Course Outline
Security and Risk Management
- Foundations of confidentiality, integrity, and availability (CIA).
- Security governance, policies, and frameworks (ISO 27001, NIST CSF).
- Risk analysis, assessment, and mitigation strategies.
- Business impact analysis, security awareness, and training programs.
- Legal, regulatory, compliance, and privacy considerations (GDPR, HIPAA, local laws).
Asset Security
- Information classification, ownership, and protection mechanisms.
- Data handling procedures (retention, deletion, backup, transfer).
- Privacy protection and data lifecycle management.
- Secure use of assets and media control measures.
Security Engineering
- Principles of secure system and architecture design.
- Cryptography: symmetric, asymmetric, hashing, PKI, and key management.
- Physical security considerations and hardware security modules (HSMs).
- Secure virtualization, cloud-native security patterns, and secure API usage.
Communications and Network Security
- Network models, protocols, and secure communications (TLS, VPN, IPSec).
- Perimeter defenses, segmentation, firewalls, IDS/IPS.
- Wireless security, remote access, and zero-trust network architectures.
- Secure design of network architectures in cloud and hybrid environments.
Identity and Access Management (IAM)
- Control access through identification, authentication, authorization, and accountability.
- Identity providers, federation, SSO, and access federation in cloud environments.
- Privileged access management (PAM) and role-based access control (RBAC).
- Identity lifecycle management: provisioning, deprovisioning, and entitlement reviews.
Security Assessment and Testing
- Security control testing: SAST, DAST, penetration testing, and vulnerability scanning.
- Audit strategies and review frameworks.
- Log management, monitoring, and continuous assessment.
- Red teaming, blue teaming, and adversary simulation techniques.
Security Operations
- Incident response planning, handling, and forensics.
- Security operations center (SOC) design, monitoring, and threat intelligence integration.
- Patching, vulnerability management, and configuration management.
- Business continuity, disaster recovery, and resilience planning.
Software Development Security
- Secure software lifecycle (SDLC) and DevSecOps practices.
- Common vulnerabilities (beyond OWASP Top 10) and mitigation patterns.
- Code review, static/dynamic analysis, and secure frameworks.
- Supply chain risks, dependency management, and runtime protection.
Exam Strategy, Practice and Wrap-Up
- CISSP exam format, question strategy, and time management.
- Practice exams and domain-specific quizzes.
- Gap analysis and personal study plans.
- Recommended resources, communities, and continuous learning paths.
Summary and Next Steps
Requirements
- At least 5 years of cumulative, paid work experience in two or more of the (ISC)² CISSP domains, or equivalent professional experience.
- Foundational understanding of information security principles, networks, and software systems.
- Familiarity with risk management, cryptography, and IT operations.
Audience
- Information security professionals preparing for the CISSP examination.
- Security architects, managers, and consultants.
- IT leaders, auditors, and governance professionals.
Testimonials (7)
Being approachable and pushing us into interaction
Daniel - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CISSP - Certified Information Systems Security Professional
the topic was interesting itself and we had opportunity to discuss it with different perspectives.
Marcin - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CISSP - Certified Information Systems Security Professional
trainer competence
Evghenii - Arctic Stream
Course - CISSP - Certified Information Systems Security Professional
Good material organization and understandable instructor's English.
Ion Temciuc - Arctic Stream
Course - CISSP - Certified Information Systems Security Professional
Good material organization and understandable instructor's English.
Hanny - Arctic Stream
Course - CISSP - Certified Information Systems Security Professional
His knowledge, the way he explains and his kindness
Marcelo Martinez - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CISSP - Certified Information Systems Security Professional
I liked mix of theory and practical case example. Very good overview of each topic then going through slides.