Description
About this Course
The Certified Information Systems Security Professional (CISSP) is the most-esteemed cybersecurity certification in the world. The CISSP recognizes information security leaders who understand cybersecurity strategy, as well as hands-on implementation. It shows you have the knowledge and experience to design, develop and manage the overall security posture of an organization.
As an ISC2 Official Training Partner, we use courseware developed by ISC2 to ensure your training is relevant and up-to-date. Our instructors are verified security experts who hold the CISSP and have completed intensive training to teach ISC2 content.
CISSP benefits for individuals
- Instant credibility and differentiation - Positioned as an authority figure on cybersecurity, proving proficiency to keep up with new technologies, developments and threats. Quickly conveys knowledge and inspires trust.
- Unique recognition - The highest standard for cybersecurity expertise. It’s vendor-neutral, accredited and requires both practical knowledge and professional experience to earn.
- Enhanced knowledge and skill set - Advanced knowledge and skills to stay ahead of cybersecurity best practices, evolving technologies and mitigation strategies.
- Versatility - Vendor-neutral and multivendor knowledge can be applied across different technologies and methodologies, increasing marketability and ensuring ability to protect sensitive data in a global environment.
- Career advancement - Raises visibility and credibility, improves job security and creates new job opportunities.
CISSP benefits for the organisation
- Secure the organisation’s critical data - Strengthen the security posture with qualified professionals who have proven expertise to competently design, build and maintain a secure business environment.
- Increase overall cybersecurity IQ - Implement the latest security best practices. Improve cybersecurity coherence across the organisation. Ensure professionals speak the same language across disciplines and have cross-department perspective.
- Instant respect and credibility - Increase organisational integrity in the eyes of clients and other stakeholders.
- Satisfy requirements - Meet certification mandates for service providers and subcontractors.
- Stay current - Ensure work teams are up to date on emerging and evolving technologies, threats and mitigation strategies by meeting ISC2 Continuing Professional Education (CPE) requirements.
Target Audience
This CISSP course is tailored for IT and security professionals ready to elevate their skills to the highest industry standards. Ideal for those with a passion for cybersecurity excellence, the program is a perfect fit for:
- Security Practitioners
- IT Managers & Executives
- Network Architects & Analysts
- Compliance & Governance Professionals
- C-Level Technical & Information Security Executives
✨ If you don’t fit any of the above profiles but are in a tech role with cybersecurity aspirations, completing the CISSP exam and becoming an Associate of ISC2 can be a game-changer for your career. Earning your Associate status not only sets you on track to achieving full certification but also earns respect as you build experience and expertise.
Course Outline
- Understand, adhere to, and promote professional ethics.
- Understand and apply security concepts.
- Evaluate and apply security governance principles.
- Understand legal, regulatory, and compliance issues that pertain to information security in a holistic context.
- Understand requirements for investigation types (i.e., administrative, criminal, civil, regulatory, industry standards).
- Develop, document, and implement security policy, standards, procedures, and guidelines.
- Identify, analyze, assess, prioritize, and implement Business Continuity (BC) requirements.
- Contribute to and enforce personnel security policies and procedures.
- Understand and apply risk management concepts.
- Understand and apply threat modeling concepts and methodologies.
- Apply Supply Chain Risk Management (SCRM) concepts.
- Establish and maintain a security awareness, education, and training program.
- Identify and classify information and assets.
- Establish information and asset handling requirements.
- Provision information and assets securely.
- Manage data lifecycle.
- Ensure appropriate asset retention (e.g., End of Life (EOL), End of Support).
- Determine data security controls and compliance requirements.
- Research, implement and manage engineering processes using secure design principles.
- Understand the fundamental concepts of security models (e.g., Biba, Star Model, Bell-LaPadula).
- Select controls based upon systems security requirements.
- Understand security capabilities of Information Systems (IS) (e.g., memory protection, Trusted Platform Module (TPM), encryption/decryption).
- Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements.
- Select and determine cryptographic solutions.
- Understand methods of cryptanalytic attacks.
- Apply security principles to site and facility design.
- Design site and facility security controls.
- Manage the information system lifecycle.
- Apply secure design principles in network architectures.
- Secure network components.
- Implement secure communication channels according to design.
- Control physical and logical access to assets.
- Design identification and authentication strategy (e.g., people, devices, and services).
- Federated identity with a third-party service.
- Implement and manage authorization mechanisms.
- Manage the identity and access provisioning lifecycle.
- Implement authentication systems.
- Design and validate assessment, test, and audit strategies.
- Conduct security control testing.
