Eight domains of strategy creation and implementation
Design, implementation and management – these are the three elements of a cybersecurity program taught in the CISSP – Certified Information Systems Security Professional certification prep course program. The CISM training is designed for those who have experience within the cybersecurity space and a comprehensive understanding of how an IS security program meshes with an organization’s needs.
The Certified Information Systems Security Professional prep course offered through TechnoEdge is accredited through (ISC)2, home of more than 140,000 certified cybersecurity members. Our accreditation through (ISC)2 ensures that you are receiving the most up-to-date education possible and the TechnoEdge instructors are experienced in delivering it in a way that helps you learn much more quickly.
While there can’t be a guarantee that you will pass the CISSP exam after taking the course, the expertise of our instructors and the delivery of the accredited program ensures you will have the best chance possible of passing and earning your certification through (ISC)2. Because TechnoEdge is one of (ISC)2’s official training providers the materials you use within the prep course contain he same information as those offered by (ISC)2 with the added benefit of in-person training and a short time frame to completion.
There are eight domains of the (ISC)2CISSP Common Body of Knowledge used in this prep course and make up the basis of the certification exam: software development security, security and risk management, asset security, security architecture and engineering, communication and network security, identity and access management, security assessment and testing and security operations. To take this prep course, you will have expertise in two or more of these eight domains. Only the CISSP training delivers comprehensive education on all eight to enable you to bring strategy and implementation to an organization.
Successful completion of the CISSP certification exam allows you to become a member of (ISC)2, an organization that proves credibility in the field and enables collaboration with like-minded IS professionals around the globe. This course is filled with both the theory and practical hands-on experience needed to fully integrate the information with existing skills.
CISSP training makes you the go-to person in an organization when it comes to cybersecurity issues like identifying risks, developing the strategy to prevent them and applying the solutions. The CISSP certification is the most required security certification mentioned on LinkedIn.
CISSP – Certified Information Systems Security Professional course outline
- Security and risk management 15%
- Asset security 10%
- Security architecture and engineering 13%
- Communication and network security 14%
- Identity and access management 13%
- Security assessment and testing 12%
- Security operations 13%
- Software development security 10%
CISSP – Certified Information Systems Security Professional key learning points
- Be able to illustrate understanding and application of the eight domains from the Common Body of Knowledge in a way that assesses, addresses and prevents risks
- Apply the knowledge and skills from the eight domain sections to pass the CISSP exam
- Apply the knowledge and skills within an organization’s IS enterprise
This training course is intended for professionals who have at least 5 years of recent full-time professional work experience in 2 or more of the 8 domains of the CISSP CBK and are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current information security careers. The training seminar is ideal for those working in positions such as, but not limited to:
● Security Consultant
● Security Manager
● IT Director/Manager
● Security Auditor
● Security Architect
● Security Analyst
● Security Systems Engineer
● Chief Information Security Officer
● Director of Security
● Network Architect
● Security and Risk Management
● Asset Security
● Security Architecture and Engineering
● Communication and Network Security
● Identity and Access Management (IAM)
● Security Assessment and Testing
● Security Operations
● Software Development Security
Webinars will be held Monday to Friday.
8:00am – 4:00pm PST (Vancouver, Seattle, Los Angeles, Phoenix)
9:00am – 5:00pm MDT (Edmonton, Calgary, Denver)
9:00am – 5:00pm CST (Regina)
10:00am– 6:00pm CDT (Winnipeg, Chicago)
11:00am – 7:00pm EDT (Toronto, Ottawa, Quebec, New York, Boston)
12:00am – 8:00pm ADT (Halifax)
12:30am – 8:30pm NDT (St John’s)