Eccentrix - Trainings catalog - Information security - Certified Information Systems Security Professional (CISSP) (CS8502)

Certified Information Systems Security Professional (CISSP) (CS8502)

This course complements your broad knowledge and experience in information security. It expands your knowledge by covering the eight domains defined by the Common Body of Knowledge (CBK) for information security professionals. The training offers an approach based on implementing a security process within an enterprise, while also serving as a preparation tool for the CISSP certification.

The CISSP certification is highly regarded in the world of technology and security today. This reputation is maintained because the organization (ISC)² continually improves the content through the engagement of industry experts, ensuring that the material and questions remain relevant despite the ongoing changes and challenges in the security field. By defining the eight CBK domains, an industry standard has been established, and the CISSP training thoroughly covers all of them. The skills and knowledge you will gain from this course will give you a deep understanding of these eight domains, establishing credibility and success for every professional in the field of information security.

Related trainings

Exclusives

  • Video recording: 365 days of access to your course for viewing
  • Class material: Delivered in digital format for everyone, downloadable, accessible during and after the training
  • Proof of attendance: Digital badge and completion certificate available for all participants
  • Fast and guaranteed private class delivery: Maximum wait of 4 to 6 weeks after registration, guaranteed date

Applicable solutions

Discover all the exclusive solutions available for this course to maximize your learning, savings, and benefits. Take advantage of unique offers reserved for our participants.

Public class

Our public classes allow individual professionals from different organizations to join training sessions via Microsoft Teams, creating a dynamic learning environment. Perfect for individual attendances or smaller teams.

Each date below represents the start date of the training course. Courses may be single-day or multi-day, with most multi-day sessions delivered consecutively. Click on any date to proceed with registration for your preferred session.

Planned date
09.02.2026
2350 EUR
English
Planned date
23.02.2026
2350 EUR
English
Planned date
16.03.2026
2350 EUR
English
Planned date
06.04.2026
2350 EUR
English
Planned date
27.04.2026
2350 EUR
English
Planned date
11.05.2026
2350 EUR
English
Planned date
25.05.2026
2350 EUR
English
Planned date
15.06.2026
2350 EUR
English
Planned date
13.07.2026
2350 EUR
English

Private class

Reserve this training exclusively for your organization with pricing adapted to the number of participants. Our pricing for private training is determined based on the size of your group, with a minimum number of participants required for the training to be held.

  • Volume-based pricing discount according to the number of participants
  • Training delivered in an environment dedicated to your team
  • Scheduling flexibility according to your availability
  • Enhanced interaction among colleagues from the same organization
  • Same exclusive benefits as our public training sessions

How to get a proposal?

Use the request form by specifying the number of participants. We will quickly send you a complete quote with the exact pricing, available dates, and details of all the benefits included in your private training.

Certified Information Systems Security Professional (CISSP) CS-8502 Training Plan: Detailed Modules

  • Security Governance Principles
  • Compliance
  • Professional Ethics
  • Security Documentation
  • Risk Management
  • Threat Modeling
  • Business Continuity Plan Fundamentals
  • Acquisition Strategy and Practice
  • Personnel Security Policies
  • Security Awareness and Training
  • Asset Classification
  • Privacy Protection
  • Asset Retention
  • Data Security Controls
  • Secure Data Handling
  • Security in the Engineering Lifecycle
  • System Component Security
  • Security Models
  • Controls and Countermeasures in Enterprise Security
  • Information System Security Capabilities
  • Design and Architecture Vulnerability Mitigation
  • Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
  • Cryptography Concepts
  • Cryptography Techniques
  • Site and Facility Design for Physical Security
  • Physical Security Implementation in Sites and Facilities
  • Network Protocol Security
  • Network Components Security
  • Communication Channel Security
  • Network Attack Mitigation
  • Physical and Logical Access Control
  • Identification, Authentication, and Authorization
  • Identity as a Service
  • Authorization Mechanisms
  • Access Control Attack Mitigation
  • System Security Control Testing
  • Software Security Control Testing
  • Security Process Data Collection
  • Audits
  • Security Operations Concepts
  • Physical Security
  • Personnel Security
  • Logging and Monitoring
  • Preventative Measures
  • Resource Provisioning and Protection
  • Patch and Vulnerability Management
  • Change Management
  • Incident Response
  • Investigations
  • Disaster Recovery Planning
  • Disaster Recovery Strategies
  • Disaster Recovery Implementation
  • Security Principles in the System Lifecycle
  • Security Principles in the Software Development Lifecycle
  • Database Security in Software Development
  • Security Controls in the Development Environment
  • Software Security Effectiveness Assessment

