BECOME CISSP QUALIFIED
Training Overview
Great ready for seven days of immersive training delivered online to prepare you for CISSP qualification. Our team of expert instructors will guide you through the eight domains of the (ISC)² CISSP Common Body of Knowledge (CBK), ensuring comprehensive coverage of all aspects of information security. We provide you with the necessary tools and resources to effectively master this knowledge.
What you can expect:
Training overview: Our approach, recognized in the industry, encompasses all aspects of information security, including the development of security policies, risk management, and understanding technical security controls. We equip you with the tools and resources essential for mastering this knowledge effectively.
Exam Pass Guarantee: We are dedicated to your success. Our training program equips you with the necessary skills and best practices to pass the CISSP exam on your first attempt. In the event that you do not pass the exam on your initial try, we offer a complimentary second attempt to ensure your success.
Key facts
Method
Delivered via online classroom
Duration
7 Days
Prerequisite
5+ years experience
Average Salary
Award Winning Training You Can Trust

Request a brochure
Request a Call
What’s Included
Pre-study learning path
CISSP exam
Exam pass guarantee
Satisfaction guarantee
90 days extended access to all learning materials, including class recordings
Unlimited practise attempts
Access to 1,400 additional course and labs for 90 days
CISSP Training Schedule
DAY ONE
Read More
Security & Risk Management
- Confidentiality, integrity and availability
- Security governance policies and their supporting counterparts
- Compliance
- Global information security
- Legal and regulatory policies
- Professional ethics
- Business continuity
- Personnel security
- Risk management
- Threat modelling
- Acquisition security
- Security awareness
DAY TWO
Read More
Asset Security
- Classify information
- Identify and document asset ownership
- Asset privacy concerns
- Asset retention policies
- Data security controls
- Handling requirements
Security Engineering
- Secure engineering processes
- Review security engineering models
- Security architecture
- Web-based vulnerabilities
- Mobile vulnerabilities
- Embedded device vulnerabilities
- Cryptography components and their relationships
- Site and facility design
- Physical security
DAY THREE
Read More
Communication and Network Security
- Network architecture
- Network components
- Communication channels
- Handling network attacks
Identity and Access Management
- Physical and logical access
- Authentication of people and devices
- Identity as service (cloud identity)
- Third-party identity
- Authorization mechanisms
- Access control attacks
- Provisioning life cycle
DAY FOUR
Read More
Security Assessment and Testing
- Validate assessment
- Security control
- Management and operational controls
- Analyse and report test outputs
- Internal and third party audits
- Security operations
- Handling investigations
- Investigation types
- Logging and monitoring
- Provisioning of resources
Security Operations
- Resource protection
- Incident management
- Preventative measures
- Patch and vulnerability management
- Change management
- Disaster recovery
- Business continuity
- Manage physical security
- Personnel safety concerns
DAY FIVE
Read More
Security Operations Continued
Software Development Security
- Software development life cycle
- Security for development environments
- Software security
- Purchased software risk
DAY SIX
Read More
A review of all eight domains
Practise exam in the afternoon
DAY SEVEN
Read More
CISSP examination
Our Commitment To You
With our CISSP bootcamp, we guarantee:
