Course Code: IT 200
24218 Course Visits
Certified Information Systems Security Professional (CISSP)
Course Sector:
Information Technology
Course Dates and Locations
Choose a date and location to book your seat
No.
Date
Days
Location
Fees
Enrollment
01
17 - 21 Aug 2025
5 Days
Online, Virtual
$2,150
02
08 - 12 Sep 2025
5 Days
Madrid, Spain
$4,950
03
06 - 10 Oct 2025
5 Days
Dubai, UAE
$4,250
04
22 - 26 Dec 2025
5 Days
Abu Dhabi, UAE
$4,250
Introduction
Training course introducion / brief

CISSP is the premier certification for today’s information systems security professional. The International Information Systems Security Certification Consortium, Inc. (ISC)2, regularly updates the test by using subject matter experts (SMEs) to make sure the material and the questions are relevant in today’s security environment. By defining eight security domains that comprise a CBK, industry standards for the information systems security professional have been established.

 

This training course is designed to help participants expand their knowledge by addressing the essential elements of the eight domains that comprise a Common Body of Knowledge (CBK) for information systems security professionals, and let them ahead of the most critical security topics and build resilience.

Course Objectives
At the end of the training course, participants will be able to

  • Gain the expertise to manage a best-practice information security system,  aligned to globally accepted standards, that ensures your organization's information assets are protected
  • Learn the emerging threats, technologies, regulations, standards, and industry best practices, and how to stay informed
  • Be familiar with industry accepted terminology and practices used by information security professionals
  • Analyze components of the Security and Risk Management domain, Asset Security domain, Security Architecture and Engineering domain, Communication and Network Security domain, Identity and Access Management domain, Security Assessment and Testing domain, Security Operations domain, and Software Development Security domain.

Course Audience
Who is this course for, and can benefit the most
  • Cloud Computing Engineer
  • Computer Network Specialist
  • Computer Support Specialist
  • Database Administrator
  • Information Technology Analyst
  • Information Technology Leadership
  • Information Security Specialist
  • Software/Application Developer
  • Web Developer
  • Technology sales consultant
Course Outline
The course aims and learning outcomes

Lesson 1: Security and Risk Management

  • Topic A: Security Concepts
  • Topic B: Security Governance Principles
  • Topic C: Compliance
  • Topic D: Professional Ethics
  • Topic E: Security Documentation
  • Topic F: Risk Management
  • Topic G: Threat Modeling
  • Topic H: Risk Response
  • Topic I: Business Continuity Plan Fundamentals
  • Topic J: Acquisition Strategy and Practice
  • Topic K: Personnel Security Policies
  • Topic L: Security Awareness and Training

 

Lesson 2: Asset Security

  • Topic A: Asset Classification
  • Topic B: Secure Data Handling
  • Topic C: Resource Provisioning and Protection
  • Topic D: Manage Data Lifecycle
  • Topic E: Asset Retention
  • Topic F: Data Security Controls

Lesson 3: Security Architecture and Engineering

  • Topic A: Security in the Engineering Lifecycle
  • Topic B: System Component Security
  • Topic C: Security Models
  • Topic D: Controls and Countermeasures in Enterprise Security
  • Topic E: Information System Security Capabilities
  • Topic F: Design and Architecture Vulnerability Mitigation
  • Topic G: Vulnerability Mitigation in Emerging Technologies
  • Topic H: Cryptography Concepts
  • Topic I: Cryptography Techniques
  • Topic J: Cryptanalytic Attacks
  • Topic K: Site and Facility Design for Physical Security
  • Topic L: Physical Security Implementation in Sites and Facilities

 

Lesson 4: Communication and Network Security

  • Topic A: Network Protocol Security
  • Topic B: Network Components Security
  • Topic C: Communication Channel Security
  • Topic D: Network Attack Mitigation

Lesson 5: Identity and Access Management

  • Topic A: Physical and Logical Access Control
  • Topic B: Identification and Authentication
  • Topic C: Identity as a Service
  • Topic D: Authorization Mechanisms
  • Topic E: Access Control Attack Mitigation

