CISSP - Certified Information Systems Security Professional Certification Prep
Course CISSP - Certified Information Systems Security Professional Certification Prep - (IT-9023-F25)
Portfolio Technology
Cost $ 2,465.00 Per Participant
Prerequisite(s) None
Credits CEU:3
Modality Live Webinar
Classroom
Address
Instructor(s) Instructor TBD
Class Description
The ISC2 CISSP training course prepares security professionals to protect information assets and stay updated with evolving information system security practices.
What's Included in this CISSP Training:
- 5 days instructor-led training
- ISC2 Official CISSP e-Book
- ISC2 Official CISSP Assessments
- Quizzes after each chapter
- ISC2 Official Authorized CISSP Instructor
- ISC2 Official CISSP Certificate of Completion
- ISC2 Official CISSP Exam Voucher
- Access the recordings of your class sessions for 90 days
Course Objectives:
- Apply fundamental concepts and methods related to the fields of information technology and security.
- Align overall organizational operational goals with security functions and implementations.
- Determine how to protect assets of the organization as they go through their lifecycle.
- Leverage the concepts, principles, structures, and standards used to design, implement, monitor, and secure operating systems, equipment, networks, applications, and those controls used to enforce various levels of confidentiality, integrity, and availability.
- Apply security design principles to select appropriate mitigations for vulnerabilities present in common information system types and architectures.
- Explain the importance of cryptography and the security services it can provide in today’s digital and information age.
- Evaluate physical security elements relative to information security needs.
- Evaluate the elements that comprise communication and network security relative to information security needs.
- Leverage the concepts and architecture that define the associated technology and implementation systems and protocols at Open Systems Interconnection (OSI) model layers 1–7 to meet information security needs.
- Determine appropriate access control models to meet business security requirements.
- Apply physical and logical access controls to meet information security needs.
- Differentiate between primary methods for designing and validating test and audit strategies that support information security requirements.
- Apply appropriate security controls and countermeasures to optimize an organization’s operational function and capacity.
- Assess information systems risks to an organization’s operational endeavors.
- Determine appropriate controls to mitigate specific threats and vulnerabilities.
- Apply information systems security concepts to mitigate the risk of software and systems vulnerabilities throughout the systems’ lifecycles
Target Audiences:
- Security Administrator
- Security Engineer
Prerequisites:
- You must have a minimum of five years of direct full-time security work experience in two or more of the 8 domains of the ISC2 CISSP CBK Or four years of direct full-time security work experience in two or more of the 8 domains.
Schedule(s)
| Day | Day Type | Date | Start Time | End Time | Break Time | Contact Hours | Modality | Location |
|---|---|---|---|---|---|---|---|---|
| 1 | Full | 1/26/2026 | 10:00 AM | 6:00 PM | 8 | Live Webinar | Citywide Training Center | |
| 2 | Full | 1/27/2026 | 10:00 AM | 6:00 PM | 8 | Live Webinar | Citywide Training Center | |
| 3 | Full | 1/28/2026 | 10:00 AM | 6:00 PM | 8 | Live Webinar | Citywide Training Center | |
| 4 | Full | 1/29/2026 | 10:00 AM | 6:00 PM | 8 | Live Webinar | Citywide Training Center | |
| 5 | Full | 1/30/2026 | 10:00 AM | 6:00 PM | 8 | Live Webinar | Citywide Training Center |