CISSP: Certified Information Systems Security Professional


Duration: 5 Days
CPE Credits: 35
Course Number: SEC-308
CISSP Training LOGO for (ISC)² Certification Training - Intrinsec

The following training program is an official CISSP certification prep course offered to you by Intrinsec Security – an authorized (ISC)² training partner.

CISSP Training Information
Course Overview

Authorized CISSP training is often considered as a leading choice for IT personnel interested in information security training. Intrinsec’s CISSP certification prep course will review eight of the most relevant information security domains, all of which deliver a wealth of current information on the Common Body of Knowledge (CBK) for the CISSP exam.

Intrinsec is an official training provider of (ISC)². This partnership means everything you receive from this class, from the authorized instructor to the official (ISC)² course material, is always up-to-date and considered the best available.

Aside from a reserved seat in an upcoming CISSP training seminar, you are also provided with a number of helpful CISSP exam resources. For starters, you will only receive official (ISC)² courseware. This guarantees the content you review is always the most current version and was developed by (ISC)². Additionally, you also receive a number of study tools. These resources include practice tests, flashcards, and a CISSP student handbook. All things considered, Intrinsec’s CISSP training program is a great resource for those who are interested in successfully preparing for the CISSP certification exam or simply refreshing their knowledge on various leadership and operational domains in information security.

Your Registration Includes
  • 5 Days of Official CISSP Training from an Authorized (ISC)² Instructor
  • Official (ISC)² CISSP Training Courseware
  • Official (ISC)² CISSP Student Guide
  • Official (ISC)² CISSP Training Flashcards
  • Official (ISC)² CISSP Practice Exam (+100 questions)
  • 60 Days of OnDemand Access to the Recordings of your CISSP Training (Video & Audio)
    • NOTE: for ‘Live Online’ (virtual) training sessions only.

*A CISSP certification exam voucher is available for an additional fee ($699 USD)*

What You Will Learn

Intrinsec’s official CISSP training course reviews the eight CISSP certification domains featured in the (ISC)² Common Body of Knowledge (CBK). Reviewing the CBK will help students successfully prepare for the CISSP exam while also develop their overall competencies in information security.

Additional information on what you can expect to learn while reviewing each domain is found below.

  • Domain 1: Security and Risk Management
  • Domain 2: Asset Security
  • Domain 3: Security Engineering
  • Domain 4: Communications and Network Security
  • Domain 5: Identity and Access Management
  • Domain 6: Security Assessment and Testing
  • Domain 7: Security Operations
  • Domain 8: Software Development Security

Domain 1: Security and Risk Management

The first domain reviewed in this official CISSP training program covers a broad spectrum of general information security and risk management topics. This domain will begin by reviewing the fundamental security principles of confidentiality, availability and integrity upon which all information security functions are based. Additionally, this domain will also build upon these concepts in the areas of security governance and compliance.

CISSP Exam Objectives

  • Confidentiality, Integrity and Availability Concepts
  • Security Governance Principles
  • Compliance
  • Legal and Regulatory Issues
  • Professional Ethics
  • Security Policies, Standards, Procedures and Guidelines

Domain 2: Asset Security

Asset Security is the second domain reviewed in this (ISC)² authorized training seminar for CISSP. In it, students cover the collection, handling and protection of information throughout its lifecycle.

CISSP Exam Objectives

  • Information and Asset Classification
  • Ownership (ex. Data Owners, System Owners)
  • Protect Privacy
  • Appropriate Retention
  • Data Security Controls
  • Handling Requirements (ex. Markings, Labels, Storage)

Domain 3: Security Engineering

Security Engineering is the third CISSP domain. The information students review focuses on the implementation and management of security engineering processes by using secure design principles.

CISSP Exam Objectives

  • Engineering Processes Using Secure Design Principles
  • Fundamental Concepts of Security Models
  • Security Evaluation Models
  • Security Capabilities of Information Systems
  • Security Architectures, Designs, and Solution Elements Vulnerabilities
  • Web-Based Systems Vulnerabilities
  • Mobile Systems Vulnerabilities
  • Embedded Devices and Cyber-Physical Systems Vulnerabilities
  • Cryptography
  • Site and Facility Design Secure Principles
  • Physical Security (Design and Implement)

Domain 4: Communications and Network Security

Domain 4 prepares students for the CISSP certification exam by focusing on the network architecture, transmission methods, transport protocols, control devices, and the security measures used to maintain the confidentiality, integrity and availability of information transmitted over both private and public communication networks.

