CISSP® Certified Information Systems Security Professional (exam included)
3.250,00 EUR
- 10 days
The Certified Information Systems Security Professional (CISSP) is a globally recognized certification for information technology security professionals. The CISSP certification training develops your expertise in defining IT architecture and designing, building, and maintaining a secure business environment using globally approved information security standards. The CISSP training covers industry best practices and prepares you for the CISSP certification exam held by (ISC)2.
Key Features
Language
Course and material are in English
Level
Intermediate-Advanced level for professionals
40 hours of instructor-led training
Ask us first for a detailed lesson schedule!
1-year access
to the eLearning platform & class recordings
57+ hours self-study video content
With 70-100 hours minimum recommended study time
Practices
9 Assessments, 53 Recall Quizzes, 4 Case Studies
30 CPEs
Offers the requisite 30 CPEs for taking the CISSP examination
Simulation
6 Mock Exams and Premier Question Bank (1000+ Questions)
Comprehensive Exam Prep Support
Printable Cheat Sheets, Visual Mind Maps, and More
Exam
Including Official CISSP Exam Voucher (ISC)²

About CISSP
The Certified Information Systems Security Professional (CISSP), offered by the globally recognized International Information Systems Security Certification Consortium (ISC²), is a benchmark for excellence in cybersecurity. This vendor-neutral certification confirms an IT security professional’s technical expertise and practical experience.
CISSP is highly sought after by IT professionals, with leading employers actively recruiting candidates who have earned the credential. To achieve CISSP certification, individuals must possess both hands-on experience and formal training, along with a strong understanding of cybersecurity principles. The certification exam assesses knowledge across eight key domains, collectively known as the Common Body of Knowledge (CBK), which forms the foundation for professionals in information systems security.
Key Benefits of CISSP Certification:
- Attain a prestigious, globally recognized credential in Information Systems Security
- Gain sought-after cybersecurity skills that distinguish you from the competition
- Master in-depth knowledge across the eight essential domains
- Access a wide range of career advancement opportunities
- Build valuable connections through the (ISC)² professional network
Learning Outcomes
By the end of this online CISSP training, you will learn:
Penetration Testing
Simulating cyber-attacks to uncover vulnerabilities before they can be exploited, enabling organizations to strengthen security proactively.
Vulnerability Assessment
Detecting and ranking system weaknesses to apply targeted fixes, reducing the risk of potential cyber threats.
Log Management & Transactions
Tracking and analyzing activity logs to identify incidents, maintain compliance, and uphold regulatory requirements
Incident Management
Responding quickly to security breaches to limit damage, restore services, and minimize operational and financial disruptions.
Investigations
Examining security incidents to determine root causes, assess access controls, and develop prevention measures for stronger future protection.
Recovery and Backup
Restoring systems and data after disruptions to maintain business continuity and safeguard information integrity.
Assets & Malware Management
Identifying, protecting, and monitoring organizational assets against malware to ensure the resilience of critical infrastructure.
Course timeline

