CISSP Certification Preparation Training Course

>  Certification Preparation Training Course

>  Available in venues throughout Wales

>  Classroom and Virtual courses available 

>  Onsite and customised courses available

>  ReAct and Access funding accepted

Learn from home - we offer this course as a live instructor-led virtual session delivered by the same expert trainers as our classroom courses

Award Winning

 

High quality training courses

NILC 5 Stars - Trustpilot Reviews

Rated "Excellent"

 

Price Promise

 

We'll match like-for-like prices*

Course Information

CISSP (Certified Information Systems Security Professional) draws from a comprehensive, up-to-date, global common body of knowledge that ensures security leaders have a deep knowledge and understanding of new threats, technologies, regulations, standards and practices.

This CISSP exam preparation course deals with the security concepts to be mastered in order to obtain CISSP certification. In an accelerated but rigorous manner, this training prepares the student for the CISSP examination, covering the entirety of the Common Body of Knowledge about security (CBK) as defined by the ISC2®.

Module 1. Security and Risk Management

Aligning security and risk to organisational objectives

  • Evaluate and apply security governance principles
  • Implement policies, standards and procedures
  • Applying compliance

Applying risk management concepts

  • Assessing threats and vulnerabilities
  • Performing risk analysis and control
  • Defining qualitative and quantitative analysis

Preserving the business

  • Adhering to Business Continuity Management Code of Practise and Specifications
  • Performing a business impact analysis

Investigating legal measures and techniques

  • Reviewing intellectual property, liability and law, and compliance
  • Differentiating traditional computer crime
  • Establish information and asset handling requirements

Module 2. Asset Security

Examining security models and frameworks

  • The Information Security Triad and multi-level models
  • Investigating industry standards: ISO 27001/27002
  • Evaluating security model fundamental concepts

Exploring system and component security concepts

  • Certification and accreditation criteria and models
  • Reviewing mobile system/cloud/IoT vulnerabilities

Protecting information by applying cryptography

  • Detailing symmetric and asymmetric encryption systems
  • Ensuring message integrity through hashing
  • Uncovering threats to cryptographic systems

Safeguarding physical resources

  • Designing environments to resist hostile acts and threats
  • Designing environments to resist hostile acts and threats

Module 3. Communication & Network Security

Defining a secure network architecture

  • TCP/IP and other protocol models
  • Protecting from network attacks
  • Reviewing secure network components and communication channels

Examining secure networks and components

  • Identifying wired and wireless technologies
  • Implementing firewalls, secure communications, proxies, and tunnels

Module 4. Identity & Access Management

Controlling access to protect assets

  • Defining administrative, technical and physical controls
  • Implementing centralised and decentralised approaches
  • Investigating biometric and multi-factor authentication
  • Identifying common threats
  • Manage the identity and access provisioning lifecyle

Module 6. Security Assessment & Testing

Designing and conducting security assessment strategies

  • Leveraging the role of testing and auditing to analyse the effectiveness of security controls
  • Differentiating detection and protection systems

Conducting logging and monitoring activities

  • Distinguishing between the roles of internal and external audits
  • Conduct or facilitate security audits

Module 7. Security Operations

Maintaining operational resilience

  • Managing security services effectively
  • Leveraging and supporting investigations and incident response
  • Differentiating detection and protection systems
  • Securely provisioning resources

Developing a recovery strategy

  • Designing a disaster recovery plan
  • Implementing test and maintenance processes
  • Provisioning of resources

Module 8. Software Security Development

Securing the software development life cycle

  • Applying software development methods and security controls
  • Addressing database security concepts and issues
  • Define and apply secure coding guidelines and standards
  • Reviewing software security effectiveness and security impact

CISSP is ideal for experienced security practitioners, managers and executives interested in proving their knowledge across a wide array of security practices and principles, including those in the following positions:

  • Chief Information Security Officer
  • Chief Information Officer
  • Director of Security
  • IT Director/Manager
  • Security Systems Engineer
  • Security Analyst
  • Security Manager
  • Security Auditor
  • Security Architect
  • Security Consultant
  • Network Architect

Please note CISSP candidates must meet specific requirements, as established by ISC² — see: ISC². Those without the required experience can take the exam to become an Associate of (ISC)² while working toward the experience needed for full certification

This course includes:

  • Training from a certified CISSP trainer
  • CISSP courseware and study materials
  • Refreshments

Course Key Points


Duration: 5 days

Accredited: Available

Exam(s): Not Included

Practice Exam(s): Not Included

Type: Available as Classroom, Virtual Live and In-house

Dates and Prices

Can’t find the course dates or training location you are looking for? We’ll try our best to accommodate.

Enter your training requirements below and a member of our team will be in contact with you to discuss them further.

 

9 + 7 =

Save time and money by letting our expert trainers come to your offices. 

Enter your onsite training requirements below and a member of our team will be in contact with you to discuss them further.

 

12 + 4 =

Looking to book 4 or more delegates onto a single course?

Enter your group training requirements below and a member of our team will be in contact with you to discuss them further.

 

2 + 15 =

Learn new skills from our expert instructors in your own time and at your own pace. 

Unfortunately this courses does not currently have an online self-paced learning option.

 

Can't find the course dates, location or delivery type you are looking for? Fill out the Request Dates form above and we'll try our best to accommodate. 

Classroom Courses

 Interact in person with our expert instructors in venues throughout the UK

Virtual-Live Courses

Participate in live instructor-led sessions from the comfort of your home or office

Online Self-Paced

Learn new skills from our expert instructors, in your own time and at your own pace

Please note all published prices are exclusive of VAT for consumers who pay no VAT or can recover VAT. The current rate of VAT is 20% for consumers that are required to pay VAT. All public course bookings are subject to availability and minimum course numbers.

Why Choose NILC For Your CISSP Training?

 

Experienced Trainers

Highly skilled trainers with real world user experience

Multiple Location

Courses available at our venues or your offices

Highly Rated

We are highly rated with 5 stars from Trustpilot

Learn From Home

Live instructor-led virtual courses available

Business Experience

Industry expert trainers with over 10 years experience

i

No Hidden Charges

Course materials and equipment are all provided

Bespoke Options

We can offer custom training tailored to your requirements

w

Post Course Support

We’ll be on hand to help and answer any questions

Newport Office: NILC, 50 Commercial Road, Newport, Gwent, NP20 2PE

Cardiff Office: NILC, 13a Cathedral Road, Cardiff, CF11 9HA

Bridgend Office: NILC, Floor 1, 5 Five Bells Road, Bridgend, CF31 3HW

 

All quoted prices are exclusive of VAT for consumers who pay no VAT or can recover VAT. The current rate of VAT is 20% for consumers that are required to pay VAT. All course bookings are subject to availability.