(0)
1-855-732-3348
+
Introducing our new Concierge Service for all programs

(ISC)2 CISSP | Certified Information Systems Security Professional

Course Image

CISSP covers the required information to effectively design, engineer, and manage the overall security posture of an organization.

Duration: 5 Days CPE Credits: 40 Course Number: SEC-308

Download Brochure (.pdf)
Request Group Training

Schedule + Register

About this Course

Authorized CISSP training is often considered a leading choice for IT personnel interested in information security training. Intrinsec’s CISSP certification prep course will review eight of the most relevant information security domains, all of which deliver a wealth of current information on the Common Body of Knowledge (CBK) for the CISSP exam.

Register now

Course Overview+ Show

Intrinsec is an official training provider of (ISC)2. This partnership means everything you receive from this class, from the authorized instructor to the official (ISC)2 course material, is always up-to-date and considered the best available.

Aside from a reserved seat in an upcoming CISSP training seminar, you are also provided with a number of helpful CISSP exam resources. For starters, you will only receive official (ISC)2 courseware. This guarantees the content you review is always the most current version and was developed by (ISC)2. Additionally, you also receive a number of study tools. These resources include practice tests, flashcards, and a CISSP student handbook. All things considered, Intrinsec’s CISSP training program is a great resource for those who are interested in successfully preparing for the CISSP certification exam or simply refreshing their knowledge on various leadership and operational domains in information security.


What's Included+ Show

  • 5 Days of Official CISSP Training from an Authorized (ISC)2 Instructor
  • Official (ISC)2 CISSP Training Courseware
  • Official (ISC)2 CISSP Student Guide
  • Official (ISC)2 CISSP Training Flashcards
  • Official (ISC)2 CISSP Practice Exam (+100 Questions)
  • 60 Days of OnDemand Access to the Recordings of your CISSP Training (Video & Audio)
    • NOTE: for ‘Live Online’ (Virtual) training sessions only.

*A CISSP certification exam voucher is available for an additional fee ($749 USD)*


What You'll Learn+ Show

Intrinsec’s official CISSP training course reviews the eight CISSP certification domains featured in the (ISC)2 Common Body of Knowledge (CBK). Reviewing the CBK will help students successfully prepare for the CISSP exam while also developing their overall competencies in information security.

Domain 1: Security and Risk Management

  • Understand, adhere to, and promote professional ethics
  • Understand and apply security concepts
  • Evaluate and apply security governance principles
  • Determine compliance and other requirements
  • Understand legal and regulatory issues that pertain to information security in a holistic context
  • Understand requirements for investigation types
  • Develop, document, and implement security policy, standards, procedures, and guidelines
  • Identify, analyze, and prioritize Business Continuity (BC) requirements
  • Contribute to and enforce personnel security policies and procedures
  • Understand and apply risk management concepts
  • Understand and apply threat modelling concepts and methodologies
  • Apply Supply Chain Risk Management (SCRM) concepts
  • Establish and maintain a security awareness, education, and training program

Domain 2: Asset Security

  • Identify and classify information and assets
  • Establish information and asset handling requirements
  • Provision resources securely
  • Manage data lifecycle
  • Ensure appropriate asset retention
  • Determine data security controls and compliance requirements

Domain 3: Security Architecture and Engineering

  • Research, implement and manage engineering processes using secure design principles
  • Understand the fundamental concepts of security models
  • Select controls based upon systems security requirements
  • Understand security capabilities of Information Systems (IS)
  • Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements
  • Select and determine cryptographic solutions
  • Understand methods of cryptanalytic attacks
  • Apply security principles to site and facility design
  • Design site and facility security controls

Domain 4: Communication and Network Security

  • Assess and implement secure design principles in network architectures
  • Secure network components
  • Implement secure communication channels according to design

Domain 5: Identity and Access Management (IAM)

  • Control physical and logical access to assets
  • Manage identification and authentication of people, devices, and services
  • Federated identity with a third-party service
  • Implement and manage authorization mechanisms
  • Manage the identity and access provisioning lifecycle
  • Implement authentication systems

