Any Query

CISSP - Certified Information Systems Security Professional

Earn the CISSP - The World's Premier Cybersecurity Certification. Accelerate your cybersecurity career with the CISSP certification. Earning the CISSP proves you have what it takes to effectively design, implement, and manage a best-in-class cybersecurity program

The Certified Information Systems Security Professional (CISSP) is the most globally recognized certification in the information security market. CISSP validates an information security professional’s deep technical and managerial knowledge and experience to effectively design, engineer, and manage the overall security posture of an organization.

With a CISSP, you validate your expertise and become an ISC2 member, unlocking a broad array of exclusive resources, educational tools, and peer-to-peer networking opportunities.

The broad spectrum of topics included in the CISSP Common Body of Knowledge (CBK®) ensure its relevancy across all disciplines in the field of information security. Successful candidates are competent in the following eight domains:

  • Security and Risk Management
  • Asset Security
  • Security Architecture and Engineering
  • Communication and Network Security
  • Identity and Access Management (IAM)
  • Security Assessment and Testing
  • Security Operations
  • Software Development Security

Prove your skills, advance your career, help earn the salary you want, and gain the support of a community of cybersecurity leaders here to support you throughout your career.

FOR INDIVIDUALS

Benefits include:

  • Validate your expertise in cybersecurity
  • Advance your career opportunities
  • Increase your earning potential
  • Access exclusive ISC2 resources and networking opportunities

FOR ORGANISATIONS

Benefits include:

  • Ensure a skilled and knowledgeable security workforce
  • Enhance the organization's security posture
  • Improve compliance with industry standards
  • Gain a competitive edge in the market
  1. Security and Risk Management:
  • Understand and apply concepts of confidentiality, integrity, and availability
  • Apply security governance principles
  • Compliance requirements
  • Legal and regulatory issues
  • Risk management concepts
  • Develop and implement security policies, standards, procedures, and guidelines

  1. Asset Security:
  • Information and asset classification
  • Ownership (e.g., data owners, system owners)
  • Protect privacy
  • Ensure appropriate asset retention
  • Determine data security controls
  • Establish handling requirements

  1. Security Architecture and Engineering:
  • Implement and manage engineering processes using secure design principles
  • Understand the fundamental concepts of security models
  • Select controls based on systems security requirements
  • Understand security capabilities of information systems
  • Implement security architecture enhancement
  • Apply cryptography

  1. Communication and Network Security:
  • Implement secure design principles in network architecture
  • Secure network components
  • Secure communication channels
  • Implement network security

  1. Identity and Access Management (IAM):
  • Control physical and logical access to assets
  • Manage identification and authentication of people, devices, and services
  • Integrate identity as a service (e.g., cloud identity)
  • Implement and manage authorization mechanisms
  • Manage the identity and access provisioning lifecycle

  1. Security Assessment and Testing:
  • Design and validate assessment, test, and audit strategies
  • Conduct security control testing
  • Collect security process data (e.g., technical and administrative)
  • Analyze and report on test outputs
  • Conduct or facilitate security audits

  1. Security Operations:
  • Understand and support investigations.
  • Understand requirements for investigation types (e.g., administrative, criminal)
  • Conduct logging and monitoring activities
  • Securely operate and maintain information systems..
  • Implement and support patch and vulnerability management
  • Understand and participate in change management processes
  • Implement recovery strategies
  • Implement disaster recovery processes
  • Test disaster recovery plans
  • Participate in business continuity planning and exercises
  • Implement and manage physical security

  1. Software Development Security:
  • Understand and apply security in the software development lifecycle
  • Enforce security controls in development environments
  • Assess the effectiveness of software security
  • Assess software acquisition security.

Exam Format

  • Length of exam: 3 hours
  • Number of items: 100 - 150
  • Item format: Multiple choice and advanced innovative items
  • Passing grade: 700 out of 1000 points
  • Exam language availability: Chinese, English, German, Japanese, Spanish

Eligibility Requirements:

  • Minimum of five years of cumulative, paid work experience in two or more of the eight domains of the ISC2 CISSP Common Body of Knowledge (CBK)
  • Candidates without the required experience can still pass the CISSP exam and become an Associate of ISC2 while they earn the required work experience

We offer the following learning alternatives

  • 365-day access to our self-paced online e-learning Foundation courses with 1 day virtual Practitioner courses for the e-learning online Practitioner courses
  • Official Course Manual
  • Accredited Course Materials
  • Accredited trainer with a minimum of ten years industry experience for virtual and classroom courses
  • 365-day access to our self-paced online e-learning Foundation courses with 1 day virtual Practitioner courses for the e-learning online Practitioner courses

VAT will be added at the standard rate to the course fee.

