CISSP – Certification Training
Categories
Information Security Certification
$199 – $2,999Price range: $199 through $2,999
$199
-
LevelIntermediate
-
Duration32 hours
-
Last UpdatedDecember 26, 2025
Hi, Welcome back!
Requirements
- Minimum 5 years of cumulative paid full-time work experience in at least 2 of the 8 CISSP domains
- One-year experience waiver available with a 4-year degree or approved (ISC)² credential
- Basic understanding of networking, operating systems, and security concepts is recommended
- CISSP exam fee is not included and must be scheduled via Pearson VUE
- Stable internet connection and system setup required for online training
- For rescheduling or cancellation, email support@certificationguide.com
Target Audience
- This CISSP training is best suited for mid- to senior-level professionals, including:
- IT Security Managers
- Cybersecurity Analysts
- Network and Security Architects
- Systems Engineers
- Security Consultants
- Risk and Compliance Professionals
- Aspiring Chief Information Security Officers (CISOs)
Material Includes
- Official CISSP-aligned training based on (ISC)² CBK
- Live online or in-person instructor-led training
- Flexible schedules (weekday, weekend, and evening batches)
- Hands-on labs and real-world cybersecurity scenarios
- Domain-wise quizzes and CISSP practice exams
- Downloadable course materials with lifetime single-user access
- Certificate of Completion and exam readiness assessment
- Dedicated exam application and scheduling support
Description
The CISSP® Certification Training by Certification Guide Inc. is a comprehensive, exam-focused program designed for experienced IT and cybersecurity professionals aiming to earn the globally recognized Certified Information Systems Security Professional (CISSP) credential from (ISC)².
This training covers all eight domains of the CISSP Common Body of Knowledge (CBK) and equips learners with the skills required to design, implement, and manage enterprise-level security programs. The course combines in-depth theoretical knowledge with real-world scenarios, hands-on labs, and practical case studies to help you understand complex cybersecurity concepts clearly.
Delivered by expert instructors with extensive industry experience, this CISSP course prepares you for leadership roles such as Security Manager, Security Consultant, and Chief Information Security Officer (CISO). With flexible live online and in-person training options across the USA and Canada, this program is ideal for professionals looking to advance their cybersecurity careers and confidently clear the CISSP exam.
What I will learn?
- Security and Risk Management principles and governance
- Asset Security and data classification techniques
- Security Architecture and Engineering concepts
- Communication and Network Security controls
- Identity and Access Management (IAM) models and tools
- Security Assessment, Testing, and Audit practices
- Security Operations, Incident Response, and Disaster Recovery
- Software Development Security and secure SDLC practices
- Risk identification, threat modeling, and vulnerability management
- How to align organizational goals with security strategies
Course Agenda
Introduction
-
Introduction to CISSP, ISACA, and Course
-
Certification Guide, Instructor, Participant introduction and Set expectation by participant
Module 01 : Security and Risk Management
-
Information Security Management
-
Security Controls
-
Information Security Management and Governance
-
Goals, Mission, and Objectives
-
Due Care
-
Security Policy
-
Compliance
-
Computer Crimes
-
Legal Systems
-
Intellectual Property (IP) Law
-
Privacy
-
General Data Protection Regulation
-
Security
-
Risk Analysis
-
Types of Risk Analysis
-
Security Control Assessment
-
Threat Modeling
-
Supply-Chain Risk Management
-
Third-Party Management
-
Business Continuity Planning
-
Business Continuity Planning Phases
-
Managing Personnel Security
-
Security Awareness Training
-
Program Effectiveness Evaluation
Module 02 : Asset Security
-
Information Classification
-
Data Classification
-
Data Life Cycle
-
Data Management
-
Different Roles
-
Data Remanence
-
Privacy
-
States of Data
-
Data Loss Prevention
Module 03 : Security Engineering
-
Security Architecture
-
Security Models
-
Evaluation Criteria
-
System Security
-
CPU
-
Memory
-
Security Mode
-
Cloud Computing
-
IOT
-
Industrial Control System (ICS)
-
Cryptography
-
Encryption Methods
-
DES
-
Asymmetric Cryptography
-
Public Key Infrastructure
-
Cryptanalysis
-
Key Management
-
Critical Path Analysis
-
Site Location
-
Fire
-
HVAC
Module 04 : Communications and Network Security
-
Network Architecture and Design
-
IP Addressing
-
Network Protocols
-
Transmission Media
-
Firewall
-
Intrusion Detection System and Intrusion Prevention System
-
Network Access Control (NAC)
-
Content Delivery Network (CDN)
-
Networks
-
Software-Defined Networking (SDN)
-
Remote Access
-
Internet Security Protocol (IPsec)
-
Voice over Internet Protocol (VoIP)
-
Phreaking
-
Secure Access Protocols
-
Wireless Technologies
-
Network Attacks
Module 05 : Identity and Access Management
-
Identity Management
-
Biometrics
-
Passwords
-
Tokens
-
Memory Cards and Smart Cards
-
Access and Authorization Concepts
-
Identity Management Implementation
-
Kerberos
-
Access Control Types
-
Access Control Models
-
Access Control Tools and Techniques
-
Accountability
-
Access Control Monitoring
-
Identity Proofing
-
Markup Languages
-
Identity as a Service (IDaaS)
Module 06 : Security Assessment and Testing
-
Security Assessment
-
Vulnerability Assessment
-
Penetration Testing
-
Audits
-
Log Management
-
Synthetic Transaction and Real Transaction
-
Testing
-
Software Testing
-
Interface
-
Key Performance Indicators (KPI)
Module 07 : Security Operations
-
Investigation
-
Forensic Investigation
-
Evidence
-
Electronic Discovery
-
Incident Management
-
Security Operations Management
-
Identity and Access Management
-
Assets
-
Malware
-
Management
-
Recovery and Backup
-
Disaster Recovery
-
Perimeter Security
Module 08 : Software Development Security
-
Importance of Software Development Security
-
Programming Concepts
-
Systems Development Life Cycle
-
Application Program Interface
-
Software Security and Assurance
-
Database and Data Warehouse Environments
-
Knowledge Management
-
Web Application Environment
-
Security Threats and Attacks
Student Ratings & Reviews
No Review Yet