Course Outline

Security and Risk Management

  • Foundations of confidentiality, integrity, and availability (CIA)
  • Security governance, policies, and frameworks (ISO 27001, NIST CSF)
  • Risk analysis, assessment, and mitigation
  • Business impact analysis, security awareness, and training
  • Legal, regulations, compliance, and privacy issues (GDPR, HIPAA, local laws)

Asset Security

  • Information classification, ownership, and protection
  • Data handling (retention, deletion, backup, transfer)
  • Privacy protection and data lifecycle management
  • Secure use of assets and media control

Security Engineering

  • Secure system and architecture design principles
  • Cryptography: symmetric, asymmetric, hashing, PKI, key management
  • Physical security considerations and hardware security modules (HSMs)
  • Secure virtualization, cloud-native security patterns, and secure API usage

Communications and Network Security

  • Network models, protocols, and secure communications (TLS, VPN, IPSec)
  • Perimeter defenses, segmentation, firewalls, IDS/IPS
  • Wireless security, remote access, and zero-trust network architectures
  • Secure design of network architectures in cloud and hybrid environments

Identity and Access Management (IAM)

  • Control access: identification, authentication, authorization, and accountability
  • Identity providers, federation, SSO, and access federation in cloud
  • Privileged access management (PAM) and role-based access control (RBAC)
  • Lifecycle of identities: provisioning, deprovisioning, and entitlement review

Security Assessment and Testing

  • Security control testing: SAST, DAST, penetration testing, vulnerability scanning
  • Audit strategies and review frameworks
  • Log management, monitoring, and continuous assessment
  • Red teaming, blue teaming, and adversary simulation techniques

Security Operations

  • Incident response planning, handling, and forensics
  • Security operations center (SOC) design, monitoring, and threat intelligence integration
  • Patching, vulnerability management, and configuration management
  • Business continuity, disaster recovery, and resilience planning

Software Development Security

  • Secure software lifecycle (SDLC) and devsecops practices
  • Common vulnerabilities (beyond OWASP Top 10) and mitigation patterns
  • Code review, static/dynamic analysis, and secure frameworks
  • Supply chain risks, dependency management, and runtime protection

Exam Strategy, Practice and Wrap-Up

  • CISSP exam format, question strategy, and time management
  • Practice exams and domain-specific quizzes
  • Gap analysis and personal study plans
  • Recommended resources, communities, and continuous learning paths

Summary and Next Steps

Requirements

  • At least 5 years of cumulative, paid work experience in two or more of the (ISC)² CISSP domains or equivalent experience
  • Foundational knowledge of information security concepts, networks, and software systems
  • Familiarity with risk management, cryptography, and IT operations

Audience

  • Information security professionals preparing for the CISSP exam
  • Security architects, managers, and consultants
  • IT leaders, auditors, and governance professionals
 35 Hours

Number of participants


Price per participant

Testimonials (7)

Upcoming Courses

Related Categories