CISSP Certification Preparation Training Course
> Certification Preparation Training Course
> Available in venues throughout Wales
> Classroom and Virtual courses available
> Onsite and customised courses available
> ReAct and Access funding accepted
Learn from home - we offer this course as a live instructor-led virtual session delivered by the same expert trainers as our classroom courses
Award Winning
High quality training courses
"Excellent"
Price Promise
We'll match like-for-like prices*
Course Information
CISSP (Certified Information Systems Security Professional) draws from a comprehensive, up-to-date, global common body of knowledge that ensures security leaders have a deep knowledge and understanding of new threats, technologies, regulations, standards and practices.
This CISSP exam preparation course deals with the security concepts to be mastered in order to obtain CISSP certification. In an accelerated but rigorous manner, this training prepares the student for the CISSP examination, covering the entirety of the Common Body of Knowledge about security (CBK) as defined by the ISC2®.
Module 1. Security and Risk Management
Aligning security and risk to organisational objectives
- Evaluate and apply security governance principles
- Implement policies, standards and procedures
- Applying compliance
Applying risk management concepts
- Assessing threats and vulnerabilities
- Performing risk analysis and control
- Defining qualitative and quantitative analysis
Preserving the business
- Adhering to Business Continuity Management Code of Practise and Specifications
- Performing a business impact analysis
Investigating legal measures and techniques
- Reviewing intellectual property, liability and law, and compliance
- Differentiating traditional computer crime
- Establish information and asset handling requirements
Module 2. Asset Security
Examining security models and frameworks
- The Information Security Triad and multi-level models
- Investigating industry standards: ISO 27001/27002
- Evaluating security model fundamental concepts
Exploring system and component security concepts
- Certification and accreditation criteria and models
- Reviewing mobile system/cloud/IoT vulnerabilities
Protecting information by applying cryptography
- Detailing symmetric and asymmetric encryption systems
- Ensuring message integrity through hashing
- Uncovering threats to cryptographic systems
Safeguarding physical resources
- Designing environments to resist hostile acts and threats
- Designing environments to resist hostile acts and threats
Module 3. Communication & Network Security
Defining a secure network architecture
- TCP/IP and other protocol models
- Protecting from network attacks
- Reviewing secure network components and communication channels
Examining secure networks and components
- Identifying wired and wireless technologies
- Implementing firewalls, secure communications, proxies, and tunnels
Module 4. Identity & Access Management
Controlling access to protect assets
- Defining administrative, technical and physical controls
- Implementing centralised and decentralised approaches
- Investigating biometric and multi-factor authentication
- Identifying common threats
- Manage the identity and access provisioning lifecyle
Module 6. Security Assessment & Testing
Designing and conducting security assessment strategies
- Leveraging the role of testing and auditing to analyse the effectiveness of security controls
- Differentiating detection and protection systems
Conducting logging and monitoring activities
- Distinguishing between the roles of internal and external audits
- Conduct or facilitate security audits
Module 7. Security Operations
Maintaining operational resilience
- Managing security services effectively
- Leveraging and supporting investigations and incident response
- Differentiating detection and protection systems
- Securely provisioning resources
Developing a recovery strategy
- Designing a disaster recovery plan
- Implementing test and maintenance processes
- Provisioning of resources
Module 8. Software Security Development
Securing the software development life cycle
- Applying software development methods and security controls
- Addressing database security concepts and issues
- Define and apply secure coding guidelines and standards
- Reviewing software security effectiveness and security impact
CISSP is ideal for experienced security practitioners, managers and executives interested in proving their knowledge across a wide array of security practices and principles, including those in the following positions:
- Chief Information Security Officer
- Chief Information Officer
- Director of Security
- IT Director/Manager
- Security Systems Engineer
- Security Analyst
- Security Manager
- Security Auditor
- Security Architect
- Security Consultant
- Network Architect
Please note CISSP candidates must meet specific requirements, as established by ISC² — see: ISC². Those without the required experience can take the exam to become an Associate of (ISC)² while working toward the experience needed for full certification
This course includes:
- Training from a certified CISSP trainer
- CISSP courseware and study materials
- Refreshments
Course Key Points
Duration: 5 days
Accredited: Available
Exam(s): Not Included
Practice Exam(s): Not Included
Type: Available as Classroom, Virtual Live and In-house
Dates and Prices
Can’t find the course dates or training location you are looking for? We’ll try our best to accommodate.
Enter your training requirements below and a member of our team will be in contact with you to discuss them further.
Save time and money by letting our expert trainers come to your offices.
Enter your onsite training requirements below and a member of our team will be in contact with you to discuss them further.
Looking to book 4 or more delegates onto a single course?
Enter your group training requirements below and a member of our team will be in contact with you to discuss them further.
Learn new skills from our expert instructors in your own time and at your own pace.
Unfortunately this courses does not currently have an online self-paced learning option.
Can't find the course dates, location or delivery type you are looking for? Fill out the Request Dates form above and we'll try our best to accommodate.
Classroom Courses
Interact in person with our expert instructors in venues throughout the UK
Virtual-Live Courses
Participate in live instructor-led sessions from the comfort of your home or office
Online Self-Paced
Learn new skills from our expert instructors, in your own time and at your own pace
Please note all published prices are exclusive of VAT for consumers who pay no VAT or can recover VAT. The current rate of VAT is 20% for consumers that are required to pay VAT. All public course bookings are subject to availability and minimum course numbers.
Why Choose NILC For Your CISSP Training?
Experienced Trainers
Highly skilled trainers with real world user experience
Multiple Location
Courses available at our venues or your offices
Highly Rated
We are highly rated with 5 stars from Trustpilot
Learn From Home
Live instructor-led virtual courses available
Business Experience
Industry expert trainers with over 10 years experience
No Hidden Charges
Course materials and equipment are all provided
Bespoke Options
We can offer custom training tailored to your requirements
Post Course Support
We’ll be on hand to help and answer any questions
Other Related Courses
FOLLOW US
Newport Office: 50 Commercial Road, Newport, Gwent, NP20 2PE
Cardiff Office: 13a Cathedral Road, Cardiff, CF11 9HA
Bridgend Office: Floor 1, 5 Five Bells Road, Bridgend, CF31 3HW
All quoted prices are exclusive of VAT for consumers who pay no VAT or can recover VAT. The current rate of VAT is 20% for consumers that are required to pay VAT.
All course bookings are subject to availability.