Course Outline
Security and Risk Management
- Foundations of confidentiality, integrity, and availability (CIA)
- Security governance, policies, and frameworks (ISO 27001, NIST CSF)
- Risk analysis, assessment, and mitigation
- Business impact analysis, security awareness, and training
- Legal, regulations, compliance, and privacy issues (GDPR, HIPAA, local laws)
Asset Security
- Information classification, ownership, and protection
- Data handling (retention, deletion, backup, transfer)
- Privacy protection and data lifecycle management
- Secure use of assets and media control
Security Engineering
- Secure system and architecture design principles
- Cryptography: symmetric, asymmetric, hashing, PKI, key management
- Physical security considerations and hardware security modules (HSMs)
- Secure virtualization, cloud-native security patterns, and secure API usage
Communications and Network Security
- Network models, protocols, and secure communications (TLS, VPN, IPSec)
- Perimeter defenses, segmentation, firewalls, IDS/IPS
- Wireless security, remote access, and zero-trust network architectures
- Secure design of network architectures in cloud and hybrid environments
Identity and Access Management (IAM)
- Control access: identification, authentication, authorization, and accountability
- Identity providers, federation, SSO, and access federation in cloud
- Privileged access management (PAM) and role-based access control (RBAC)
- Lifecycle of identities: provisioning, deprovisioning, and entitlement review
Security Assessment and Testing
- Security control testing: SAST, DAST, penetration testing, vulnerability scanning
- Audit strategies and review frameworks
- Log management, monitoring, and continuous assessment
- Red teaming, blue teaming, and adversary simulation techniques
Security Operations
- Incident response planning, handling, and forensics
- Security operations center (SOC) design, monitoring, and threat intelligence integration
- Patching, vulnerability management, and configuration management
- Business continuity, disaster recovery, and resilience planning
Software Development Security
- Secure software lifecycle (SDLC) and devsecops practices
- Common vulnerabilities (beyond OWASP Top 10) and mitigation patterns
- Code review, static/dynamic analysis, and secure frameworks
- Supply chain risks, dependency management, and runtime protection
Exam Strategy, Practice and Wrap-Up
- CISSP exam format, question strategy, and time management
- Practice exams and domain-specific quizzes
- Gap analysis and personal study plans
- Recommended resources, communities, and continuous learning paths
Summary and Next Steps
Requirements
- At least 5 years of cumulative, paid work experience in two or more of the (ISC)² CISSP domains or equivalent experience
- Foundational knowledge of information security concepts, networks, and software systems
- Familiarity with risk management, cryptography, and IT operations
Audience
- Information security professionals preparing for the CISSP exam
- Security architects, managers, and consultants
- IT leaders, auditors, and governance professionals
Testimonials (7)
Being approachable and pushing us into interaction
Daniel - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CISSP - Certified Information Systems Security Professional
the topic was interesting itself and we had opportunity to discuss it with different perspectives.
Marcin - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CISSP - Certified Information Systems Security Professional
trainer competence
Evghenii - Arctic Stream
Course - CISSP - Certified Information Systems Security Professional
Good material organization and understandable instructor's English.
Ion Temciuc - Arctic Stream
Course - CISSP - Certified Information Systems Security Professional
Good material organization and understandable instructor's English.
Hanny - Arctic Stream
Course - CISSP - Certified Information Systems Security Professional
His knowledge, the way he explains and his kindness
Marcelo Martinez - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CISSP - Certified Information Systems Security Professional
I liked mix of theory and practical case example. Very good overview of each topic then going through slides.