Learning Options

  • Online Video-Based Learning
  • Flexible Schedule
  • Expert Trainers with Industry Experience
  • High Pass Rates
  • 24/7 Personalised Support
  • Interactive Learning Materials
  • Live Online Classes
  • Expert Trainers with Industry Experience
  • Live Assessment and Feedback
  • Interactive Learning Materials
  • Networking Opportunities
  • High Pass Rates

Overview

The CISSP Certification Training Course is designed to prepare professionals for the globally recognised Certified Information Systems Security Professional (CISSP) certification. This course delivers advanced knowledge and skills across eight security domains outlined by the (ISC)² CBK.

In today’s digital age, cybersecurity expertise is crucial for protecting organisational data and assets. This course ensures learners are well-prepared to manage security risks, design resilient systems, and implement comprehensive security policies. It covers key areas such as security and risk management, asset security, security engineering, and software development security.

This 5-day training by MPES includes interactive sessions, case studies, and exam-focused preparation, ensuring learners are confident and fully equipped to pass the CISSP certification exam and advance their careers in cybersecurity.

Course Objectives

  • Understand the core principles of information security and their application in organisational contexts
  • Master the eight domains of the CISSP CBK
  • Learn to design and implement effective security architectures
  • Gain expertise in risk management and incident response
  • Develop skills for securing software development and engineering processes
  • Prepare comprehensively for the CISSP certification exam

Upon completion, learners will have the expertise to manage and secure complex systems effectively and earn the prestigious CISSP certification, enhancing their professional credibility and career opportunities.

calender

Average completion time

5 Month
wifi

with unlimited support

100% online
clock

Start anytime

Study At Your Own Pace

Course Includes

Course Details

Develop your understanding of essential financial, business and management accounting techniques with ACCA Applied Knowledge. You'll learn basic business and management principles and the skills required of an accountant working in business.

Entry Requirements

    • Educational Background: There are no specific educational prerequisites. However, learners should have a strong foundation in IT and cybersecurity principles. 

    • Professional Experience: Candidates should ideally have a minimum of five years of cumulative work experience in two or more of the CISSP domains. One year of experience may be waived with a recognised degree or certification. 

    • Language Proficiency: Learners should have a good command of English, as the course materials and CISSP certification exam are conducted in English. 

Learning Outcomes

    • Develop Advanced Cybersecurity Expertise: Gain a thorough understanding of the eight domains outlined in the CISSP CBK. 

    • Master Risk Management and Incident Response: Learn to identify and mitigate risks, develop response strategies, and ensure data protection. 

    • Design Secure Systems: Acquire the skills to create and manage secure IT architectures and software processes. 

    • Prepare for the CISSP Exam: Develop the confidence and knowledge to pass the CISSP certification exam and apply your expertise in real-world scenarios. 

Target Audience

    The CISSP Certification Training Course is tailored for IT and security professionals aiming to enhance their cybersecurity expertise and achieve CISSP certification. Below are the individuals who will benefit from this course:

    • IT Security Managers
    • Security Consultants
    • Network Security Engineers
    • Systems Administrators
    • Risk Managers
    • Cybersecurity Analysts 

Course content

    Domain 1: Security and Risk Management 

    • Understand and Apply Security Concepts 

    • Evaluate and Apply Security Governance Principles 

    • Legal and Regulatory Issues that Pertain to Information Security in a Global Context 

    • Requirements for Investigation Types 

    • Develop, Document, and Implement Security Policy, Standards, Procedures, and Guidelines 

    • Identify, Analyse, and Prioritise Business Continuity (BC) Requirements 

    • Contribute to and Enforce Personnel Security Policies and Procedures 

    • Understand and Apply Risk Management Concepts 

    • Understand and Apply Threat Modelling Concepts and Methodologies 

    • Apply Supply Chain Risk Management (SCRM) Concepts 

    • Establish and Maintain a Security Awareness, Education, and Training Programme 

     

    Domain 2: Asset Security 

    • Identify and Classify Information and Assets 

    • Establish Information and Asset Handling Requirements 

    • Provision Resources Securely 

    • Manage Data Lifecycle 

    • Ensure Appropriate Asset Retention 

    • Determine Data Security Controls and Compliance Requirements 

     

    Domain 3: Security Architecture and Engineering 

    • Research, Implement, and Manage Engineering Processes Using Secure Design Principles 

    • Understand the Fundamental Concepts of Security Models 

    • Select Controls Based Upon Systems Security Requirements 

    • Understand Security Capabilities of Information Systems 

    • Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements 

    • Cryptographic Life Cycle 

    • Understand Methods of Cryptanalytic Attacks 

    • Apply Security Principles to Site and Facility Design 

    • Design Site and Facility Security Controls 

    • Manage the information system lifecycle 

     