 

Lesson 6: Security Assessment and Testing

  • Topic A: System Security Control Testing
  • Topic B: Software Security Control Testing
  • Topic C: Security Process Data Collection
  • Topic D: Audits

Lesson 7: Security Operations

  • Topic A: Security Operations Concepts
  • Topic B: Change Management
  • Topic C: Physical Security
  • Topic D: Personnel Security
  • Topic E: Detective and Preventive Measures
  • Topic F: Patch and Vulnerability Management
  • Topic G: Logging and Monitoring
  • Topic H: Incident Response
  • Topic I: Investigations
  • Topic J: Disaster Recovery Planning
  • Topic K: Disaster Recovery Strategies
  • Topic L: Disaster Recovery Implementation

 


Lesson 8: Software Development Security

  • Topic A: Security Principles in the System Lifecycle
  • Topic B: Security Principles in the Software Development Lifecycle
  • Topic C: Security Controls in the Development Environment
  • Topic D: Database Security in Software Development
  • Topic E: Software Security Effectiveness Assessment
Providers and Associations
Providing the best training services and benefits to our valued clients
Boost certificate of completion
BOOST's Professional Attendance Certificate “BPAC” is always given to the delegates after completing the training course, and depends on their attendance of the program at a rate of no less than 80%, besides their active participation and engagement during the program sessions.
ENDORSED EDUCATION PROVIDER
Over all rating
Excellent
Average
Below average
Flexible deadlines
Customized dates accordance to your schedule
Shareable Certificate
Earn certificate upon completion
COURSE METHODOLOGY

Our Training programs are implemented by combining the participants' academic knowledge and practical practice (30% theoretical / 70% practical activities).

At The end of the training program, Participants are involved in practical workshop to show their skills in applying what they were trained for. A detailed report is submitted to each participant and the training department in the organization on the results of the participant's performance and the return on training. Our programs focus on exercises, case studies, and individual and group presentations.

Trending Courses
The most bespoke and flexible training courses
17
Feb
- 05 -
Days
Artificial Intelligence for Leaders
Abu Dhabi, UAE
15
Dec
- 05 -
Days
The Business Analyst (PBA) - PMI Certified
Dubai, UAE
18
Aug
- 05 -
Days
ISO 55001 2014 Lead Auditor (Asset Management Systems) – Lead Auditor
Muscat, Oman
10
Feb
- 05 -
Days
The Scheduling Professional (PMI-SP Exam Preparation)
Dubai, UAE
13
Apr
- 05 -
Days
OSHA: Occupational Safety and Health Administration Standards
Riyadh, KSA
30
Jun
- 05 -
Days
The Risk Management Professional (PMI-RMP Exam Preparation)
Istanbul, Turkey
14
Sep
- 05 -
Days
Competitive Bidding: Understanding Procurement Bids
Riyadh, KSA
10
Nov
- 05 -
Days
Practical Negotiation Skills for Contract Management
Jeddah, KSA
07
Apr
- 05 -
Days
IOSH Managing and Working Safely
Abu Dhabi, UAE
10
Aug
- 05 -
Days
Emotional Intelligence and Advanced Communication Skills for Leaders
Salalah, Oman
01
Sep
- 05 -
Days
Introduction to Machine Learning and Artificial Intelligence
Abu Dhabi, UAE
20
Jan
- 05 -
Days
Certified Treasury Professional
Dubai, UAE
24
Nov
- 03 -
Days
Happiness To Have and Hold
Dubai, UAE
20
Jan
- 05 -
Days
Leading and Building a Positive, Motivated, and Empowered Teams
Online, Virtual
18
May
- 05 -
Days
Professional in Business Analysis (PMI-PBA Exam Preparation)
Jeddah, KSA
01
Sep
- 05 -
Days
Certified Business Analysis Professional- IIBA
Dubai, UAE