Certified Information Systems Security Professional (CISSP) Training

Commitment 5 Days, 7-8 hours a day.
Language English
User Ratings Average User Rating 4.8 See what learners said
Delivery Options Instructor-Led Onsite, Online, and Classroom Live


Gain core knowledge and experience to successfully implement and manage security programs and prepare for the CISSP certification. Authorized CISSP Certification training is often considered a leading choice for IT personnel interested in information security training. Our Certified Information Systems Security Professional (CISSP) Training prep course will review eight of the most relevant information security domains, all of which deliver a wealth of current information on the Common Body of Knowledge (CBK) for the CISSP exam.

This CISSP Certification Training Workshop is the most comprehensive review of information security concepts and industry best practices and focuses on the eight domains of the CISSP CBK (Common Body of Knowledge) that are covered in the CISSP exam. You will gain knowledge in information security that will increase your ability to successfully implement and manage security programs in any organization or government entity.


The CISSP exam is challenging, but the benefits are immense. Due to its comprehensive breadth, CISSP is the de facto certification to show competence in cyber roles. It’s also one of the top-paying certifications in IT. This CISSP Certification Training course supports a certification that is a DoD Approved 8570 Baseline Certification and meets DoD 8140/8570 training requirements.

  • Five days of Certified Information Systems Security Professional (CISSP) Training with a CISSP-certified instructor
  • Official (ISC)²® Course Material
  • Pre-Exam Assessment
  • Exam Voucher (expires in 1 year)
  • 100% Satisfaction Guarantee
  • Exam Pass Guarantee
  • Official (ISC)² CISSP Practice Exam (+100 Questions)



ENO Institute’s official CISSP Certification training course reviews the eight CISSP certification domains featured in the (ISC)² Common Body of Knowledge (CBK). Reviewing the CBK will help students successfully prepare for the CISSP exam while also developing their overall competencies in information security.

Additional information on what you can expect to learn while reviewing each domain is found below.

  • Domain 1: Security and Risk Management
  • Domain 2: Asset Security
  • Domain 3: Security Engineering
  • Domain 4: Communications and Network Security
  • Domain 5: Identity and Access Management
  • Domain 6: Security Assessment and Testing
  • Domain 7: Security Operations
  • Domain 8: Software Development Security
  • We can adapt this Certified Information Systems Security Professional (CISSP) Training course to your group’s background and work requirements at little to no added cost.
  • If you are familiar with some aspects of this CISSP Certification Training course, we can omit or shorten their discussion.
  • We can adjust the emphasis placed on the various topics or build the CISSP Certification Training around the mix of technologies of interest to you (including technologies other than those included in this outline).
  • If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the CISSP Certification Training course in a manner understandable to lay audiences.

The CISSP Certification Training program, much like the certification itself, is intended for professionals who are involved in designing, developing, and managing the overall security posture of an organization; from cybersecurity strategy to hands-on implementation. Some example job functions may include, but are not limited to:

  • Security Consultant
  • Security Analyst
  • Security Professionals
  • Security Manager
  • Security Auditor
  • Security Architect
  • IT Director/Manager
  • Director of Security
  • Network Architect
  • Security Systems Engineer
  • Chief Information Security Officer
  • IT professionals interested in obtaining the CISSP credential

You should have a minimum of five years of experience working in IT Infrastructure and Cybersecurity before registering for Certified Information Systems Security Professional (CISSP) Training.


Day 1
Security & risk management
  • Confidentiality, integrity, and availability
  • Security governance policies and their supporting counterparts
  • Compliance
  • Global information security
  • Legal and regulatory policies
  • Professional ethics
  • Business continuity
  • Personnel security
  • Risk management
  • Threat modeling
  • Acquisition security
  • Security awareness
Day 2
Asset security
  • Classify information
  • Identify and document asset ownership
  • Asset privacy concerns
  • Asset retention policies
  • Data security controls
  • Handling requirements
Security engineering
  • Secure engineering processes
  • Review security engineering models
  • Security architecture
  • Web-based vulnerabilities
  • Mobile vulnerabilities
  • Embedded device vulnerabilities
  • Cryptography components and their relationships
  • Site and facility design
  • Physical security
  • Certified Information Systems Security Professional (CISSP) Training
Day 3
Communication and network security
  • Network architecture
  • Network components
  • Communication channels
  • Handling network attacks
Identity and access management
  • Physical and logical access
  • Authentication of people and devices
  • Identity as service (cloud identity)
  • Third-party identity
  • Authorization mechanisms
  • Access control attacks
  • Provisioning life cycle
Day 4
Security assessment and testing
  • Validate assessment
  • Security control
  • Management and operational controls
  • Analyze and report test outputs
  • Internal and third-party audits
  • Security operations
  • Handling investigations
  • Investigation types
  • Logging and monitoring
  • Provisioning of resources
Security operations
  • Resource protection
  • Incident management
  • Preventative measures
  • Patch and vulnerability management
Day 5
Security operations (continued)
  • Change management
  • Disaster recovery
  • Business continuity
  • Manage physical security
  • Personnel safety concerns
Software development security
  • Software development life cycle
  • Security for development environments
  • Software security
  • Purchased software risk
Certified Information Systems Security Professional (CISSP) TrainingCertified Information Systems Security Professional (CISSP) Training Course Recap, Q/A, and Evaluations


    Are you Human?