CISSP® Certified Information Systems Security Professional (exam included)

3.250,00 EUR

  • 10 days
Blended Learning
eLearning
Live Virtual Classroom

The Certified Information Systems Security Professional (CISSP) is a globally recognized certification for information technology security professionals. The CISSP certification training develops your expertise in defining IT architecture and designing, building, and maintaining a secure business environment using globally approved information security standards. The CISSP training covers industry best practices and prepares you for the CISSP certification exam held by (ISC)2.

Key Features

Language

Course and material are in English

Level

Intermediate-Advanced level for professionals

40 hours of instructor-led training

Ask us first for a detailed lesson schedule!

1-year access

to the eLearning platform & class recordings

57+ hours self-study video content

With 70-100 hours minimum recommended study time

Practices

9 Assessments, 53 Recall Quizzes, 4 Case Studies

30 CPEs

Offers the requisite 30 CPEs for taking the CISSP examination

Simulation

6 Mock Exams and Premier Question Bank (1000+ Questions)

Comprehensive Exam Prep Support

Printable Cheat Sheets, Visual Mind Maps, and More

Exam

Including Official CISSP Exam Voucher (ISC)²

Hero

About CISSP

The Certified Information Systems Security Professional (CISSP), offered by the globally recognized International Information Systems Security Certification Consortium (ISC²), is a benchmark for excellence in cybersecurity. This vendor-neutral certification confirms an IT security professional’s technical expertise and practical experience.

CISSP is highly sought after by IT professionals, with leading employers actively recruiting candidates who have earned the credential. To achieve CISSP certification, individuals must possess both hands-on experience and formal training, along with a strong understanding of cybersecurity principles. The certification exam assesses knowledge across eight key domains, collectively known as the Common Body of Knowledge (CBK), which forms the foundation for professionals in information systems security.

Key Benefits of CISSP Certification:

  • Attain a prestigious, globally recognized credential in Information Systems Security
  • Gain sought-after cybersecurity skills that distinguish you from the competition
  • Master in-depth knowledge across the eight essential domains
  • Access a wide range of career advancement opportunities
  • Build valuable connections through the (ISC)² professional network

Learning Outcomes

By the end of this online CISSP training, you will learn:

Penetration Testing

Simulating cyber-attacks to uncover vulnerabilities before they can be exploited, enabling organizations to strengthen security proactively.

Vulnerability Assessment

Detecting and ranking system weaknesses to apply targeted fixes, reducing the risk of potential cyber threats.

Log Management & Transactions

Tracking and analyzing activity logs to identify incidents, maintain compliance, and uphold regulatory requirements

Incident Management

Responding quickly to security breaches to limit damage, restore services, and minimize operational and financial disruptions.

Investigations

Examining security incidents to determine root causes, assess access controls, and develop prevention measures for stronger future protection.

Recovery and Backup

Restoring systems and data after disruptions to maintain business continuity and safeguard information integrity.

Assets & Malware Management

Identifying, protecting, and monitoring organizational assets against malware to ensure the resilience of critical infrastructure.

Course timeline

Hero
  1. Course Introduction

    Lesson 01

  2. Security and Risk Management

    Lesson 02

    • Security and Risk Management
    • Information Security Management
    • Security Controls
    • Information Security Management and Governance
    • Goals, Mission, and Objectives
    • Due Care
    • Security Policy
    • Compliance
    • Computer Crimes
    • Legal Systems
    • Intellectual Property (IP) Law
    • Privacy
    • General Data Protection Regulation
    • Security
    • Risk Analysis
    • Types of Risk Analysis
    • Security Control Assessment
    • Threat Modeling
    • Supply-Chain Risk Management
    • Third-Party Management
    • Business Continuity Planning
    • Business Continuity Planning Phases
    • Managing Personnel Security
    • Security Awareness Training
    • Program Effectiveness Evaluation
    • Key Takeaways
    • Knowledge Check
  3. Asset Security

    Lesson 03

    • Asset Security
    • Information Classification
    • Data Classification
    • Data Life Cycle
    • Data Management
    • Different Roles
    • Data Remanence
    • Privacy
    • States of Data
    • Data Loss Prevention
    • Key Takeaways
    • Knowledge Check
  4. Security Engineering

    Lesson 04

    • Introduction
    • Security Engineering
    • Security Architecture
    • Security Models
    • Evaluation Criteria
    • System Security
    • CPU
    • Memory
    • Security Mode
    • Cloud Computing
    • IoT
    • Industrial Control System (ICS)
    • Cryptography
    • Encryption Methods
    • DES
    • Asymmetric Cryptography
    • Public Key Infrastructure
    • Cryptanalysis
    • Key Management
    • Critical Path Analysis
    • Site Location
    • Fire
    • HVAC
    • Key Takeaways
    • Knowledge Check
  5. Communications and Network Security