Course Introduction
Lesson 01
Security and Risk Management
Lesson 02
- Security and Risk Management
- Information Security Management
- Security Controls
- Information Security Management and Governance
- Goals, Mission, and Objectives
- Due Care
- Security Policy
- Compliance
- Computer Crimes
- Legal Systems
- Intellectual Property (IP) Law
- Privacy
- General Data Protection Regulation
- Security
- Risk Analysis
- Types of Risk Analysis
- Security Control Assessment
- Threat Modeling
- Supply-Chain Risk Management
- Third-Party Management
- Business Continuity Planning
- Business Continuity Planning Phases
- Managing Personnel Security
- Security Awareness Training
- Program Effectiveness Evaluation
- Key Takeaways
- Knowledge Check
Asset Security
Lesson 03
- Asset Security
- Information Classification
- Data Classification
- Data Life Cycle
- Data Management
- Different Roles
- Data Remanence
- Privacy
- States of Data
- Data Loss Prevention
- Key Takeaways
- Knowledge Check
Security Engineering
Lesson 04
- Introduction
- Security Engineering
- Security Architecture
- Security Models
- Evaluation Criteria
- System Security
- CPU
- Memory
- Security Mode
- Cloud Computing
- IoT
- Industrial Control System (ICS)
- Cryptography
- Encryption Methods
- DES
- Asymmetric Cryptography
- Public Key Infrastructure
- Cryptanalysis
- Key Management
- Critical Path Analysis
- Site Location
- Fire
- HVAC
- Key Takeaways
- Knowledge Check
Communications and Network Security
Lesson 05
- Introduction
- Network Architecture and Design
- IP Addressing
- Network Protocols
- Transmission Mediaç
- Firewall
- Intrusion Detection System and Intrusion Prevention System
- Network Access Control (NAC)
- Content Delivery Network (CDN)
- Networks
- Software-Defined Networking (SDN)
- Remote Access
- Internet Security Protocol (IPsec)
- Voice over Internet Protocol (VoIP)
- Phreaking
- Secure Access Protocols
- Wireless Technologies
- Network Attacks
- Key Takeaways
- Knowledge Check
Identity and Access Management
Lesson 06
- Identity and Access Management
- Identity Management
- Biometrics
- Passwords
- Tokens
- Memory Cards and Smart Cards
- Access and Authorization Concepts
- Identity Management Implementation
- Kerberos
- Access Control Types
- Access Control Models
- Access Control Tools and Techniques
- Accountability
- Access Control Monitoring
- Identity Proofing
- Markup Languages
- Identity as a Service (IDaaS)
- Key Takeaways
- Knowledge Check
Security Assessment and Testing
Lesson 07
- Security Assessment and Testing
- Security Assessment
- Vulnerability Assessment
- Penetration Testing
- Audits
- Log Management
- Synthetic Transaction and Real Transaction
- Testing
- Software Testing
- Interface
- Key Performance Indicators (KPI)
- Key Takeaways
- Knowledge Check
Security Operations
Lesson 08
- Security Operations
- Investigation
- Forensic Investigation
- Evidence
- Electronic Discovery
- Incident Management
- Security Operations Management
- Identity and Access Management
- Assets
- Malware
- Management
- Recovery and Backup
- Disaster Recovery
- Perimeter Security
- Key Takeaways
- Knowledge Check
Software Development Security
Lesson 09
- Software Development Security
- Importance of Software Development Security
- Programming Concepts
- Systems Development Life Cycle
- Application Program Interface
- Software Security and Assurance
- Database and Data Warehouse Environments
- Knowledge Management
- Web Application Environment
- Security Threats and Attacks
- Key Takeaways
- Knowledge Check

Who Should Enroll in this Program?
The CISSP is ideal for experienced security practitioners, managers, and executives interested in proving their knowledge across a wide array of security practices and principles, including those in the following positions:
Chief Information Security Officer
Chief Information Officer
Director of Security
IT Director/Manager
Security Systems Engineer
Security Analyst
Security Manager
Security Auditor
Security Architect
Security Consultant
Network Architect
Eligibility
- Minimum five years cumulative, full-time experience in two or more of the CISSP Exam Outline domains.
- Post-secondary degree in computer science, IT, or related fields may substitute for up to one year of experience.
- An additional credential from the ISC2 approved list may also substitute for up to one year of experience.
- Part-time work and internships can count towards the experience requirement.
OR
- Candidates without the required experience can become an Associate of ISC2 by passing the CISSP examination.
- Associates have six years to earn the necessary five years of required experience.
Pre-requisites:
Full-Time Experience: Your work experience is accrued monthly. Thus, you must have worked a minimum of 35 hours/week for four weeks in order to accrue one month of work experience.
OR
Part-Time Experience: Your part-time experience
- cannot be less than 20 hours a week and no more than 34 hours a week.
- 1040 hours of part-time = 6 months of full time experience
- 2080 hours of part-time = 12 months of full time experience
Internship: Paid or unpaid internship is acceptable. You will need documentation on company/organization letterhead confirming your position as an intern. If you are interning at a school, the document can be on the registrar's stationery.
Exam Details
The CISSP certification exam takes up to four hours to complete and consists of 125-175 multiple-choice questions and advanced innovative questions. A score of 700 out of 1,000 is required to pass the exam.
Domains Average Weight
- Security and Risk Management 15%
- Asset Security 10%
- Security Architecture and Engineering 13%
- Communication and Network Security 13%
- Identity and Access Management (IAM) 13%
- Security Assessment and Testing 12%
- Security Operations 13%
- Software Development Security 11%
Statements
Licensing and accreditation
CISSP® training course is offered according to Partner Program Agreement and complies with the License Agreement requirements.
Equity Policy
AVC does not provide accommodations due to a disability or medical condition of any students. Candidates are encouraged to reach out to AVC for guidance and support throughout the accommodation process.
Frequently Asked Questions

Need corporate solutions or LMS integration?
Didn't find the course or program which would work for your business? Need LMS integration? Write us, we will solve everything!