Certified Information Systems Security Professional
5-day training course, $2795
5-day virtual (no travel) training course, $2795


This CISSP training course prepares participants to take the (ISC) CISSP exam, which is administered independently of this training course. Our CISSP course agenda covers subject matter in a variety of Information Security topics. During this training course attendees will receive expert instruction from our instructors posessing hands-on experience while complete subject matter required to prepare for the (ISC) CISSP exam is covered.

The course focuses on ten areas of interest, which are also called domains. Participants will gain indepth knowledge about the following CBK domains:

  • Access Control
    • Categories and Controls
    • Control Threats and countermeasures
  • Application Development Security
    • Software Based Controls
    • Software Development Lifecycle and Principles
  • Business Continuity and Disaster Recovery Planning
    • Response and Recovery Plans
    • Restoration Activities
  • Cryptography
    • Basic Concepts and Algorithms
    • Cryptography standards and algorithms
    • Signatures and Certification
    • Cryptanalysis
  • Information Security Governance and Risk Management
    • Policies, Standards, Guidelines and Procedures
    • Risk Management Tools and Practices
    • Planning and Organization
  • Legal, Regulations, Investigations and Compliance
    • Major Legal Systems
    • Common and Civil Law
    • Regulations, Laws and Information Security
  • Operations Security
    • Media, Backups and Change Control Management
    • Controls Categories
  • Physical (Environmental) Security
    • Layered Physical Defense and Entry Points
    • Site Location Principles
  • Security Architecture and Design
    • Principles and Benefits
    • Trusted Systems and Computing Base
    • System and Enterprise Architecture
  • Telecommunications and Network Security
    • Network Security Concepts and Risks
    • Business Goals and Network Security

Course Deliverables

  • Up-to-date study guide
  • Custom course materials
  • McGraw-Hill's CISSP Certification All-in-One Exam Guide (5th Edition)
  • Quick reference CISSP Exam Crib Sheet CISSP certification practice exam

CISSP Certification Requirements

This training course is ideal for IT consultants, managers, security policy writers, network administrators, security device administrators, and security engineers including security professionals requiring CISSP certification.

Candidates for the CISSP must:

  • Possess a minimum of five years of direct full-time security work experience in two or more of the ten (ISC) information security domains. One year may be waived for having either a four-year college degree, a Master's degree in Information Security, or for possessing one of a number of other certifications from other organizations. A candidate not possessing the necessary five years of experience may earn the Associate of (ISC) designation by passing the required CISSP examination. The Associate of (ISC) for CISSP designation is valid for a maximum of six years from the date (ISC) notifies the candidate of having passed the exam. During those six years a candidate will need to obtain the required experience and submit the required endorsement form for certification as a CISSP. Upon completion of the professional experience requirements the certification will be converted to CISSP status.
  • Pass the CISSP exam with a scaled score of 700 points or greater out of 1000 possible points. The exam is multiple choice, consisting of 250 questions with four options each, to be answered over a period of six hours. 25 of the questions are experimental questions which are not graded.



  • Course Overview
  • CISSP Candidate Requirements
  • CISSP Exam Review

Operations Security

  • Operation Security Principles, Techniques, and Mechanisms
  • Principles and Practices of Good Security
  • Resource Protection Mechanisms and Techniques
  • Attacks and Prevention Methods

Access Control

  • Authentication
  • Authorization
  • Accountability
  • Threats to Access Control


  • History of Cryptography
  • Symmetric Encryption
  • Asymmetric Encryption
  • Hashing and Digital Signatures
  • Public Key Infrastructure
  • Cryptographic Attacks

Security Architecture and Design

  • Computer Architecture
  • Rings of Protection
  • Security Models
  • System Evaluation

Telecommunications and Network Security

  • The OSI Model
  • The TCP/IP Model
  • WAN Protocols
  • Routing
  • Wireless Systems
  • Fault Tolerance

Disaster Recovery and Business Continuity Planning

  • Disaster Recovery Planning
  • Business Impact Analysis
  • Business Continuity Planning
  • Backup and Off-Site Facilities
  • Testing Contingency Plans

Legal, Regulations, Compliance, and Investigations

  • Laws and Ethics
  • Computer Crime
  • Incident Response and Forensics

Software Development Security

  • Database Security
  • System Development
  • Software Development Methods
  • Threats and Vulnerabilities

Information Security and Risk Management

  • Security Management
  • Risk Analysis
  • Classification Controls

Environmental Security

  • Threats to Physical Security
  • Administrative Controls
  • Environmental and Safety Controls
  • Physical and Technical Controls

Test Review and Preparation

  • Test Review
  • Test Registration
  • Test Preparation
  • Certification Maintenance

Dates, Locations and Registration


TCP/IP Networking

Follow-On Courses:

Cybersecurity Essentials


Training & Certification:
   w Call Center
   w IT Support Center
   w ITIL
   w Help Desk

   w Telecom

Call Center Operations
Technical Support
Call Center Technology
Online Support
Customer Satisfaction
Knock Your Socks Off
Help Desk Institute
Telecom Books
Communication Skills
Call Center Monitoring
Metrics / Benchmarking
Hiring & Retention
Outbound Telesales
Novelty Gifts & Humor
Half-Priced Books

Subject Index
Catalog Index

Shipping Options
About Us
Contact Us

Registration Fees

Both classroom training and virtual (online) training formats are available.

The per student registration fee for the hands-on classroom session is $2795, and includes the seminar, course materials, and morning and afternoon refreshments.

Registration fee for the 5-day virtual training session is $2795.

Classoom training begins at 8:30 AM each day and concludes at 4:30 PM unless otherwise directed. Please arrive early on the first day to sign-in and meet fellow attendees. If you register less than one week in advance of a class, please bring your confirmation letter. Business casual attire is appropriate. For information on virtual training session start and stop times, refer to the course schedule below.

Register securely online with confidence or please call (708) 246-0320.

Seminar Schedule

More Training and Certification Courses

Terms & Conditions

Seminar provider is not responsible for losses due to cancellation. In all circumstances, seminar provider's liability shall be limited to fees received.

Seminar agenda and assigned instructors are subject to change.

Public Training Terms & Conditions

Payment is due prior to the seminar.

Public seminar cancellation policy.  Registrants may cancel up to fourteen days in advance of the seminar start date for a full refund, less administrative fees of $400.  Or, you may transfer your registration to another member of your company at no additional charge.  Registrants canceling within fourteen days of the seminar will receive training credit, less administrative fees of $400 toward any other Resource Center seminar.

In the unlikely event that a seminar must be cancelled by seminar provider due to unavoidable circumstances, you will be notified at least two weeks prior to the seminar date, and your payment will be refunded.  Seminar provider is not responsible for losses due to cancellation including losses on advanced purchase airfares.  We strongly recommend that attendees traveling by air to attend the seminar purchase only refundable tickets.Become a certified callcenter manager