CISSP – Certification Training
Categories
Information Security Certification
$199 – $2,999Price range: $199 through $2,999
$199
-
LevelIntermediate
-
Duration32 hours
-
Last UpdatedJanuary 15, 2026
Hi, Welcome back!
Pre-Requisites
- Minimum 5 years of cumulative paid full-time work experience in at least 2 of the 8 CISSP domains
- One-year experience waiver available with a 4-year degree or approved (ISC)² credential
- Basic understanding of networking, operating systems, and security concepts is recommended
- CISSP exam fee is not included and must be scheduled via Pearson VUE
- Stable internet connection and system setup required for online training
- For rescheduling or cancellation, email
Who Should Enroll
- This CISSP training is best suited for mid- to senior-level professionals, including:
- IT Security Managers
- Cybersecurity Analysts
- Network and Security Architects
- Systems Engineers
- Security Consultants
- Risk and Compliance Professionals
- Aspiring Chief Information Security Officers (CISOs)
Courseware Includes
- Official CISSP-aligned training based on (ISC)² CBK
- Live online or in-person instructor-led training
- Flexible schedules (weekday, weekend, and evening batches)
- Hands-on labs and real-world cybersecurity scenarios
- Domain-wise quizzes and CISSP practice exams
- Downloadable course materials with lifetime single-user access
- Certificate of Completion and exam readiness assessment
- Dedicated exam application and scheduling support
Description
The CISSP® Certification Training by Certification Guide Inc. is a comprehensive, exam-focused program designed for experienced IT and cybersecurity professionals aiming to earn the globally recognized Certified Information Systems Security Professional (CISSP) credential from (ISC)².
This training covers all eight domains of the CISSP Common Body of Knowledge (CBK) and equips learners with the skills required to design, implement, and manage enterprise-level security programs. The course combines in-depth theoretical knowledge with real-world scenarios, hands-on labs, and practical case studies to help you understand complex cybersecurity concepts clearly.
Delivered by expert instructors with extensive industry experience, this CISSP course prepares you for leadership roles such as Security Manager, Security Consultant, and Chief Information Security Officer (CISO). With flexible live online and in-person training options across the USA and Canada, this program is ideal for professionals looking to advance their cybersecurity careers and confidently clear the CISSP exam.
FAQs
Does the course fee include the examination fee as well ?
The exam fee for CISSP is not included in the course fee. Schedule your exam directly through www.pearsonvue.com.
Will I get the CISSP® certificate after completing this certification course ?
On completion of 4 days of In-person, you will receive a 35 PDU’s certificate. A soft copy of the certificate will be mailed to your registered email address within 48 hours of course completion.
Does CG offers 100% money back guarantee ?
Yes, we offer 100% money back guarantee on our CISSP training. CLICK HERE to know more about the money back guarantee.
Is this course accredited ?
No, this course is not accredited. However, our course material is well aligned with the official guide and developed by a panel of certified instructors.
How long the course materials access will be provided ?
All registered participants will receive a link to download the courseware from Dropbox. Once downloaded, you will have lifetime single-user access to the CG course material.
When will I receive the course location and the workshop details ?
Registration confirmation email and the courseware access will be shared immediately after the registration. Other details such as location, venue, timing’s. do’s and don’ts will shared 5 day prior for in-person classroom training and link to join the class, timing’s (time zone) details will be shared 24 our prior to the class.
How do I reschedule OR cancel my enrolment ?
Absolutely yes, you need to drop an email to with your request, and depending upon when you raise a refund or rescheduling request, a fee will be applicable. To learn more, please read our refund policy.
Is there an assistance with an exam application and scheduling ?
Yes, for online exams, we will help you set up your PC/Laptop, and for an In-person exam, we will help you find the nearest location, available date and time.
Who are the instructors ?
The trainers are highly qualified and certified instructors with years of relevant industry and coaching experience who will hand hold you through the workshop and ensure your success.
What I will learn?