CISSP Exam Objectives

  • Secure Network Architecture Designs (ex. IP & Non-IP Protocols, Segmentation)
  • Secure Network components
  • Secure Communication Channels
  • Network Attacks

Domain 5: Identity and Access Management

The fifth domain students review in our CISSP training is called “Identity and Access Management”. This domain will cover the identification and authorization of users, systems and services.

CISSP Exam Objectives

  • Physical and Logical Assets Control
  • Identification and Authentication of People and Devices
  • Identity as a Service
  • Third-Party Identity Services (ex. On-Premise)
  • Access Control Attacks
  • Identity and Access Provisioning Lifecycle (ex. Provisioning Review)

Domain 6: Security Assessment and Testing

The Security Assessment and Testing domain focuses on the evaluation of information assets and associated infrastructure using various tools and techniques for the purposes of identifying and mitigating risk due to architectural issues, design flaws, configuration errors, hardware and software vulnerabilities, coding errors, and any other weaknesses that may affect an information systems ability to deliver its intended functionality in a secure manner. Additionally, students will also review the continuous validation of the application of organizational information security plans, policies, processes and procedures.

CISSP Exam Objectives

  • Assessment and Test Strategies
  • Security Control Testing
  • Security Process Data (ex. Management and Operational Controls)
  • Test Outputs (ex. Automated, Manual)
  • Security Architectures Vulnerabilities

Domain 7: Security Operations

Domain 7, “Security Operations”, covers a broad range of topics involving the application of information security concepts and best practices to the operation of enterprises computing systems. This domain is practical in nature and highlights the tasks and situations that information security professionals are expected to perform or are presented with daily. This domain also reviews the areas where security professionals spend most of their time, making domain 7 the largest in terms of individual topics on the CISSP certification exam.

CISSP Exam Objectives

  • Investigations Support and Requirements
  • Logging and Monitoring Activities
  • Provisioning of Resources
  • Foundational Security Operations Concepts
  • Resource Protection Techniques
  • Incident Management
  • Preventative Measures
  • Patch and Vulnerability Management
  • Change Management Processes
  • Recovery Strategies
  • Disaster Recovery Processes and Plans
  • Business Continuity Planning and Exercises
  • Physical Security
  • Personnel Safety Concerns

Domain 8: Software Development Security

The last domain in this official CISSP training seminar is “Software Development Security”. It covers the application of security concepts and best practices to production and development software environments.

CISSP Exam Objectives

  • Security in the Software Development Lifecycle
  • Development Environments Security Controls
  • Software Security Effectiveness
  • Acquired Software Security Impact

The CISSP training program, much like the certification itself, is intended for professionals who are involved in designing, developing and managing the overall security posture of an organization; from cybersecurity strategy to hands-on implementation. Some example job functions may include, but are not limited to:


  • Security Consultant
  • Security Analyst
  • Security Professionals
  • Security Manager
  • Security Auditor
  • Security Architect
  • IT Director/Manager
  • Director of Security
  • Network Architect
  • Security Systems Engineer
  • Chief Information Security Officer
  • IT professionals interested in obtaining the CISSP credential

Any questions?

Read our Frequently Asked Questions page or simply send your questions to us directly via our Contact Us page or our Live Chat.


Sep 10 - 14, 2018 8:00am - 5:00pm ET Live Online USD $2,795.00
Aug 6 - 10, 2018 8:00am - 5:00pm PT Live Online USD $2,795.00
Jul 16 - 20, 2018 8:00am - 5:00pm ET Live Online USD $2,795.00
Sep 10 - 14, 2018 8:00am - 5:00pm ET Toronto, ON USD $2,945.00
Jul 30 - Aug 3, 2018 8:00am - 5:00pm CT Dallas, TX USD $2,945.00

Request Group Training