CISSP® Certified Information Systems Security Professional

Self-paced | Online | Optional Exam Voucher

CISSP is recognised worldwide as the gold standard for cyber security professionals.

This certification validates professionals expertise in Information Systems Security and ensures core competencies in cyber security.

Request Brochure

Vital Learning Edge offers the Self-paced ISC2 CISSP Certified Information Systems Security Professional training.The CISSP course is tailored to equip participants with a deep understanding of cybersecurity principles and practices. Recognised globally, this certification demonstrates proficiency in designing, implementing, and managing a best-in-class cybersecurity program.

 

Within the process, the course provides outstanding preparation for the official ISC2 CISSP Certified Information Systems Security Professional exam.

Book Now

Online Self-Paced

$1,550+ GST (180 days access)

AUD | Buy Now > NZD | Buy Now >

Looking for an online virtual instructor-led course?

Contact us for more information on how we can assist you!

Contact us >

Want to understand our delivery methods better?

Read more here on the difference between a virtual and face-to-face course.

Learning Outcomes

By the end of this course, participants will:

  • Apply fundamental concepts and methods related to the fields of information technology and security.
  • Align overall organisational operational goals with security functions and implementations.
  • Determine how to protect assets of the organization as they go through their lifecycle.
  • Leverage the concepts, principles, structures, and standards used to design, implement, monitor, and secure operating systems, equipment, networks, applications, and those controls used to enforce various levels of confidentiality, integrity, and availability.
  • Apply security design principles to select appropriate mitigations for vulnerabilities present in common information system types and architectures.
  • Explain the importance of cryptography and the security services it can provide in today’s digital and information age.
  • Evaluate physical security elements relative to information security needs.
  • Evaluate the elements that comprise communication and network security relative to information security needs.
  • Leverage the concepts and architecture that define the associated technology and implementation systems and protocols at Open Systems Interconnection (OSI) model layers 1–7 to meet information security needs.
  • Determine appropriate access control models to meet business security requirements.
  • Apply physical and logical access controls to meet information security needs.
  • Differentiate between primary methods for designing and validating test and audit strategies that support information security requirements.
  • Apply appropriate security controls and countermeasures to optimise an organisation’s operational function and capacity.
  • Assess information systems risks to an organisation’s operational endeavors.

 

When you attend a course with Vital Learning Edge you are guaranteed the following:

Knowledge Transfer

Vital Learning Edge trainers have been both working in the industry and training/sharing their knowledge for over 25 years. We only use trainers who are actively working in the field, certified and can deliver.

Practical Examples

Trainers and their real world experience make the difference! Our trainers are able to relay content and draw from their real-world application to help solidify your understanding in a practical way.

Exam Preparation

This course designed to best prepare you to successfully pass your exam. This self-paced offering via ISC2 includes official ISC2 courseware to ensure you have everything you need to succeed and gain certification.

Who Should Attend

The CISSP course focuses on the needs of professionals with five years of work experience in two or more domains of the CISSP CBK. Some common career paths and job titles of this certification include:

CISO Chief Information Security Officers

Security Consultants

IT Directors

IT Auditors

IT Architects

ISC2’s Pre-requisites for CISSP Certification

  • Candidates must have a minimum of five years cumulative paid work experience in two or more of the eight domains of the ISC2 CISSP Common Body of Knowledge (CBK).
  • Earning a four-year college degree or regional equivalent in Computer Science, Information Technology (IT) or related fields or an additional credential from the ISC2 approved list will satisfy one year of the required experience.

 

Associate of ISC2

A candidate who doesn’t have the required experience may become an Associate of ISC2 by successfully passing the CISSP examination. The Associate of ISC2 will then have six years to earn the five years of cumulative paid work experience in two or more of the eight domains of the ISC2 CISSP Common Body of Knowledge (CBK).

Course Content

The CISSP course is structured to follow the four 8 domains of the CISSP Common Body of Knowledge (CBK).

webinar

Security and Risk Management

  • Understanding security governance principles.
  • Legal, regulatory, and compliance considerations.
  • Risk management processes, including risk assessment and treatment.
  • Business continuity (BC) and disaster recovery (DR) planning.
  • Establishing and maintaining security policies, standards, procedures, and guidelines.
  • Ethics in information security.
  • Managing third-party risks and vendor management.
  • Security awareness, training, and education programs.