Recommended prerequisite knowledge

  • Basic Understanding of Information Security: Participants should have a fundamental knowledge of information security concepts, such as confidentiality, integrity, and availability.
  • Experience in IT or Related Fields: While not mandatory, it’s beneficial to have some experience in IT, networking, or cybersecurity. This helps in understanding the course content more effectively.
  • Familiarity with Networking Concepts: A basic understanding of networking principles, including TCP/IP, firewalls, and network security, is recommended.
  • Knowledge of Security Policies and Practices: Awareness of security policies, risk management, and security frameworks can be advantageous.
  • Technical Background: While not required, having a technical background in areas such as system administration, software development, or network administration can be helpful in grasping more complex topics covered in the course.
  • Interest in Security Management: A strong interest in cybersecurity management and the desire to learn about advanced security practices is essential.

Even though these prerequisites are helpful, many CISSP course objectives are designed to cater to a wide range of professionals, often providing a start with foundational concepts to build up the knowledge necessary for more advanced topics.

Credentials and certification

Exam features

  • Preparation for the Certified Information Systems Security Professional (CISSP) Certification
  • Cost: 749 USD
  • Questions Format: Multiple choice and advanced innovative questions
  • Duration: 3 hours
  • Number of Questions: 150
  • Passing Score: 700/1000

Exam topics

  • Security and Risk Management
  • Asset Security
  • Security Architecture and Engineering
  • Communication and Network Security
  • Identity and Access Management (IAM)
  • Security Assessment and Testing
  • Security Operations
  • Software Development Security

All details >>

Certified Information Systems Security Professional (CISSP) (CS8502)

The Certified Information Systems Security Professional (CISSP) (CS8502) training is designed for IT professionals who aspire to excel in the field of information security. This globally recognized course prepares participants to safeguard sensitive information, manage security risks, and ensure compliance with industry standards. The training encompasses the eight domains of the CISSP Common Body of Knowledge (CBK), providing a comprehensive understanding of key cybersecurity principles.

Participants will engage in interactive learning and practical exercises, enabling them to prepare effectively for the CISSP certification exam. This certification validates your expertise in designing, implementing, and managing an effective cybersecurity program.

Why Choose the CISSP Certification Training?

The CISSP certification is a gold standard in the cybersecurity industry. It demonstrates your ability to create robust security architectures, manage IT risks, and ensure compliance with organizational security requirements. With cybersecurity threats on the rise, organizations need skilled professionals to protect their critical assets.

This training equips you with the knowledge and skills to excel in high-demand roles such as information security manager, cybersecurity consultant, and IT auditor. Earning the CISSP credential enhances your career prospects and establishes you as a leader in the field.

Key Skills Developed in the Training

  1. Comprehensive security knowledge
    Master the eight domains of the CISSP CBK, including security and risk management, asset security, and security operations.

  2. Risk management and mitigation
    Learn to identify vulnerabilities, evaluate risks, and implement appropriate controls to mitigate potential threats.

  3. Security architecture and engineering
    Develop expertise in designing secure IT systems and implementing effective security frameworks.

  4. Compliance and governance
    Understand regulatory requirements and align security strategies with organizational goals.

  5. Incident response and recovery
    Acquire the skills to manage incidents, recover from breaches, and ensure business continuity.

  6. Prepare for the CISSP certification exam
    Gain the knowledge and confidence to succeed in the CISSP exam, demonstrating your expertise in information security.

Interactive Training by Certified Experts

The CISSP training is delivered by certified instructors with extensive experience in cybersecurity. Participants will benefit from real-world case studies, interactive discussions that reinforce theoretical knowledge with practical application.

Who Should Attend?

This training is ideal for:

  • IT professionals aiming to advance their careers in information security
  • Security consultants and analysts responsible for protecting organizational assets
  • Systems and network administrators seeking to enhance their security expertise
  • Individuals preparing for the CISSP certification exam

Elevate Your Career with CISSP Certification

The Certified Information Systems Security Professional (CISSP) (CS8502) training equips you with the skills and knowledge to lead in the field of information security. Enroll today to earn a globally recognized certification and advance your career in cybersecurity.