- Collect security process data (e.g., technical and administrative).
- Analyze test output and generate report.
- Conduct or facilitate security audits.
- Understand and comply with investigations.
- Conduct logging and monitoring activities.
- Perform Configuration Management (CM) (e.g., provisioning, baselining, automation).
- Apply foundational security operations concepts.
- Apply resource protection.
- Conduct incident management.
- Operate and maintain detection and preventative measures.
- Implement and support patch and vulnerability management.
- Understand and participate in change management processes.
- Implement recovery strategies.
- Implement Disaster Recovery (DR) processes.
- Test Disaster Recovery Plans (DRP).
- Participate in Business Continuity (BC) planning and exercises.
- Implement and manage physical security.
- Address personnel safety and security concerns.
- Understand and integrate security in the Software Development Life Cycle (SDLC).
- Identify and apply security controls in software development ecosystems.
- Assess the effectiveness of software security.
- Assess security impact of acquired software.
- Define and apply secure coding guidelines and standards.
Objectives & Outcomes
After completing this course, you should be able to:
- Apply fundamental concepts and methods related to the fields of information technology and security.
- Align overall organizational operational goals with security functions and implementations.
- Determine how to protect assets of the organization as they go through their lifecycle.
- Leverage the concepts, principles, structures, and standards used to design, implement, monitor, and secure operating systems, equipment, networks, applications, and those controls used to enforce various levels of confidentiality, integrity, and availability.
- Apply security design principles to select appropriate mitigations for vulnerabilities present in common information system types and architectures.
- Explain the importance of cryptography and the security services it can provide in today’s digital and information age.
- Evaluate physical security elements relative to information security needs.
- Evaluate the elements that comprise communication and network security relative to information security needs.
- Leverage the concepts and architecture that define the associated technology and implementation systems and protocols at Open Systems Interconnection (OSI) model layers 1–7 to meet information security needs.
- Determine appropriate access control models to meet business security requirements.
- Apply physical and logical access controls to meet information security needs.
- Differentiate between primary methods for designing and validating test and audit strategies that support information security requirements.
- Apply appropriate security controls and countermeasures to optimize an organization’s operational function and capacity.
- Assess information systems risks to an organization’s operational endeavors
- Determine appropriate controls to mitigate specific threats and vulnerabilities.
- Apply information systems security concepts to mitigate the risk of software and systems vulnerabilities throughout the systems’ lifecycles.
Certification
To achieve the ISC2 CISSP certification, you must pass the exam and have at least five years of cumulative, paid work experience in two or more of the eight domains of the ISC2 CISSP Common Body of Knowledge (CBK). Full details can be found here.
Don’t have enough experience yet? You can still pass the CISSP exam and become an Associate of ISC2 while you earn the required work experience. The Associate of ISC2 have six years to earn the five years required experience. The CISSP exam is 3 hours long with 100-150 multiple choice and advanced innovative questions. The exam uses Computerized Adaptive Testing (CAT) and can be taken only in-person at PearsonVUE Select Testing Centers. You must achieve 700 out of 1000 points to pass. |
Funding
Students successfully completing the ISC2 CISSP Course can apply for the Get Qualified Scheme which will enable them to benefit from a tax credit of €2,000.
For further details and assistance on how to apply for this scheme, kindly contact us for an appointment. |
Pay Monthly
Thanks to ICE Malta’s Easy Payment Scheme, you can design an interest-free monthly payment plan to cover your tuition. No banks involved. Discover more. |
Course Details
MODE OF STUDY
PARTTIME - Online Live
DELIVERY METHOD
Live Lectures, Demos, Case Studies & Discussions
ENTRY REQUIREMENTS
Proficiency in English
18 years of age or older
Recommended 5 years experience working in IT Infrastructure and Cybersecurity.
DELIVERY LANGUAGE
English
ONLINE CLASS REQUIREMENTS
Mac or Windows PC
WebCam
Stable Internet Connection
DURATION
42 Hours (14 Lessons of 3 Hours)
DAY(S)
Tuesday & Thursday
TIME
6.00PM till 9.00PM
STARTING DATE
Tuesday 6th May 2025
END DATE
Thursday 19th June 2025
WHAT'S INCLUDED
- Training by an ISC2 Certified Instructor
- Official ISC2 Courseware
- Official ISC2 Activities & Case Studies
- Official ISC2 Practice Test
- Official ISC2 Exam Voucher
- Official ISC2 Certificate of Completion
- 6-Months Post-Course Educator Email Support
- 90-Day Lesson Playback (Rewatch On-Demand) NEW
- Industry-Designed Workshops BONUS
Price: € 2895
€
The Certified Information Systems Security Professional (CISSP) is the most-esteemed cybersecurity certification in the world. The CISSP recognizes information security leaders who understand cybersecurity strategy, as well as hands-on implementation. It shows you have the knowledge and experience to design, develop and manage the overall security posture of an organization.