    Lesson 05

    • Introduction
    • Network Architecture and Design
    • IP Addressing
    • Network Protocols
    • Transmission Mediaç
    • Firewall
    • Intrusion Detection System and Intrusion Prevention System
    • Network Access Control (NAC)
    • Content Delivery Network (CDN)
    • Networks
    • Software-Defined Networking (SDN)
    • Remote Access
    • Internet Security Protocol (IPsec)
    • Voice over Internet Protocol (VoIP)
    • Phreaking
    • Secure Access Protocols
    • Wireless Technologies
    • Network Attacks
    • Key Takeaways
    • Knowledge Check
  6. Identity and Access Management

    Lesson 06

    • Identity and Access Management
    • Identity Management
    • Biometrics
    • Passwords
    • Tokens
    • Memory Cards and Smart Cards
    • Access and Authorization Concepts
    • Identity Management Implementation
    • Kerberos
    • Access Control Types
    • Access Control Models
    • Access Control Tools and Techniques
    • Accountability
    • Access Control Monitoring
    • Identity Proofing
    • Markup Languages
    • Identity as a Service (IDaaS)
    • Key Takeaways
    • Knowledge Check
  7. Security Assessment and Testing

    Lesson 07

    • Security Assessment and Testing
    • Security Assessment
    • Vulnerability Assessment
    • Penetration Testing
    • Audits
    • Log Management
    • Synthetic Transaction and Real Transaction
    • Testing
    • Software Testing
    • Interface
    • Key Performance Indicators (KPI)
    • Key Takeaways
    • Knowledge Check
  8. Security Operations

    Lesson 08

    • Security Operations
    • Investigation
    • Forensic Investigation
    • Evidence
    • Electronic Discovery
    • Incident Management
    • Security Operations Management
    • Identity and Access Management
    • Assets
    • Malware
    • Management
    • Recovery and Backup
    • Disaster Recovery
    • Perimeter Security
    • Key Takeaways
    • Knowledge Check
  9. Software Development Security

    Lesson 09

    • Software Development Security
    • Importance of Software Development Security
    • Programming Concepts
    • Systems Development Life Cycle
    • Application Program Interface
    • Software Security and Assurance
    • Database and Data Warehouse Environments
    • Knowledge Management
    • Web Application Environment
    • Security Threats and Attacks
    • Key Takeaways
    • Knowledge Check
cissp

Who Should Enroll in this Program?

The CISSP is ideal for experienced security practitioners, managers, and executives interested in proving their knowledge across a wide array of security practices and principles, including those in the following positions:

Chief Information Security Officer

Chief Information Officer

Director of Security

IT Director/Manager

Security Systems Engineer

Security Analyst

Security Manager

Security Auditor

Security Architect

Security Consultant

Network Architect

Start course now

Eligibility

  • Minimum five years cumulative, full-time experience in two or more of the CISSP Exam Outline domains.
  • Post-secondary degree in computer science, IT, or related fields may substitute for up to one year of experience.
  • An additional credential from the ISC2 approved list may also substitute for up to one year of experience.
  • Part-time work and internships can count towards the experience requirement.

OR

  • Candidates without the required experience can become an Associate of ISC2 by passing the CISSP examination.
  • Associates have six years to earn the necessary five years of required experience.

Pre-requisites:

Full-Time Experience: Your work experience is accrued monthly. Thus, you must have worked a minimum of 35 hours/week for four weeks in order to accrue one month of work experience.

OR

Part-Time Experience: Your part-time experience

  • cannot be less than 20 hours a week and no more than 34 hours a week.
  • 1040 hours of part-time = 6 months of full time experience
  • 2080 hours of part-time = 12 months of full time experience

Internship: Paid or unpaid internship is acceptable. You will need documentation on company/organization letterhead confirming your position as an intern. If you are interning at a school, the document can be on the registrar's stationery.

Exam Details

The CISSP certification exam takes up to four hours to complete and consists of 125-175 multiple-choice questions and advanced innovative questions. A score of 700 out of 1,000 is required to pass the exam.

Domains Average Weight

  • Security and Risk Management 15%
  • Asset Security 10%
  • Security Architecture and Engineering 13%
  • Communication and Network Security 13%
  • Identity and Access Management (IAM) 13%
  • Security Assessment and Testing 12%
  • Security Operations 13%
  • Software Development Security 11%

Statements

Licensing and accreditation

CISSP® training course is offered according to Partner Program Agreement and complies with the License Agreement requirements.

Equity Policy

AVC does not provide accommodations due to a disability or medical condition of any students. Candidates are encouraged to reach out to AVC for guidance and support throughout the accommodation process.

Frequently Asked Questions

certification training

Need corporate solutions or LMS integration?

Didn't find the course or program which would work for your business? Need LMS integration? Write us, we will solve everything!