises
  • CISSP exam voucher included

The course goes in-depth into the eight domains of the CISSP certification:

  1. Security and Risk Management
  2. Asset Security
  3. Security Engineering and Cryptography
  4. Communication and Network Security
  5. Identity and Access Management
  6. Security Assessment and Testing
  7. Security Operations
  8. Security in the Software Development Lifecycle

Facts about CISSP

Certified Information Systems Security Professional (CISSP) is an independent information security certification overseen by the International Information Systems Security Certification Consortium (known as ISC).

Target group and prerequisites

The course is aimed at IT consultants, managers, security policy writers, information security officers, network administrators, device security administrators, security engineers and other security professionals whose positions require CISSP certification.

You need to have at least five years of full-time experience in two or more of the 8 domains of the (ISC)² CISSP CBK:

  • Security and Risk Management
  • Asset Protection
  • Technology and Management of Security
  • Communication and Network Security
  • Identity and Access Management
  • Security assessment and testing
  • Security Operations (Basic concepts, investigations, incident response and disaster recovery)
  • Software development security

Key Learning Outcomes:

By the end of this online CISSP training, you will:

  • Be able to define the architecture, design, and management of the security of your organization
  • Acquire the relevant knowledge and skills required to pass the CISSP certification exam
  • Perform risk analysis and prevent data loss
  • Learn about security architecture, engineering, models, and cryptography
  • Gain familiarity with communications and network security, identity and access management, and security testing and operations

Course Curriculum:

Lesson 01 - Course Introduction

  • Course Introduction

Lesson 02 - Security and Risk Management

  • Security and Risk Management
  • Information Security Management
  • Security Controls
  • Information Security Management and Governance
  • Goals, Mission, and Objectives
  • Due Care
  • Security Policy
  • Compliance
  • Computer Crimes
  • Legal Systems
  • Intellectual Property (IP) Law
  • Privacy
  • General Data Protection Regulation
  • Security
  • Risk Analysis
  • Types of Risk Analysis
  • Security Control Assessment
  • Threat Modeling
  • Supply-Chain Risk Management
  • Third-Party Management
  • Business Continuity Planning
  • Business Continuity Planning Phases
  • Managing Personnel Security
  • Security Awareness Training
  • Program Effectiveness Evaluation
  • Key Takeaways
  • Knowledge Check

Lesson 03 - Asset Security

  • Asset Security
  • Information Classification
  • Data Classification
  • Data Life Cycle
  • Data Management
  • Different Roles
  • Data Remanence
  • Privacy
  • States of Data
  • Data Loss Prevention
  • Key Takeaways
  • Knowledge Check

Lesson 04 - Security Engineering

  • Introduction
  • Security Engineering
  • Security Architecture
  • Security Models
  • Evaluation Criteria
  • System Security
  • CPU
  • Memory
  • Security Mode
  • Cloud Computing
  • IoT
  • Industrial Control System (ICS)
  • Cryptography
  • Encryption Methods
  • DES
  • Asymmetric Cryptography
  • Public Key Infrastructure
  • Cryptanalysis
  • Key Management
  • Critical Path Analysis
  • Site Location
  • Fire
  • HVAC
  • Key Takeaways
  • Knowledge Check

Lesson 05 - Communications and Network Security

  • Introduction
  • Network Architecture and Design
  • IP Addressing
  • Network Protocols
  • Transmission Mediaç
  • Firewall
  • Intrusion Detection System and Intrusion Prevention System
  • Network Access Control (NAC)
  • Content Delivery Network (CDN)
  • Networks
  • Software-Defined Networking (SDN)
  • Remote Access
  • Internet Security Protocol (IPsec)
  • Voice over Internet Protocol (VoIP)
  • Phreaking
  • Secure Access Protocols
  • Wireless Technologies
  • Network Attacks
  • Key Takeaways
  • Knowledge Check