As an ISC2 Official Training Partner, we use courseware developed by ISC2 to ensure your training is relevant and up-to-date. Our instructors are verified security experts who hold the CISSP and have completed intensive training to teach ISC2 content.
CISSP benefits for individuals
- Instant credibility and differentiation - Positioned as an authority figure on cybersecurity, proving proficiency to keep up with new technologies, developments and threats. Quickly conveys knowledge and inspires trust.
- Unique recognition - The highest standard for cybersecurity expertise. It’s vendor-neutral, accredited and requires both practical knowledge and professional experience to earn.
- Enhanced knowledge and skill set - Advanced knowledge and skills to stay ahead of cybersecurity best practices, evolving technologies and mitigation strategies.
- Versatility - Vendor-neutral and multivendor knowledge can be applied across different technologies and methodologies, increasing marketability and ensuring ability to protect sensitive data in a global environment.
- Career advancement - Raises visibility and credibility, improves job security and creates new job opportunities.
CISSP benefits for the organisation
- Secure the organisation’s critical data - Strengthen the security posture with qualified professionals who have proven expertise to competently design, build and maintain a secure business environment.
- Increase overall cybersecurity IQ - Implement the latest security best practices. Improve cybersecurity coherence across the organisation. Ensure professionals speak the same language across disciplines and have cross-department perspective.
- Instant respect and credibility - Increase organisational integrity in the eyes of clients and other stakeholders.
- Satisfy requirements - Meet certification mandates for service providers and subcontractors.
- Stay current - Ensure work teams are up to date on emerging and evolving technologies, threats and mitigation strategies by meeting ISC2 Continuing Professional Education (CPE) requirements.
Target Audience
This CISSP course is tailored for IT and security professionals ready to elevate their skills to the highest industry standards. Ideal for those with a passion for cybersecurity excellence, the program is a perfect fit for:
- Security Practitioners
- IT Managers & Executives
- Network Architects & Analysts
- Compliance & Governance Professionals
- C-Level Technical & Information Security Executives
✨ If you don’t fit any of the above profiles but are in a tech role with cybersecurity aspirations, completing the CISSP exam and becoming an Associate of ISC2 can be a game-changer for your career. Earning your Associate status not only sets you on track to achieving full certification but also earns respect as you build experience and expertise.
- Understand, adhere to, and promote professional ethics.
- Understand and apply security concepts.
- Evaluate and apply security governance principles.
- Understand legal, regulatory, and compliance issues that pertain to information security in a holistic context.
- Understand requirements for investigation types (i.e., administrative, criminal, civil, regulatory, industry standards).
- Develop, document, and implement security policy, standards, procedures, and guidelines.
- Identify, analyze, assess, prioritize, and implement Business Continuity (BC) requirements.
- Contribute to and enforce personnel security policies and procedures.
- Understand and apply risk management concepts.
- Understand and apply threat modeling concepts and methodologies.
- Apply Supply Chain Risk Management (SCRM) concepts.
- Establish and maintain a security awareness, education, and training program.
- Identify and classify information and assets.
- Establish information and asset handling requirements.
- Provision information and assets securely.
- Manage data lifecycle.
- Ensure appropriate asset retention (e.g., End of Life (EOL), End of Support).
- Determine data security controls and compliance requirements.
- Research, implement and manage engineering processes using secure design principles.
- Understand the fundamental concepts of security models (e.g., Biba, Star Model, Bell-LaPadula).
- Select controls based upon systems security requirements.
- Understand security capabilities of Information Systems (IS) (e.g., memory protection, Trusted Platform Module (TPM), encryption/decryption).
- Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements.
- Select and determine cryptographic solutions.
- Understand methods of cryptanalytic attacks.
- Apply security principles to site and facility design.
- Design site and facility security controls.
- Manage the information system lifecycle.
- Apply secure design principles in network architectures.
- Secure network components.
- Implement secure communication channels according to design.
- Control physical and logical access to assets.
- Design identification and authentication strategy (e.g., people, devices, and services).
- Federated identity with a third-party service.
- Implement and manage authorization mechanisms.
- Manage the identity and access provisioning lifecycle.
- Implement authentication systems.
- Design and validate assessment, test, and audit strategies.
- Conduct security control testing.
