Course Outline
Security and Risk Management
- Foundations of confidentiality, integrity, and availability (CIA)
 - Security governance, policies, and frameworks (ISO 27001, NIST CSF)
 - Risk analysis, assessment, and mitigation
 - Business impact analysis, security awareness, and training
 - Legal, regulations, compliance, and privacy issues (GDPR, HIPAA, local laws)
 
Asset Security
- Information classification, ownership, and protection
 - Data handling (retention, deletion, backup, transfer)
 - Privacy protection and data lifecycle management
 - Secure use of assets and media control
 
Security Engineering
- Secure system and architecture design principles
 - Cryptography: symmetric, asymmetric, hashing, PKI, key management
 - Physical security considerations and hardware security modules (HSMs)
 - Secure virtualization, cloud-native security patterns, and secure API usage
 
Communications and Network Security
- Network models, protocols, and secure communications (TLS, VPN, IPSec)
 - Perimeter defenses, segmentation, firewalls, IDS/IPS
 - Wireless security, remote access, and zero-trust network architectures
 - Secure design of network architectures in cloud and hybrid environments
 
Identity and Access Management (IAM)
- Control access: identification, authentication, authorization, and accountability
 - Identity providers, federation, SSO, and access federation in cloud
 - Privileged access management (PAM) and role-based access control (RBAC)
 - Lifecycle of identities: provisioning, deprovisioning, and entitlement review
 
Security Assessment and Testing
- Security control testing: SAST, DAST, penetration testing, vulnerability scanning
 - Audit strategies and review frameworks
 - Log management, monitoring, and continuous assessment
 - Red teaming, blue teaming, and adversary simulation techniques
 
Security Operations
- Incident response planning, handling, and forensics
 - Security operations center (SOC) design, monitoring, and threat intelligence integration
 - Patching, vulnerability management, and configuration management
 - Business continuity, disaster recovery, and resilience planning
 
Software Development Security
- Secure software lifecycle (SDLC) and devsecops practices
 - Common vulnerabilities (beyond OWASP Top 10) and mitigation patterns
 - Code review, static/dynamic analysis, and secure frameworks
 - Supply chain risks, dependency management, and runtime protection
 
Exam Strategy, Practice and Wrap-Up
- CISSP exam format, question strategy, and time management
 - Practice exams and domain-specific quizzes
 - Gap analysis and personal study plans
 - Recommended resources, communities, and continuous learning paths
 
Summary and Next Steps
Requirements
- At least 5 years of cumulative, paid work experience in two or more of the (ISC)² CISSP domains or equivalent experience
 - Foundational knowledge of information security concepts, networks, and software systems
 - Familiarity with risk management, cryptography, and IT operations
 
Audience
- Information security professionals preparing for the CISSP exam
 - Security architects, managers, and consultants
 - IT leaders, auditors, and governance professionals
 
Testimonials (7)
Being approachable and pushing us into interaction
Daniel - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CISSP - Certified Information Systems Security Professional
the topic was interesting itself and we had opportunity to discuss it with different perspectives.
Marcin - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CISSP - Certified Information Systems Security Professional
trainer competence
Evghenii - Arctic Stream
Course - CISSP - Certified Information Systems Security Professional
Good material organization and understandable instructor's English.
Ion Temciuc - Arctic Stream
Course - CISSP - Certified Information Systems Security Professional
Good material organization and understandable instructor's English.
Hanny - Arctic Stream
Course - CISSP - Certified Information Systems Security Professional
His knowledge, the way he explains and his kindness
Marcelo Martinez - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CISSP - Certified Information Systems Security Professional
I liked mix of theory and practical case example. Very good overview of each topic then going through slides.