- Security and Risk Management principles and governance
- Asset Security and data classification techniques
- Security Architecture and Engineering concepts
- Communication and Network Security controls
- Identity and Access Management (IAM) models and tools
- Security Assessment, Testing, and Audit practices
- Security Operations, Incident Response, and Disaster Recovery
- Software Development Security and secure SDLC practices
- Risk identification, threat modeling, and vulnerability management
- How to align organizational goals with security strategies
Course Agenda
Introduction
-
Introduction to CISSP, ISACA, and Course
-
Certification Guide, Instructor, Participant introduction and Set expectation by participant
Module 01 : Security and Risk Management
-
Information Security Management
-
Security Controls
-
Information Security Management and Governance
-
Goals, Mission, and Objectives
-
Due Care
-
Security Policy
-
Compliance
-
Computer Crimes
-
Legal Systems
-
Intellectual Property (IP) Law
-
Privacy
-
General Data Protection Regulation
-
Security
-
Risk Analysis
-
Types of Risk Analysis
-
Security Control Assessment
-
Threat Modeling
-
Supply-Chain Risk Management
-
Third-Party Management
-
Business Continuity Planning
-
Business Continuity Planning Phases
-
Managing Personnel Security
-
Security Awareness Training
-
Program Effectiveness Evaluation
Module 02 : Asset Security
-
Information Classification
-
Data Classification
-
Data Life Cycle
-
Data Management
-
Different Roles
-
Data Remanence
-
Privacy
-
States of Data
-
Data Loss Prevention
Module 03 : Security Engineering
-
Security Architecture
-
Security Models
-
Evaluation Criteria
-
System Security
-
CPU
-
Memory
-
Security Mode
-
Cloud Computing
-
IOT
-
Industrial Control System (ICS)
-
Cryptography
-
Encryption Methods
-
DES
-
Asymmetric Cryptography
-
Public Key Infrastructure
-
Cryptanalysis
-
Key Management
-
Critical Path Analysis
-
Site Location
-
Fire
-
HVAC
Module 04 : Communications and Network Security
-
Network Architecture and Design
-
IP Addressing
-
Network Protocols
-
Transmission Media
-
Firewall
-
Intrusion Detection System and Intrusion Prevention System
-
Network Access Control (NAC)
-
Content Delivery Network (CDN)
-
Networks
-
Software-Defined Networking (SDN)
-
Remote Access
-
Internet Security Protocol (IPsec)
-
Voice over Internet Protocol (VoIP)
-
Phreaking
-
Secure Access Protocols
-
Wireless Technologies
-
Network Attacks
Module 05 : Identity and Access Management
-
Identity Management
-
Biometrics
-
Passwords
-
Tokens
-
Memory Cards and Smart Cards
-
Access and Authorization Concepts
-
Identity Management Implementation
-
Kerberos
-
Access Control Types
-
Access Control Models
-
Access Control Tools and Techniques
-
Accountability
-
Access Control Monitoring
-
Identity Proofing
-
Markup Languages
-
Identity as a Service (IDaaS)
Module 06 : Security Assessment and Testing
-
Security Assessment
-
Vulnerability Assessment
-
Penetration Testing
-
Audits
-
Log Management
-
Synthetic Transaction and Real Transaction
-
Testing
-
Software Testing
-
Interface
-
Key Performance Indicators (KPI)
Module 07 : Security Operations
-
Investigation
-
Forensic Investigation
-
Evidence
-
Electronic Discovery
-
Incident Management
-
Security Operations Management
-
Identity and Access Management
-
Assets
-
Malware
-
Management
-
Recovery and Backup
-
Disaster Recovery
-
Perimeter Security
Module 08 : Software Development Security
-
Importance of Software Development Security
-
Programming Concepts
-
Systems Development Life Cycle
-
Application Program Interface
-
Software Security and Assurance
-
Database and Data Warehouse Environments
-
Knowledge Management
-
Web Application Environment
-
Security Threats and Attacks
Student Ratings & Reviews
No Review Yet