CISSP: Certified Info Systems Security Professional

ICTD International Centre for Training and Development

What are the topics?

ICTD International Centre for Training and Development


Coursalytics is an independent platform to find, compare, and book executive courses. Coursalytics is not endorsed by, sponsored by, or otherwise affiliated with any business school or university.

Full disclaimer.

Read more about Cybersecurity

The modern world of security systems is changing rapidly, and these days cybersecurity has become one of the most essential parts of protecting data s...

Who should attend

This course is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and engineers, network administrators, information security specialists, and risk management professionals, who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career. Through the study of all 10 CISSP CBK domains, students will validate their knowledge by meeting the necessary preparation requirements to qualify to sit for the CISSP certification exam. The CISSP exam is intentionally difficult and should not be taken lightly. Even participants with years of security experience should assume that they will have additional study time after class. Because the domains are so varied, it is unlikely that any one student will have experience in all 10 domains.

About the course

In this course, participants will analyze a wide range of information systems security subjects that are organized into 8 domains for CISSP exam certification.

Course Objectives

Upon successful completion of this course, students will be able to:

  • Analyze information systems access control.
  • Analyze security architecture and design.
  • Analyze network security systems and telecommunications.
  • Analyze information security management goals.
  • Analyze information security classification and program development.
  • Analyze risk management criteria and ethical codes of conduct.
  • Analyze software development security.
  • Analyze cryptography characteristics and elements.
  • Analyze physical security.
  • Analyze operations security.
  • Apply Business Continuity and Disaster Recovery Plans.
  • Identify legal issues, regulations, compliance standards, and investigation practices relating to information systems security.

Course Outline

Security & Risk Management

  • Security & Risk Management
  • Confidentiality, Integrity, and Availability
  • Security Governance
  • The Complete and Effective Security Program
  • Compliance
  • Global Legal and Regulatory Issues
  • Understand Professional Ethics
  • Develop and Implement Security Policy
  • Business Continuity (BC) & Disaster Recovery (DR) Requirements
  • Manage Personnel Security
  • Risk Management Concepts
  • Threat Modeling
  • Acquisitions Strategy and Practice
  • Security Education, Training, and Awareness

Asset Security

  • Asset Security
  • Data Management: Determine and Maintain Ownership
  • Data Standards
  • Longevity and Use
  • Classify Information and Supporting Assets
  • Asset Management
  • Protect Privacy
  • Ensure Appropriate Retention
  • Determine Data Security Controls
  • Standards Selection

Security Engineering

  • Security Engineering
  • The Engineering Lifecycle Using Security Design Principles
  • Fundamental Concepts of Security Models
  • Information Systems Security Evaluation Models
  • Security Capabilities of Information Systems
  • Vulnerabilities of Security Architectures
  • Database Security
  • Software and System Vulnerabilities and Threats
  • Vulnerabilities in Mobile Systems
  • Vulnerabilities in Embedded Devices and Cyber-Physical Systems
  • The Application and Use of Cryptography
  • Site and Facility Design Considerations
  • Site Planning
  • Implementation and Operation of Facilities Security

Communications & Network Security

  • Communications & Network Security
  • Secure Network Architecture and Design
  • Implications of Multi-Layer Protocols
  • Converged Protocols
  • Securing Network Components
  • Secure Communication Channels
  • Network Attacks

Identity & Access Management

  • Identity & Access Management
  • Physical and Logical Access to Assets
  • Identification and Authentication of People and Devices
  • Identity Management Implementation
  • Identity as a Service (IDaaS)
  • Integrate Third-Party Identity Services
  • Implement and Manage Authorization Mechanisms
  • Prevent or Mitigate Access Control Attacks
  • Identity and Access Provisioning Lifecycle

Security Assessment & Testing

  • Security Assessment & Testing
  • Assessment and Test Strategies
  • Collect Security Process Data
  • Internal and Third-Party Audits

Security Operations

  • Security Operations
  • Investigations
  • Provisioning of Resources through Configuration Management
  • Resource Protection
  • Incident Response
  • Preventative Measures against Attacks
  • Patch and Vulnerability Management
  • Change and Configuration Management
  • The Disaster Recovery Process
  • Test Plan Review
  • Business Continuity and Other Risk Areas
  • Access Control
  • Personnel Safety

Security in the Software Development Life Cycle

  • Security in the Software Development Life Cycle
  • Software Development Security Outline
  • Environment and Security Controls
  • Security of the Software Environment
  • Software Protection Mechanisms
  • Assess the Effectiveness of Software Security
  • Assess Software Acquisition Security

Course Methodology

A variety of methodologies will be used during the course that includes:

  • (30%) Based on Case Studies
  • (30%) Techniques
  • (30%) Role Play
  • (10%) Concepts
  • Pre-test and Post-test
  • Variety of Learning Methods
  • Lectures
  • Case Studies and Self Questionaires
  • Group Work
  • Discussion
  • Presentation

Videos and materials

CISSP: Certified Info Systems Security Professional at ICTD International Centre for Training and Development

This course has no confirmed dates in the future. Subscribe to be notified when it is offered.

Something went wrong. We're trying to fix this error.

Thank you

Someone from the Coursalytics team will be in touch with you soon.


Coursalytics is an independent platform to find, compare, and book executive courses. Coursalytics is not endorsed by, sponsored by, or otherwise affiliated with any business school or university.

Full disclaimer.

Read more about Cybersecurity

Сybersecurity courses offer an excellent opportunity to develop the knowledge and skills necessary to implement a perfect cybersecurity strategy that will accelerate the main security protocols' efficiency. After the successful completion of cybersec...

Because of COVID-19, many providers are cancelling or postponing in-person programs or providing online participation options.

We are happy to help you find a suitable online alternative.