• Technical IT

    Solutions delivered throughout the UK
  • Business Applications

    Solutions delivered throughout the UK
  • Professional Best Practice

    Solutions delivered throughout the UK
  • Professional Development

    Solutions delivered throughout the UK

CISSP Certified Information Systems Security Professional

  • Price £2,425.00
  • Duration 5 day(s)
All major credit cards accepted


Aimed at security professionals, this course surveys the entire information security landscape and the technologies involved. The course addresses the eight knowledge domains that comprise the common body of knowledge (CBK) for information systems security professionals and will help delegates prepare for CISSP certification.

The course offers a theory based approach to the security process, with opportunities to discuss the immediate application of concepts and techniques described in the CBK to the real world. It can be considered as providing a good introduction to security management, architecture and engineering.

The course comprises of eight sessions that map directly to the (CBK), each one is theory based with instructor led discussions; there are no hands on labs.


This course will assist delegates preparing for the following exam: CISSP Certified Information Systems Security Professional.

To book the CBT exam requires the candidate to acquire a Pearson VUE testing voucher. Please note, the price of the voucher is not included in the RRP of this course


Target Audience:

If you plan to build a career in information security CISSP is the gold standard certification to attain.

The course can run in two formats, the standard public event or as a boot camp. The boot camp allows the customer to specify longer working hours which allows a deeper and more detailed discussion of the technologies involved.
A public event would typically run 9.30 till 5 pm.
Boot camps can run 9 am to 5.30 pm or 9 am to 8 pm, depending on your preference.
A boot camp also traditionally finishes with a test prep exam, which takes place after lunch on the last day. This allows the delegates to approach the topics covered in a question and answer format, and then discuss their answers with the trainer and class.


Delegates should have experience in at least two of the domains in the (CBK), for 5 years or more (4 years if they have achieved relevant industry or degree level certifications) to achieve full certification. Associate status can be achieved without the full 4/5 years experience; full certification will be assigned when the correct amount of experience is obtained.

We recommend delegates have some knowledge of all CBK domains and are encouraged to read one or two of the books on the Reading List at ISC2.org.
We will provide a CISSP guide book as pre-reading

We recommend that work completed in the classroom is complemented by extra reading to ensure success in the exam. The amount of extra reading required will depend on the amount of experience the delegate has. The 'mile wide, inch deep' description indicates the challenge to most delegates, not all will have 'hands on' experience spanning all 8 domains of the CBK.

Course Content

Module 1. Security and Risk Management

Understand and apply concepts of confidentiality, integrity and availability
Apply security governance principles
Understand legal and regulatory issues that pertain to information security in a global context
Understand professional ethics
Develop and implement documented security policy, standards, procedures, and guidelines
Understand business continuity requirements
Contribute to personnel security policies
Understand and apply risk management concepts
Understand and apply threat modelling
Integrate security risk considerations into acquisition strategy and practice
Establish and manage information security education, training, and awareness

Module 2. Asset Security
Classify information and supporting assets
Determine and maintain ownership
Protect privacy
Ensure appropriate retention
Determine data security controls
Establish handling requirements

Module 3. Security Engineering
Implement and manage engineering processes using secure design principles
Understand the fundamental concepts of security models
Select controls and countermeasures based upon systems security evaluation models
Understand security capabilities of information systems
Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements
Assess and mitigate the vulnerabilities in web-based systems
Assess and mitigate vulnerabilities in mobile systems
Assess and mitigate vulnerabilities in embedded devices and cyber-physical systems
Apply cryptography
Apply secure principles to site and facility design
Design and implement physical security

Module 4. Communication & Network Security
Apply secure design principles to network architecture
Secure network components
Design and establish secure communication channels
Prevent or mitigate network attacks

Module 5. Identity & Access Management
Control physical and logical access to assets
Manage identification and authentication of people and devices
Integrate identity as a service
Integrate third-party identity services
Implement and manage authorization mechanisms
Prevent or mitigate access control attacks
Manage the identity and access provisioning lifecycle

Module 6. Security Assessment & Testing
Design and validate assessment and test strategies
Conduct security control testing
Collect security process data
Analyse and report test outputs
Understand the vulnerabilities of security architectures

Module 7. Security Operations
Understand and support investigations
Understand requirements for investigation types
Conduct logging and monitoring activities
Secure the provisioning of resources
Understand and apply foundational security operations concepts
Employ resource protection techniques
Conduct incident management
Operate and maintain preventative measures

Module 8. Software Security Development
Understand and apply security in the software development lifecycle
Enforce security controls in development environments
Assess the effectiveness of software security
Assess security impact of acquired software
CISSP and CBK are registered certification marks of (ISC)2, Inc.

Make Enquiry

Course Enquiry

Book Now

Course Enquiry

Find your local training centre