Lesson 06 - Identity and Access Management

  • Identity and Access Management
  • Identity Management
  • Biometrics
  • Passwords
  • Tokens
  • Memory Cards and Smart Cards
  • Access and Authorization Concepts
  • Identity Management Implementation
  • Kerberos
  • Access Control Types
  • Access Control Models
  • Access Control Tools and Techniques
  • Accountability
  • Access Control Monitoring
  • Identity Proofing
  • Markup Languages
  • Identity as a Service (IDaaS)
  • Key Takeaways
  • Knowledge Check

Lesson 07 - Security Assessment and Testing

  • Security Assessment and Testing
  • Security Assessment
  • Vulnerability Assessment
  • Penetration Testing
  • Audits
  • Log Management
  • Synthetic Transaction and Real Transaction
  • Testing
  • Software Testing
  • Interface
  • Key Performance Indicators (KPI)
  • Key Takeaways
  • Knowledge Check

Lesson 8 - Security Operations

  • Security Operations
  • Investigation
  • Forensic Investigation
  • Evidence
  • Electronic Discovery
  • Incident Management
  • Security Operations Management
  • Identity and Access Management
  • Assets
  • Malware
  • Management
  • Recovery and Backup
  • Disaster Recovery
  • Perimeter Security
  • Key Takeaways
  • Knowledge Check

Lesson 09 - Software Development Security

  • Software Development Security
  • Importance of Software Development Security
  • Programming Concepts
  • Systems Development Life Cycle
  • Application Program Interface
  • Software Security and Assurance
  • Database and Data Warehouse Environments
  • Knowledge Management
  • Web Application Environment
  • Security Threats and Attacks
  • Key Takeaways
  • Knowledge Check

Exam Prerequisites:

Candidates must have at least five years cumulative paid work experience in two or more of the eight domains of the CISSP CBK. Earning a four-year college degree or regional equivalent or an additional credential from the (ISC)2 approved list will satisfy one year of the required experience. Education credit will only satisfy one year of experience.

A candidate that doesn’t have the required experience to become a CISSP may become an Associate of (ISC)2 by successfully passing the CISSP examination. The Associate of (ISC)2 will then have six years to earn the five years required experience.

The CISSP exam uses Computerized Adaptive Testing (CAT) for all English exams. CISSP exams in all other languages are administered as linear, fixed-form exams.

Exam Details:

CISSP exam and certification

How do I become a CISSP® Certified Information Systems Security Professional?

To obtain CISSP certification, you must meet specific eligibility criteria from (ISC)² and pass the computer-based CISSP exam at a Pearson VUE test center worldwide.

CISSP Certification Preparation Certification Information

The CISSP certification exam takes up to four hours to complete and consists of 125-175 multiple-choice questions and advanced innovative questions. A score of 700 out of 1,000 is required to pass the exam.

Domains Average Weight

  • Security and Risk Management 15%
  • Asset Security 10%
  • Security Architecture and Engineering 13%
  • Communication and Network Security 13%
  • Identity and Access Management (IAM) 13%
  • Security Assessment and Testing 12%
  • Security Operations 13%
  • Software Development Security 11%

FAQ

What is the format of the course? 

The programmes are entirely distance learning online bootcamp. Parts are practical e-learning courses that you can complete when you have time and at your own pace which you can also learn from your mobile phone (our app).

There are also online classroom sessions via our advanced professional distance learning system. A new classroom cohort always available every 2-3 months. We have a range of time slots to choose from and we always record the sessions so you can listen to them if you miss anything or want to review information. Flexibility to reschedule your cohort within first 90 days of access. 90 days of flexible access to online classes

There is always someone on hand to help and support you if you have any questions about the skills you are learning.

When can I take the live online courses?

The timing of each course varies for different groups/ cohort. You will be given access to a dashboard with a number of different time slots for the same session/topic. You decide which date and time works best for you. Some are scheduled for weekday afternoons, while others are scheduled for weekend mornings or evenings. Scheduling is based on factors such as the number of interested participants and the availability of trainers. If you miss a session, you can always watch recordings of that session. Recording exists for 1 year. You will never miss out!



There are no reviews yet.
Share your review
Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate $1.- to Stichting Edukans.

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.