Domain 6: Security Assessment and Testing

  • Design and validate assessment, test, and audit strategies
  • Conduct security control testing
  • Collect security processes data
  • Analyze test output and generate report
  • Conduct or facilitate security audits

Domain 7: Security Operations

  • Understand and comply with investigations
  • Conduct logging and monitoring activities
  • Perform Configuration Management (CM)
  • Apply foundational security operations and concepts
  • Apply resource protection
  • Conduct incident management
  • Operate and maintain detective and preventative measures
  • Implement and support patch and vulnerability management
  • Understand and participate in change management processes
  • Implement recovery strategies
  • Implement Disaster Recovery (DR) processes
  • Test Disaster Recovery Plans (DRP)
  • Participate in Business Continuity (BC) planning and exercises
  • Implement and manage physical security
  • Address personnel safety and security concerns

Domain 8: Software Development Security

  • Understand and integrate security in the Software Development Life Cycle (SDLC)
  • Identify and apply security controls in software development ecosystems
  • Assess the effectiveness of software security
  • Assess security impact of acquired software
  • Define and apply secure coding guidelines and standards

Concierge Service+ Show

Intrinsec’s Concierge Service focuses on you, providing a personalized human experience with one of our concierge representatives to ensure that you have a perfect experience from day one and beyond.

Not only will your representative reach out to you when you sign up, providing you with all the information you need, but they will also be on stand-by for any and all questions you may have.

After you have completed your class your concierge representative can provide you with relevant recommendations for upcoming events, discounts on training, and suggestions to help further your career.


Audience+ Show

The CISSP training program, much like the certification itself, is intended for professionals who are involved in designing, developing and managing the overall security posture of an organization; from cybersecurity strategy to hands-on implementation. Some example job functions may include, but are not limited to:

  • Security Consultant
  • Security Analyst
  • Security Professionals
  • Security Manager
  • Security Auditor
  • Security Architect
  • IT Director/Manager
  • Director of Security
  • Network Architect
  • Security Systems Engineer
  • Chief Information Security Officer
  • IT professionals interested in obtaining the CISSP credential

Common Questions+ Show

What do I need to get my CISSP certification?

To qualify for your CISSP certification you will need a minimum of five years of cumulative paid work experience in two or more of the eight domains within the CISSP Common Body of Knowledge (CBK).

What if I don’t yet have that experience?

Not to worry! If you don’t yet have that work experience, as you may become an Associate of (ISC)2 by passing the CISSP exam. From there, you can accumulate work experience to get your full fledged CISSP certification!

What counts towards paid work experience?

Paid work experience can come from full-time, part-time or even internships (internships can be paid or unpaid). Each of these categories are defined as:

  • Full-Time Experience: A minimum of 35 hours/week, this experience is accursed monthly, meaning 4 weeks of 35 hours or more equals one month of experience.
  • Part-Time Experience: Between 20 and 34 hours/week, with the hours logged converting to full-time experience as such:
    • 1040 hours of part-time = 6 months of full-time experience
    • 2080 hours of part-time = 12 months of full-time experience
  • Internships: Internship experience can be paid or unpaid to qualify. Documentation on company/organization letterhead confirming your position is required.

Is there anything else I need to get my CISSP certification?

The last step to getting CISSP certified is to get endorsed by others, this simply ensures that your claimed professional experience is true and that you are in good standing in the cybersecurity industry.

Have more questions? Read our Frequently Asked Questions page or simply send your questions to us directly via our Contact Us page or our Live Chat and we will be more than happy to assist with any and all questions!


Upcoming Schedule

Dec 6 - 10, 2021 | Live Online

9:00am - 5:00pm EST

TBD

USD $2,425.00

Questions? Chat with us or get in touch.

Course Categories:
CCSK | CCSP: The Industry’s Leading Cloud Security Certifications - learn more

Upgrade your skills. Secure your potential.

Our experts provide hands-on and on-demand training that helps IT and data security professionals meet today's cyber security challenges and prepares you for a successful future.

Training Schedule Contact Us