CISSP Certified Information Systems Security Professional
Globally recognised certification for IT Security Professionals
Certification preparation training courses
Certified trainers with 5 Star customer ratings
CISSP examination voucher included with course
Classroom, Onsite and Virtual courses available
Welsh Government funding accepted
Course Information
Course Overview
CISSP (Certified Information Systems Security Professional) draws from a comprehensive, up-to-date, global common body of knowledge that ensures security leaders have a deep knowledge and understanding of new threats, technologies, regulations, standards and practices.
This CISSP exam preparation course deals with the security concepts to be mastered in order to obtain CISSP certification. In an accelerated but rigorous manner, this training prepares the student for the CISSP examination, covering the entirety of the Common Body of Knowledge about security (CBK) as defined by the ISC2®.
Outline
CISSP Certified Information Systems Security Professional
Module 1. Security and Risk Management
Aligning security and risk to organisational objectives
- Evaluate and apply security governance principles
- Implement policies, standards and procedures
- Applying compliance
Applying risk management concepts
- Assessing threats and vulnerabilities
- Performing risk analysis and control
- Defining qualitative and quantitative analysis
Preserving the business
- Adhering to Business Continuity Management Code of Practise and Specifications
- Performing a business impact analysis
Investigating legal measures and techniques
- Reviewing intellectual property, liability and law, and compliance
- Differentiating traditional computer crime
- Establish information and asset handling requirements
Module 2. Asset Security
Examining security models and frameworks
- The Information Security Triad and multi-level models
- Investigating industry standards: ISO 27001/27002
- Evaluating security model fundamental concepts
Exploring system and component security concepts
- Certification and accreditation criteria and models
- Reviewing mobile system/cloud/IoT vulnerabilities
Protecting information by applying cryptography
- Detailing symmetric and asymmetric encryption systems
- Ensuring message integrity through hashing
- Uncovering threats to cryptographic systems
Safeguarding physical resources
- Designing environments to resist hostile acts and threats
- Designing environments to resist hostile acts and threats
Module 3. Communication & Network Security
Defining a secure network architecture
- TCP/IP and other protocol models
- Protecting from network attacks
- Reviewing secure network components and communication channels
Examining secure networks and components
- Identifying wired and wireless technologies
- Implementing firewalls, secure communications, proxies, and tunnels
Module 4. Identity & Access Management
Controlling access to protect assets
- Defining administrative, technical and physical controls
- Implementing centralised and decentralised approaches
- Investigating biometric and multi-factor authentication
- Identifying common threats
- Manage the identity and access provisioning lifecyle
Module 6. Security Assessment & Testing
Designing and conducting security assessment strategies
- Leveraging the role of testing and auditing to analyse the effectiveness of security controls
- Differentiating detection and protection systems
Conducting logging and monitoring activities
- Distinguishing between the roles of internal and external audits
- Conduct or facilitate security audits
Module 7. Security Operations
Maintaining operational resilience
- Managing security services effectively
- Leveraging and supporting investigations and incident response
- Differentiating detection and protection systems
- Securely provisioning resources
Developing a recovery strategy
- Designing a disaster recovery plan
- Implementing test and maintenance processes
- Provisioning of resources
Module 8. Software Security Development
Securing the software development life cycle
- Applying software development methods and security controls
- Addressing database security concepts and issues
- Define and apply secure coding guidelines and standards
- Reviewing software security effectiveness and security impact
Assessment
CISSP Certified Information Systems Security Professional
Recommended as preparation for the following exam:
- (ISC)2 Certified Information Systems Security Professional
Gaining this accreditation is not just about passing the exam, there are a number of other criteria that need to be met including 5 years of cumulative, paid work experience in two or more of the eight domains of the (ISC)²® CISSP CBK . Full details can be found at https://www.isc2.org/cissp/default.aspx
Those without the required experience can take the exam to become an Associate of (ISC)² while working towards the experience needed for full certification
Please note an exam voucher is included as part of this course
What's Included
- 5-days training and exam preparation from NILC’s accredited CISSP trainer
- Course notes and presentation slides
- CISSP examination voucher (valid for 12 months)
- Exam Pass Guarantee – if you do not pass the exam after attending this training course with us, you will be eligible to attend the same training again for free. All that will be payable is the examination fee which is charged by the examination board.
Dates & Prices
Choose your location
Virtual
Start Date: Mon 29 January 2024
Spaces:Available
£2,995.00excl. VAT
Spaces:Available
Virtual
Start Date: Mon 20 May 2024
Spaces:Available
£2,995.00excl. VAT
Spaces:Available
Virtual
Start Date: Mon 15 July 2024
Spaces:Available
£2,995.00excl. VAT
Spaces:Available
Can't find the course dates, location or delivery type you are looking for?
Fill out the request dates form above and we'll try our best to accommodate or contact us directly.
Why choose NILC for your training?
Learn why we should be your training provider of choice.