Exam Success Strategies for CISSP

Mastering the CISSP certification requires more than technical knowledge—comprehensive understanding of security governance, risk management, asset protection, security architecture, network security, identity and access management, security operations, and software development security are equally crucial for success. By understanding the eight domains of the CISSP Common Body of Knowledge (CBK), security frameworks, compliance requirements, and strategic security leadership, you’ll develop the confidence and expertise needed to excel in this advanced certification exam.

CISSP Exam Statistics & Success Rates

  • Average Pass Rate: 60-70% on first attempt
  • Most Common Score Range: 720-800 out of 1000 for passing candidates (passing score: 700/1000 or 70%)
  • Average Study Time: 16-24 weeks for experienced security professionals with 5+ years in the field
  • Retake Rate: 28-35% of candidates require a second attempt
  • Top Failure Areas: Security and Risk Management (Domain 1, 32%), Security Architecture and Engineering (Domain 3, 28%), Asset Security and cryptography concepts (25%)

Study Method Comparison

Study Approach Duration Pass rate Best for

Self-Study Only

24-28 weeks

45-55%

Experienced security architects

Documentation + Practice

26-30 weeks

60-70%

Methodical learners

Training + Practice Tests

16-24 weeks

75-85%

Comprehensive preparation

Practice Tests Only

12-14 weeks

30-40%

Not recommended

Strategic Study Approach

  • Create a 16-24 week study schedule – CISSP requires mastery of all eight CBK domains: Security and Risk Management, Asset Security, Security Architecture and Engineering, Communication and Network Security, Identity and Access Management, Security Assessment and Testing, Security Operations, and Software Development Security
  • Follow the 50-40-10 rule – 50% reading and understanding security concepts across all domains, 40% practice questions and scenario analysis, 10% review and domain integration
  • Focus on managerial and strategic thinking – CISSP emphasizes “a mile wide and an inch deep” knowledge, requiring broad understanding across all security domains rather than deep technical expertise in one area
  • Study in 90-120 minute blocks with 15-minute breaks to maximize retention of complex security frameworks and concepts
  • Think like a security manager, not a technician – CISSP questions test your ability to make risk-based decisions, prioritize security controls, and align security with business objectives
  • Master all eight domains with equal depth – no domain can be ignored, as the exam draws questions from all areas
  • Understand the “CISSP mindset” – questions often have multiple correct answers; choose the BEST answer based on risk management, cost-effectiveness, and business alignment
  • Practice with adaptive testing simulations – CISSP uses CAT (Computerized Adaptive Testing), where question difficulty adjusts based on your performance

Common Exam Pitfalls to Avoid

  • Don’t confuse security models and frameworks – Know the difference between Bell-LaPadula (confidentiality), Biba (integrity), Clark-Wilson (integrity with transactions), Brewer-Nash (Chinese Wall), and their specific use cases
  • Risk management concepts have precise meanings – Understand risk assessment vs. risk analysis, qualitative vs. quantitative risk analysis, risk acceptance vs. risk mitigation vs. risk transfer vs. risk avoidance, ALE (Annual Loss Expectancy), SLE (Single Loss Expectancy), ARO (Annual Rate of Occurrence)
  • Cryptography requires conceptual understanding – Know symmetric vs. asymmetric encryption, hashing vs. encryption, digital signatures, PKI (Public Key Infrastructure), key management, perfect forward secrecy, and when to use each approach
  • Access control models serve different purposes – Understand DAC (Discretionary Access Control), MAC (Mandatory Access Control), RBAC (Role-Based Access Control), ABAC (Attribute-Based Access Control), and their appropriate applications
  • Security architecture principles are foundational – Know defense in depth, least privilege, separation of duties, need to know, fail-safe defaults, complete mediation, and how to apply them in design decisions
  • Business continuity and disaster recovery are distinct – Understand BCP (Business Continuity Planning), DRP (Disaster Recovery Planning), BIA (Business Impact Analysis), RTO (Recovery Time Objective), RPO (Recovery Point Objective), MTD (Maximum Tolerable Downtime)
  • Legal and compliance requirements vary by jurisdiction – Know the differences between laws, regulations, and standards; understand privacy laws (GDPR, CCPA), industry standards (PCI DSS, HIPAA), and due diligence vs. due care
  • Software security spans the entire lifecycle – Understand secure SDLC, threat modeling, code review, testing methodologies, and security integration at each development phase
  • Physical security is part of the security program – Know environmental controls, facility security, personnel security, and how physical security integrates with logical security
  • Incident response follows a structured process – Understand detection, response, mitigation, reporting, recovery, remediation, and lessons learned phases