- Collect security process data (e.g., technical and administrative).
- Analyze test output and generate report.
- Conduct or facilitate security audits.
- Understand and comply with investigations.
- Conduct logging and monitoring activities.
- Perform Configuration Management (CM) (e.g., provisioning, baselining, automation).
- Apply foundational security operations concepts.
- Apply resource protection.
- Conduct incident management.
- Operate and maintain detection and preventative measures.
- Implement and support patch and vulnerability management.
- Understand and participate in change management processes.
- Implement recovery strategies.
- Implement Disaster Recovery (DR) processes.
- Test Disaster Recovery Plans (DRP).
- Participate in Business Continuity (BC) planning and exercises.
- Implement and manage physical security.
- Address personnel safety and security concerns.
- Understand and integrate security in the Software Development Life Cycle (SDLC).
- Identify and apply security controls in software development ecosystems.
- Assess the effectiveness of software security.
- Assess security impact of acquired software.
- Define and apply secure coding guidelines and standards.
After completing this course, you should be able to:
- Apply fundamental concepts and methods related to the fields of information technology and security.
- Align overall organizational operational goals with security functions and implementations.
- Determine how to protect assets of the organization as they go through their lifecycle.
- Leverage the concepts, principles, structures, and standards used to design, implement, monitor, and secure operating systems, equipment, networks, applications, and those controls used to enforce various levels of confidentiality, integrity, and availability.
- Apply security design principles to select appropriate mitigations for vulnerabilities present in common information system types and architectures.
- Explain the importance of cryptography and the security services it can provide in today’s digital and information age.
- Evaluate physical security elements relative to information security needs.
- Evaluate the elements that comprise communication and network security relative to information security needs.
- Leverage the concepts and architecture that define the associated technology and implementation systems and protocols at Open Systems Interconnection (OSI) model layers 1–7 to meet information security needs.
- Determine appropriate access control models to meet business security requirements.
- Apply physical and logical access controls to meet information security needs.
- Differentiate between primary methods for designing and validating test and audit strategies that support information security requirements.
- Apply appropriate security controls and countermeasures to optimize an organization’s operational function and capacity.
- Assess information systems risks to an organization’s operational endeavors
- Determine appropriate controls to mitigate specific threats and vulnerabilities.
- Apply information systems security concepts to mitigate the risk of software and systems vulnerabilities throughout the systems’ lifecycles.
To achieve the ISC2 CISSP certification, you must pass the exam and have at least five years of cumulative, paid work experience in two or more of the eight domains of the ISC2 CISSP Common Body of Knowledge (CBK). Full details can be found here.
Don’t have enough experience yet? You can still pass the CISSP exam and become an Associate of ISC2 while you earn the required work experience. The Associate of ISC2 have six years to earn the five years required experience. The CISSP exam is 3 hours long with 100-150 multiple choice and advanced innovative questions. The exam uses Computerized Adaptive Testing (CAT) and can be taken only in-person at PearsonVUE Select Testing Centers. You must achieve 700 out of 1000 points to pass. |
Students successfully completing the ISC2 CISSP Course can apply for the Get Qualified Scheme which will enable them to benefit from a tax credit of €2,000.
For further details and assistance on how to apply for this scheme, kindly contact us for an appointment. |
Pay Monthly
Thanks to ICE Malta’s Easy Payment Scheme, you can design an interest-free monthly payment plan to cover your tuition. No banks involved. Discover more. |
MODE OF STUDY
PARTTIME - Online Live
DELIVERY METHOD
Live Lectures, Demos, Case Studies & Discussions
ENTRY REQUIREMENTS
Proficiency in English
18 years of age or older
Recommended 5 years experience working in IT Infrastructure and Cybersecurity.
DELIVERY LANGUAGE
English
ONLINE CLASS REQUIREMENTS
Mac or Windows PC
WebCam
Stable Internet Connection
DURATION
42 Hours (14 Lessons of 3 Hours)
DAY(S)
Tuesday & Thursday
TIME
6.00PM till 9.00PM
STARTING DATE
Tuesday 6th May 2025
END DATE
Thursday 19th June 2025
WHAT'S INCLUDED
- Training by an ISC2 Certified Instructor
- Official ISC2 Courseware
- Official ISC2 Activities & Case Studies
- Official ISC2 Practice Test
- Official ISC2 Exam Voucher
- Official ISC2 Certificate of Completion
- 6-Months Post-Course Educator Email Support
- 90-Day Lesson Playback (Rewatch On-Demand) NEW
- Industry-Designed Workshops BONUS
Price: € 2895
€