Centriq Training Print Logo


September 25 04:32 AM


CISSP Test Preparation Training Class:

  • Ways to Train:
  • Live Classroom
    Class is delivered at a Centriq location with a live instructor actually in the classroom.
  • Live Virtual Class
    Class is delivered live online via Centriq's Virtual Remote technology. Student may attend class from home or office or other location with internet access.
  • HD Class
    Class is delivered via award winning HD-ILT at Centriq's facility. Students view the live instructor utilizing a 60'' HD monitor.
  • Ways to Buy:
  • Retail
    Class can be purchased directly via check, credit card, or PO.
  • CV Centriq Vouchers
    Class is available for students using Centriq Vouchers.
  • CP Centriq Choice Pass Eligible
    Class is available to students utilizing Centriq Choice Pass program.
Start Date End Date Duration Days Start Time End Time Time Zone Location Ways to Train Ways to Buy Price
11.14.22 11.18.22 5 Days M-F 10:00AM 6:00PM Central Virtual Only Live Virtual Classroom Cash CV Centriq Vouchers $3395.00
8.0 CV
Enroll Now

Welcome to Certified Information Systems Security Professional (CISSP). With your completion of the prerequisites and necessary years of experience, you are firmly grounded in the knowledge requirements of today’s security professional. This course will expand upon your knowledge by addressing the essential elements of the 8 domains that comprise a Common Body of Knowledge (CBK) for information systems security professionals. The course will help to prepare you for the exam through the discussion of the how & why of the exam questions and is designed as a test prep course.


Students pursuing CISSP training want to establish themselves as credible computer security professionals through a study of all 8 CISSP Common Body of Knowledge domains. Validating this knowledge is the goal of certification; therefore, students attending this training should also meet the requirements needed to sit for the CISSP certification exam. These include five years of direct professional work experience in one or more fields related to 8 CBK security domains, or a college degree and four years of experience. Check with (ISC)2 for the most up-to-date requirements. New certifications have emerged and will continue to emerge from (ISC)2, which may cause changes to base requirements.


Students should have certifications in A+, Network+, or Security+, or possess equivalent professional experience. Students may have one or more of the following certifications or equivalent experience: MCSE, SCNP, CCNP, RHCE, LCE, CNE, SSCP, SANS, or GIAC.

Course Completion

You will develop strategies for studying for the exam, and for answering confusingly worded and seemingly unanswerable questions. The class includes eight exam simulation quizzes as well supplemental study materials. You will discover how networks are designed for security, and the components, protocols, and services that allow telecommunications to occur in a secure manner. Next, you will learn about the principles of security management and how to manage risk as part of a comprehensive information security management program. You will explore applications and systems development security controls. Then, will learn cryptography and system architecture. You will examine operations security and the appropriate controls to keep operations secure. You will learn business continuity planning and physical security to protect organizational assets and resources. Finally, you will explore law, investigations, and ethics with respect to information systems security and computer forensics.


The eight domains are:

  • Security and Risk Management

  • Asset Security

  • Security Engineering

  • Communication and Network Security

  • Identity and Access Management

  • Security Assessment and Testing

  • Security Operations

  • Software Development Security

View the CISSP Test Preparation Training Course Outline

Security Governance Through Principles and Policies

Personnel Security and Risk Management Concepts

Business Continuity Planning

Laws, Regulations, and Compliance

Protecting Security of Assets

Cryptography and Symmetric Key Algorithms

PKI and Cryptographic Applications

Principles of Security Models, Design, and Capabilities

Security Vulnerabilities, Threats, and Countermeasures

Physical Security Requirements

Secure Network Architecture and Securing Network Components

Secure Communications and Network Attacks

Managing Identity and Authentication

Controlling and Monitoring Access

Security Assessment and Testing

Managing Security Operations

Preventing and Responding to Incidents

Disaster Recovery Planning

Incidents and Ethics

Software Development Security

Malicious Codes and Application Attacks

Enroll Now!