Certified Information Systems Security Professional (CISSP) cover image

Certified Information Systems Security Professional (CISSP)

Duration: 5 Days

Certified Information Systems Security Professional (CISSP) is a globally recognized certification in the field of information security. It is governed by (ISC)² and accredited under ISO/IEC Standard 17024:2003. This course equips professionals with the knowledge to design, engineer, and manage the overall security posture of an organization. It addresses various key security domains including risk management, asset protection, network security, identity management, and more. CISSP-certified individuals are highly sought after globally for their validated skills in securing modern digital infrastructures.
Course Prerequisites:

To apply for the CISSP course certification, you need to:


  • Have a minimum 5 years of cumulative paid full-time work experience in two or more of the 8 domains of the (ISC)² CISSP Common Body of Knowledge (CBK)
  • One-year experience waiver can be earned with a 4-year college degree, or regional equivalent or additional credential from the (ISC)² approved list

Who should do a CISSP Certification?

The CISSP training is ideal for the following professionals:


  • Chief Information Security Officers (CISO)
  • IT Directors
  • IT Security Consultants/Managers
  • Security Architects/Auditors
  • IT Managers
  • Security System Engineers
  • Network Architects

Domain1: Security and Risk Management (Security, Risk, Compliance, Law, Regulations, and Business Continuity)

  • Confidentiality, integrity, and availability concepts
  • Security governance principles
  • Compliance
  • Legal and regulatory issues
  • Professional ethic
  • Security policies, standards, procedures and guidelines

Domain2: Asset Security (Protecting Security of Assets)

  • Information and asset classification
  • Ownership (e.g. data owners, system owners)
  • Protect privacy
  • Appropriate retention
  • Data security controls
  • Handling requirements (e.g. markings, labels, storage)

Domain3: Security Engineering (Engineering and Management of Security)

  • Engineering processes using secure design principles
  • Security models fundamental concepts
  • Security evaluation models
  • Security capabilities of information systems
  • Security architectures, designs, and solution elements vulnerabilities
  • Web-based systems vulnerabilities
  • Mobile systems vulnerabilities
  • Embedded devices and cyber-physical systems vulnerabilities
  • Cryptography
  • Site and facility design secure principles
  • Physical security

Domain4: Communication and Network Security (Designing and Protecting Network Security)

  • Secure network architecture design (e.g. IP & non-IP protocols, segmentation)
  • Secure network components
  • Secure communication channels
  • Network attacks

Domain5: Identity and Access Management (Controlling Access and Managing Identity)

  • Physical and logical assets control
  • Identification and authentication of people and devices
  • Identity as a service (e.g. cloud identity)
  • Third-party identity services (e.g. on premise)
  • Access control attacks
  • Identity and access provisioning lifecycle (e.g. provisioning review)

Domain6: Security Assessment and Testing (Designing, Performing, and Analyzing Security Testing)

  • Assessment and test strategies
  • Security process data (e.g. management and operational controls)
  • Security control testing
  • Test outputs (e.g. automated, manual)
  • Security architectures vulnerabilities

Domain7: Security Operations (Foundational Concepts, Investigations, Incident Management, and Disaster Recovery)

  • Investigations support and requirements
  • Logging and monitoring activities
  • Provisioning of resources
  • Foundational security operations concepts
  • Resource protection techniques
  • Incident management
  • Preventative measures
  • Patch and vulnerability management
  • Change management processes
  • Recovery strategies
  • Disaster recovery processes and plans
  • Business continuity planning and exercises
  • Physical security
  • Personnel safety concerns

Domain8: Software Development Security (Understanding, Applying, and Enforcing Software Security)

  • Security in the software development lifecycle
  • Development environment security controls
  • Software security effectiveness
  • Acquired software security impact

(CISSP) Certified Information Systems Security Professional Cybersecurity certification courses Ethical hacking training Network security certification Information security training Cybersecurity bootcamp SOC analyst training Penetration testing course Cybersecurity online certification IT security certifications for beginners Advanced cybersecurity training IBM cybersecurity certification IBM security training courses IBM QRadar training IBM cyber security professional certificate IBM SIEM certification Palo Alto certification training Palo Alto firewall course PCNSE certification training Palo Alto network security certification Palo Alto online training CompTIA Security+ certification CompTIA CySA+ training CompTIA PenTest+ course CompTIA Network+ certification CompTIA A+ cybersecurity path Cisco cybersecurity certification Cisco CCNA security training Cisco CCNP security course Cisco network security certification Cisco ethical hacking course Cybersecurity certification Singapore Ethical hacking course Singapore Cisco certification Singapore CompTIA Security+ Singapore Palo Alto training Singapore IBM cybersecurity course Singapore Cybersecurity training Malaysia Ethical hacking Malaysia course Cisco certification Malaysia CompTIA certification Malaysia Palo Alto Malaysia training IBM cybersecurity Malaysia Cybersecurity certification Thailand Ethical hacking course Thailand Cisco Thailand training CompTIA Thailand certification Palo Alto Thailand course IBM cybersecurity Thailand Cybersecurity training Cambodia Ethical hacking Cambodia course Cisco certification Cambodia CompTIA Cambodia training Palo Alto Cambodia certification IBM cybersecurity Cambodia Cybersecurity training Myanmar Ethical hacking Myanmar course Cisco Myanmar certification CompTIA Myanmar training Palo Alto Myanmar certification IBM cybersecurity Myanmar Cybersecurity certification USA Ethical hacking course USA Cisco certification USA CompTIA Security+ USA Palo Alto training USA IBM cybersecurity certification USA Cybersecurity certification UK Ethical hacking course UK Cisco certification UK CompTIA UK training Palo Alto UK certification IBM cybersecurity UK Cybersecurity certification UAE Cybersecurity course Dubai Ethical hacking Dubai Cisco certification Dubai CompTIA UAE training Palo Alto Dubai certification IBM cybersecurity UAE Best cybersecurity certification for beginners in Singapore Online CompTIA Security+ course with certification USA Cisco CCNA security training institute in Dubai Palo Alto PCNSE certification training in Malaysia IBM cybersecurity certification online UK