    Domain 4: Communication and Network Security 

    • Implement Secure Design Principles in Network Architectures 

    • Secure Network Components 

    • Implement Secure Communication Channels According to Design 

     

    Domain 5: Identity and Access Management 

    • Control Physical and Logical Access to Assets 

    • Manage Identification and Authentication of People, Devices, and Services 

    • Integrate Identity as a Third-Party Service 

    • Implement and Manage Authorisation Mechanisms 

    • Manage the Identity and Access Provisioning Lifecycle 

    • Implement Authentication Systems 

     

    Domain 6: Security Assessment and Testing 

    • Design and Validate Assessment, Test, and Audit Strategies 

    • Conduct Security Control Testing 

    • Collect Security Process Data 

    • Analyse Test Output and Generate Report 

    • Conduct or Facilitate Security Audits 

     

    Domain 7: Security Operations 

    • Understand and Support Investigations 

    • Conduct Logging and Monitoring Activities 

    • Securely Provisioning Resources 

    • Understand and Apply Foundational Security Operations Concepts 

    • Apply Resource Protection Techniques 

    • Conduct Incident Management 

    • Operate and Maintain Detective and Preventative Measures 

    • Implement and Support Patch and Vulnerability Management 

    • Participate in Change Management Processes 

    • Implement Recovery Strategies 

    • Implement disaster recovery (DR) processes 

    • Test disaster recovery plans (DRP) 

    • Participate in Business Continuity (BC) planning and exercises 

    • Implement and manage physical security 

    • Address personnel safety and security concerns 

     

    Domain 8: Software Development Security 

    • Integrate Security in the Software Development Life Cycle (SDLC) 

    • Identify and Apply Security Controls in Development Environments 

    • Assess the Effectiveness of Software Security 

    • Assess Security Impact of Acquired Software 

    • Define and Apply Secure Coding Guidelines and Standards 

MPES Support That Helps You Succeed

At MPES, we offer comprehensive support to help you succeed in your studies. With expert guidance and valuable resources, we help you stay on track throughout your course.

  • MPES Learning offers dedicated support to help you succeed in Accounting and Finance courses.
  • Get expert guidance from tutors available online to assist with your studies.
  • Check your eligibility for exemptions with the relevant professional body before starting.
  • Our supportive team is here to offer study advice and support throughout your course.
  • Access a range of materials to help enhance your learning experience. These resources include practice exercises and additional reading to support your progress.

Career Growth Stories

MPES Learning offers globally recognised courses in accounting,

Need help with your ACCA course?

Our course advisors are here to help guide you and ensure that you choose the right course for you and your career journey.

Have Questions? We’ve Got You

If you have any questions, we’re here to help. Find the answers you need in the MPES detailed FAQ section.

Q. Do I need prior cybersecurity experience to take this course?

Yes, CISSP certification requires at least five years of cumulative experience in two or more of the CISSP domains. However, one year can be waived with specific credentials. 

Q. What topics are covered in this course?

The course covers the eight domains of the CISSP CBK, including risk management, network security, security operations, and software development security, along with exam preparation. 

Q. How will this course help me in my career?

This course enhances your cybersecurity skills, prepares you for the CISSP certification, and qualifies you for advanced roles in IT security, boosting your professional credibility and career opportunities. 

Q. Is this course suitable for non-IT professionals?

The course is best suited for IT and cybersecurity professionals. Non-IT professionals with a strong interest in cybersecurity may benefit if they meet the certification prerequisites. 

Q. Will I receive a certification upon completing the course?

You will receive a course completion certificate. To earn the CISSP certification, you must pass the CISSP exam, which this course thoroughly prepares you for. 

Related Course

Explore additional courses designed to complement your learning journey and enhance your professional skills. Expand your knowledge with these expertly curated options tailored to your career goals.

CISSP Certification Go To Course blue-arrow
View More

Resources

Access a wide range of free resources to support your learning journey. From blogs to news and podcasts, these valuable guides are available at no cost to help you succeed.

Course Schedule

£5995

CISSP Certification

10th June 2024

14th June 2024

(5 days)

DELIVERY METHOD

Classroom

£5995

CISSP Certification

4th November 2024

8th November 2024

(5 days)

DELIVERY METHOD

Classroom

Course Schedule

£3695

CISSP Certification

Mon 8th Jan 2024

Fri 12th Jan 2024

Duration - 5 Days

DELIVERY METHOD

Virtual

£3695

CISSP Certification

Sat 13th Jan 2024

Wed 17th Jan 2024

Duration - 5 Days

DELIVERY METHOD

Virtual

£3695

CISSP Certification

Mon 22nd Jan 2024

Fri 26th Jan 2024

Duration - 5 Days

DELIVERY METHOD

Virtual

£3695

CISSP Certification

Mon 5th Feb 2024

Fri 9th Feb 2024

Duration - 5 Days

DELIVERY METHOD

Virtual