Asset Security

  • Data classification, ownership, and lifecycle management.
  • Retention policies and secure disposal methods.
  • Data privacy considerations and handling sensitive information.
  • Protecting data at rest, in transit, and in use.
  • Cryptographic techniques for data security.
  • Data backup and recovery strategies.
  • Access control techniques to secure assets.

Security Architecture and Engineering

  • Security models.
  • Principles of secure design and system architecture.
  • Hardware, software, and firmware security considerations.
  • Secure design for physical and logical facilities.
  • Cryptographic applications and security protocols.
  • Industrial control systems (ICS) and Internet of Things (IoT) security.
  • Understanding vulnerabilities in software and hardware.
  • Cloud security concepts and practices.

Communication and Network Security

  • Secure network architecture and design principles.
  • Network protocols, such as TCP/IP and secure communications.
  • Implementation of firewalls, VPNs, and intrusion detection/prevention systems.
  • Wireless network security protocols and challenges.
  • Network monitoring and traffic analysis techniques.
  • Securing voice over IP (VoIP) and unified communications.
  • Protecting against man-in-the-middle (MitM) and denial-of-service (DoS) attacks.
  • Layered network defense strategies.

Identity and Access Management (IAM)

  • Identity lifecycle and provisioning/deprovisioning processes.
  • Multi-factor authentication (MFA) and secure authentication mechanisms.
  • Role-based, attribute-based, and discretionary access controls.
  • Federated identity management and single sign-on (SSO) solutions.
  • Identity governance and monitoring user access.
  • Preventing privilege escalation and account misuse.
  • Managing directory services (e.g., LDAP, Active Directory).

Security Assessment and Testing

  • Vulnerability scanning and penetration testing techniques.
  • Conducting security audits and assessments.
  • Continuous security monitoring and reporting.
  • Internal and external audit processes for compliance.
  • Analyzing security testing results to identify risks.
  • Software testing for vulnerabilities and secure code practices.
  • Incident simulation and tabletop exercises.

Security Operations

  • Incident response planning and execution.
  • Digital forensics and evidence collection.
  • Managing security operations centers (SOC).
  • Patch management and vulnerability remediation processes.
  • Implementing and monitoring security information and event management (SIEM) systems.
  • Managing insider threats and privileged access abuse.
  • Business continuity and disaster recovery testing.
  • Secure disposal of hardware and data storage devices.

Software Development Security

  • Secure software development lifecycle (SDLC) practices.
  • Identifying vulnerabilities in application design and code.
  • Input validation and error handling best practices.
  • Static and dynamic code analysis tools.
  • Securing APIs, microservices, and web applications.
  • Integrating security into DevOps (DevSecOps) processes.
  • Common software vulnerabilities (e.g., OWASP Top 10).
  • Secure database design and access control.

Need assistance or have a questions?
Get in touch with our friendly customer service team today >

Fees & Inclusions

Vital Learning Edge’s offers a range of delivery options for this course. As such, for more details on inclusions simply select your preferred option for more detail on fees and what you will receive:

Self-Paced Training

$1,550 + GST

What you will receive:

  • Official ISC2 Training materials:
    • CBK Textbook
    • Study Guide
    • Practice Tests Book
    • CISSP for Dummies
    • Study App
    • CISSP Review Free
    • Flash Cards Free
    • Exam Outline Free

 

OPTIONAL: CISSP Exam Voucher @ USD $749.

Exam Information

The CISSP exam is conducted using the Computer Adaptive Testing (CAT) method. The CISSP exams are administered by Pearson Vue on behalf of ISC2. You must register for the exam online. The exam consists of 125 – 175 questions.  To pass candidates must achieve 700 out of 1000 points. The exam duration is up to 4 hours.

What Are You Waiting For? Give yourself the EDGE and get certified!

Stand out from the crowd and get the EDGE you need to succeed with a certification. Vital Learning Edge offers a range of internationally recognised training certification courses plus industry standard trainings to enhance your capabilities. 

See upcoming course dates