Certified Information Systems Security Professional (CISSP 2021)

Course Overview

Certified Information Systems Security Professional (CISSP) is regarded as one of the most valuable certifications for IT security professionals – and companies. There’s a good explanation for it. The CISSP certification not only verifies that you have the abilities to create, execute, and manage your company’s cybersecurity initiatives. The CISSP also verifies that you have the necessary experience. For all of its certifications, (ISC)2 maintains a strict qualifying system that includes verifiable work experience and sponsorship. For the CISSP, you must have a minimum of five (5) years of paid job experience in two or more of the CISSP CBK’s eight domains. 

The CISSP course is built on teaching the eight-core domains of information security, which give candidates all of the knowledge they need to get a thorough grasp of the subject and pass the CISSP test. This (ISC)2 training may be utilised for CISSP test preparation, onboarding new security professionals, individual or team training programmes, or as an (ISC)2 reference resource for anybody who manages an IT team. This study guide will help you pass the famous Certified Information Systems Security Professional (CISSP) certification exam 

Security and Risk Management

Asset Security

Security Architecture and Engineering

Communication and Network Security

Identity and Access Management (IAM)

Security Assessment and Testing

Security Operations

Software Development Security

Courses Outline


Understand Adhere, Promote Professional Ethics

Understand And Apply Security Concepts (CIA)

Evaluate And Apply Security Governance Principles

Determine Compliance And Other Requirements

Legal, Regulatory Issues For Information Security

Spotlight On The GDPR

Understand Requirements For Investigation Types

Security Policy, Standards, Procedures, Guidelines

Identify, Analyze, Prioritize BC Requirements

Personnel Security Policies And Procedures

Understand, Apply Risk Management Concepts

Spotlight On The Risk Management Framework

Threat Modeling Concepts And Methodologies

Apply Supply Chain Risk Management (SCRM) Concepts

Security Awareness, Education And Training Program

Security And Risk Management Key Points

Identify And Classify Information, Assets

Establish Information, Asset Handling Requirements

Provision Resources Securely

Manage Data Lifecycle

Ensure Appropriate Asset Retention

Data Security Controls And Compliance Requirements

Assets Security – Key Points


Engineering Process Using Secure Design Principles

Fundamental Concepts Of Security Models

Controls Based Upon System Security Requirements

Security Capabilities Of Information Systems–Vocab

Security Capabilities Of Information Systems – CPU

Security Capabilities Of Info Systems – Memory

Assess And Mitigate Vulnerabilities – The Basics

Assess And Mitigate Vulnerabilities – The Rest

Spotlight On Cryptographic Solutions – Symmetric

Spotlight On Cryptographic Solutions – Asymmetric

Spotlight On Cryptographic Solutions – PKI & Certs

Spotlight On Cryptographic Solutions – Hashing

Cryptographic Solutions – Digital Signing

Understand Methods Of Cryptanalytic Attacks

Security Principles For Site And Facility Design

Design Site And Facility Security Controls

Spotlight On Fire Control

Security Architecture & Engineering – Key Points

Spotlight On The OSI Model

Spotlight On Internet Protocol (IP) Networking

Spotlight On IPsec

Spotlight On Secure Protocols

Implications Of Converged & Multilayer Protocols

Spotlight On Micro-Segmentation

Wireless, Cellular & Content Distribution Networks

Secure Network Components

Implement secure communication channels

Communications & Network Security – Key Points

Control Physical And Logical Access To Assets

Manage Identification And Authentication

Federated Identity With A Third-Party Service

Implement, Manage Auth Mechanisms – Vocab

Implement, Manage Auth Mechanisms – Models

Manage the identity, access provisioning lifecycle

Implement Authentication Systems

Spotlight On Kerberos

Spotlight On Federated Identity Management (FIM)

Identity Access Management (IAM) – Key Points

Assessment, Test, & Security Audit Strategies

Spotlight On System And Org Controls Reports (SOC)

Conduct Security Control Testing – The Basics

Conduct Security Control Testing – The Rest

Collect Security Process Data

Analyze Test Output And Generate Reports

Security Assessment And Testing – Key Points

Understand And Comply With Investigations

Conduct Logging & Monitoring Activities

Conduct logging & monitoring activities – threat

Perform Configuration Management (CM)

Apply Foundational Security Operations Concepts

Apply resource protection

Conduct Incident Management

Detective & Preventative Measures

Patch & Vulnerability Management

Understand & Participate In Change Management

Implement Recovery Strategies

Implement Disaster Recovery (DR) Processes

Test Disaster Recovery Plans (DRP)

Business Continuity (BC) Planning & Exercises

Implement And Manage Physical Security

Address Personnel Safety And Security Concerns

Security Operations – Key Points

Spotlight On The Software Development Life Cycle

Certs & Accreditation Verification & Validation

Security In The SDLC – Methodologies

Security In The SDLC – Maturity Models

Security In The SDLC – Odds & Ends

Apply Controls In Development Ecosystems – Basics

Apply Controls In Development Ecosystems – Rest

Spotlight On The OWASP TOP 10

Assess The Effectiveness Of Software Security

Assess Security Impact Of Acquired Software

Define, Apply Secure Coding Guidelines, Standards

Spotlight On Databases

Software Development Security – Key Points

What Is The CISSP Toolbox?

Who Are You?

What Does Your Study Plan Look Like?

What is your timeline?

₦ 40,000

  • Learn at your own pace with 24/7 access
  • Duration: 1 year
× How can we help you?