Awarding Winning Training Courses with industry leading customer satisfaction rates

A family business with customer service at the heart of everything we do

Trusted Training Partner to multiple colleges, government departments, businesses and unions

UK based Trainers that are industry experts and fully qualified

Rated "Excellent" with over 500+ Trustpilot Reviews
How we deliver our courses

Virtual
Our virtual courses allow you to access live instructor-led training from the same expert instructors that deliver our classroom courses, without leaving the comfort of your home or office. All virtual courses are fully interactive, and learners can communicate with their trainer and peers at any time.
Many of our virtual courses are also recorded, so you can recap over the content you learnt as many time as you wish.

Classroom
Our classroom courses allow you to learn and interact face-to-face with our expert instructors in a comfortable and modern training environment. All of our classroom based courses take place at NILC centers, or high quality training facilities, and include all required IT and physical equipment.
We also limit our class sizes to help promote better discussions and to ensure your learning experience is comfortable as possible.

Onsite
Save time and hassle by arranging for one of our expert instructors to come to you. Our onsite courses allow you to learn in a location of your choosing, and you can train as many or as few people as you want – from a single person or team to whole departments. We can also fully customize the course content to the specific requirements of your business or project.
We offer onsite courses throughout the UK and it can be a great team building opportunity for colleagues to come together, bond and discuss.

Online
Our Online Self Paced courses allow you to learn new skills from our expert instructors, in your own time and at your own pace. Our flexible online learning platform allows you to access content on your computer, tablet or mobile device, whether you’re on the move or at home. All our online courses come with immediate access and you can start learning straight away, from any internet enabled compatible device.
We also offer online email support from our expert instructors, so they’re always on hand and happy to help you with any questions which may arise.
Why choose NILC for your training?
Learn why we should be your training provider of choice.

Awarding Winning Training Courses with industry leading customer satisfaction rates

A family business with customer service at the heart of everything we do

Trusted Training Partner to multiple colleges, government departments, businesses and unions

UK based Trainers that are industry experts and fully qualified

Rated "Excellent" with over 500+ Trustpilot Reviews
Testimonials
“Highly Recommended”
A complex course subject was delivered clearly and with great passion and enthusiasm by our tutor. Subjects were explained in clear, real-life examples. Without doubt, I'm sure my successful result is in large part due to his experience and skill in this area.
- Neil Wilson
“Fantastic Course Thank You”
Fantastic course. Amazing from start to finish. Julie was absolutely outstanding. She was professional and has given me the knowledge and confidence to continue my studies. I cant thank Karim and team enough.
- Jodie Gee
“Great Tuition"
Great tuition. Felt really comfortable to ask questions and the course was engaging. Tony and Karim were brilliant.
- Amy Jones
“Great Instructor”
Great instructor. Well delivered and knows the subject inside and out. Friendly and provides a warm atmosphere conducive for feeling relaxed. A lot of context to cover in a short time.
- David Schofield
“Five Star Quality Course”
I received all the resources in advance which helped me prep for the course. The tutor was engaging and explained complex topics really well. The exam coaching was a unique selling point for me as it got me prepared for the exams so that nerves were less of a factor. Great communication throughout, thank you Tony and the whole team.
- Kim Darkin
CISSP FAQ's
What is the difference between CISSP and CISM?
CISSP and CISM are different certifications. CISSP stands for Certified Information Systems Security Professional, while CISM stands for Certified Information Security Manager. CISSP is a more technical certification that focuses on the design, implementation, and management of information security. CISM is a more managerial certification that focuses on the governance, risk management, and compliance aspects of information security.
What is CISSP?
ISSP stands for Certified Information Systems Security Professional. It is a globally recognized certification for information security professionals. The CISSP certification demonstrates that you have the knowledge, skills, and experience to effectively design, implement, and manage an information security program.
What are the requirements to earn the CISSP certification?
To earn the CISSP certification you must 1) Have a bachelor's degree or equivalent work experience. 2) Have five years of cumulative paid full-time work experience in two or more of the eight domains of the CISSP Common Body of Knowledge (CBK) 3) Pass the CISSP exam
What are the benefits of being a CISSP?
The CISSP certification is a valuable asset for information security professionals. It can help you advance your career, earn a higher salary, and gain access to more job opportunities. The CISSP certification also demonstrates to employers that you have the knowledge and skills to effectively protect an organisation's information assets.