+1 416-333-3717

Mon to Fri Open: 10am - 6pm

CISSP Training

$ 2,500 + HST

Duration: 39 hours (5 weekends)

Next Batch: July 1st, 2024

Want to know more ?
Categories Cyber Security
The CISSP (Certified Information Systems Security Professional) training program is designed to prepare cybersecurity professionals for advanced leadership roles in information security. Covering eight domains essential for effective security management—Security and Risk Management, Asset Security, Security Architecture and Engineering, Communication and Network Security, Identity and Access Management, Security Assessment and Testing, Security Operations, and Software Development Security—the CISSP certification ensures comprehensive knowledge and skills in protecting organizations from cyber threats. This intensive training includes real-world scenarios, hands-on exercises, and expert-led sessions to equip participants with the expertise needed to pass the CISSP exam and excel in the cybersecurity field.
Prerequisite
  • A minimum of five years of cumulative, paid, full-time work experience in two or more of the eight domains of the CISSP Common Body of Knowledge (CBK).
  • Alternatively, candidates can take the exam and become an Associate of (ISC)² until they acquire the necessary experience.
  • It is recommended to have a foundational understanding of information security principles and practices.
Total Duration: 39 Hours

What will you learn?

  • Data classification and ownership
  • Asset management
  • Information and asset handling requirements
  • Asset retention
  • Privacy protection
  • Security models and frameworks
  • System architecture security design principles
  • Security capabilities of information systems
  • Security engineering processes
  • Secure design principles
  • Secure network architecture design
  • Secure communication channels
  • Network components security
  • Network attacks and countermeasures
  • Secure protocols and services
  • Identity management and access provisioning
  • Authentication mechanisms
  • Authorization principles
  • Access control types
  • Identity and access provisioning lifecycle
  • Assessment and test strategies
  • Security control testing
  • Security process data
  • Test outputs and reports
  • Vulnerability assessment
  • Security operations concepts
  • Investigations support and requirements
  • Incident management
  • Disaster recovery planning
  • Business continuity planning and exercises
  • Software development methodologies and security
  • Secure coding guidelines and standards
  • Security controls in software development lifecycle
  • Security impact of acquired software
  • Database security considerations
$ 2,500