Do visit our Exam Centre to try out sample questions

You should find our course blogs highly informative.

BOOK YOUR COURSE BY SELECTING

WE DELIVER COURSES IN

United Kingdom, Andorra, Argentina, Australia, Austria, Belgium, Brazil, Cameroon, Canada, China, Colombia, Croatia, Cyprus, Denmark, Egypt, Estonia, Finland, France, Gambia, Germany, Ghana, Greece, Hong Kong, Hungary, India, Iran, Ireland, Italy, Jamaica, Japan, Kenya, Kosovo, Kuwait, Latvia, Lesotho, Liberia, Lithuania, Luxembourg, Malawi, Malta, Mauritius, Mexico, Monaco, Montenegro, Namibia, Netherland, New Zealand, Nigeria, Norway, Oman, Poland , Portugal, Qatar, San Marino, Saudi Arabia, Sierra Leone, Singapore, Slovakia, Somaliland, South Africa, South Korea, Southern Sudan, Spain, Sri Lanka, Sudan, Swaziland, Sweden, Switzerland, Tanzania, UAE, Uganda, United States, Vatican City, Venezuela, Zambia, Zimbabwe

ITIL®, PRINCE2®, PRINCE2Agile®, AgileSHIFT®, MSP®, M_O_R®P3O®, MoP®, MoV®, RESILIA® are registered trade marks of AXELOS Limited, used under the permission of AXELOS Ltd. All rights reserved.
The Swirl logo®  is a trade mark of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved.

The APMG-International AgileBA and Swirl Device logo is a trademark of The APM Group Limited, used under permission of The APM Group Limited. All rights reserved. AgileBA is a registered trademark of Agile Business Consortium Ltd. All rights reserved.

The APMG International AgilePM and Swirl Device logo is a trademark of The APM Group Limited, used under permission of The APM Group Limited. All rights reserved. AgilePM® is a registered trademark of Agile Business Consortium Limited. All rights reserved.

The BRM Institute and APMG International Swirl Device logo is a trademark of Business Relationship Management Institute, Inc and The APM Group Limited. All rights reserved. BRMP® is a registered trademark of Business Relationship Management Institute.

The COBIT® 2019 logo is a trademark of Information Systems Audit and Control Association® (ISACA®). The Accredited by APMG International Swirl Device logo is a trademark of The APM Group Limited. All rights reserved. COBIT® is a Trademark of ISACA® registered in the United States and other countries.

The APMG International Facilitation and Swirl Device logo is a trademark of The APM Group Limited, used under permission of The APM Group Limited. All rights reserved. APMG International Facilitation is a trademark of The APM Group Limited. All rights reserved.

The APMG International Managing Benefits and Swirl Device is a trademark of The APM Group Limited, used under permission of The APM Group Limited. All rights reserved. APMG International Managing Benefits is a trademark of The APM Group Limited. All rights reserved.

The APMG International Praxis Framework and Swirl Device logo is a trademark of The APM Group Limited and Praxis Framework Ltd, used under permission of The APM Group Limited. All rights reserved. The Praxis Framework™ is a trademark of Praxis Framework Ltd. All rights reserved.

The APMG International Change Management and Swirl Device logo is a trademark of The APM Group Limited, used under permission of The APM Group Limited. All rights reserved. The APMG International Change Management and Swirl Device logo is a trademark of The APM Group Limited, used under permission of The APM Group Limited. All rights reserved.

All quoted prices do not include VAT, please. Current rate of VAT is 20%. VAT will be added when you are paying for your selected courses. All course bookings are subject to our Terms and Conditions. This website is regularly updated.

Course availability is confirmed when you have received a course confirmation email containing your joining Information and once payment has been authorised and collected. To check on confirmed courses, please call 0208 500 4534 or email us on info@trainingcreatively.com. By booking any of the courses in this website, delegates accept that the liability of any claim against Creative Consulting and Training Ltd is limited to the amount actually paid for the course they booked in the event of any successful claim. This includes, without limitation, direct loss, loss of business or profits (whether or not the loss of such profits was foreseeable, arose in the normal course of things or you have advised this Company of the possibility of such potential loss), damage caused to your computer, computer software, systems and programs and the data thereon or any other direct or indirect, consequential and incidental damages. By booking your course, you have confirmed your agreement to our Terms and Conditions..