Topic Weight Distribution

Exam Domain Weight Focus Areas Priority

Security and Risk Management (Domain 1)

15%

Confidentiality/integrity/availability, governance, compliance, legal, ethics, security policies, risk management

Critical

Asset Security (Domain 2)

10%

Data classification, ownership, privacy, retention, secure handling, cryptography basics

Critical

Security Architecture and Engineering (Domain 3)

13%

Security models, evaluation criteria, security capabilities, secure design principles, cryptography implementation

Critical

Communication and Network Security (Domain 4)

13%

Network architecture, secure protocols, network components, secure communications, network attacks

Critical

Identity and Access Management (IAM) (Domain 5)

13%

Physical and logical access control, identification, authentication, authorization, accountability, identity management

Critical

Security Assessment and Testing (Domain 6)

12%

Assessment strategies, security audits, vulnerability assessments, penetration testing, security metrics

High

Security Operations (Domain 7)

13%

Investigations, incident management, disaster recovery, business continuity, physical security, personnel security

Critical

Software Development Security (Domain 8)

11%

Secure SDLC, application security, database security, secure coding, software testing

High

Exam Day Time Management

  • CISSP uses CAT (Computerized Adaptive Testing) – 100-150 questions, 3 hours maximum
  • The exam adapts to your performance – correct answers lead to harder questions, incorrect answers lead to easier questions
  • Most candidates finish between 100-125 questions – the exam ends when the system determines your competency level with statistical confidence
  • Allocate approximately 1.5-2 minutes per question – read carefully, eliminate obviously wrong answers, choose the BEST remaining option
  • Expect scenario-based questions – CISSP includes detailed scenarios requiring you to apply security principles to business situations
  • There are no performance-based questions (PBQs) – all questions are multiple-choice with four options
  • You cannot skip questions or go back – CAT format requires answering each question before proceeding to the next
  • Manage your mental stamina – the adaptive nature means you’ll face increasingly difficult questions as you perform well; this is normal and expected
  • Pay attention to questions asking for “BEST,” “FIRST,” “MOST,” or “LEAST” – these require careful evaluation of all options and selection based on risk management and business priorities

Managing Exam Stress & Performance

  • Get 7-8 hours of quality sleep the night before – CISSP requires sustained mental focus for up to 3 hours
  • Arrive at the test center 15 minutes early (or log in 10 minutes early for online testing) – settle in and complete check-in procedures calmly
  • Use deep breathing techniques if you feel overwhelmed during the exam – clear thinking is essential for complex scenario analysis
  • Don’t panic if questions seem very difficult – the CAT format increases difficulty as you answer correctly; hard questions indicate you’re performing well
  • Trust your security experience and the “CISSP mindset” – your first instinct based on risk management principles is usually correct
  • Remember that the passing score is 700/1000 (70%) – you need strong competence but not perfection
  • Take the optional 10-minute break if needed – use it to reset mentally, especially if you’ve been testing for 90+ minutes

Technical Preparation Tips

  • Master security governance and risk management – understand security governance frameworks (COBIT, NIST, ISO 27001), risk management methodologies, compliance requirements, legal and regulatory issues, ethics, and security policies
  • Know asset security and data protection – understand data classification schemes (public, internal, confidential, secret, top secret), data lifecycle, data retention, secure disposal, privacy protection (GDPR, CCPA), and data roles (owner, custodian, user)
  • Understand security architecture and engineering – know security models (Bell-LaPadula, Biba, Clark-Wilson), evaluation criteria (Common Criteria, TCSEC), security capabilities (TPM, HSM, secure boot), cryptographic systems (symmetric, asymmetric, hashing, PKI), and secure design principles
  • Master communication and network security – understand OSI and TCP/IP models, network protocols (TCP, UDP, ICMP, IPSec, TLS/SSL), network devices (routers, switches, firewalls, IDS/IPS), wireless security (WPA2, WPA3, 802.1X), and network attacks (DoS, DDoS, man-in-the-middle, spoofing)
  • Know identity and access management – understand access control models (DAC, MAC, RBAC, ABAC), authentication methods (passwords, MFA, biometrics, tokens), single sign-on (SSO), federated identity (SAML, OAuth, OpenID Connect), and access provisioning/deprovisioning
  • Understand security assessment and testing – know vulnerability assessment methodologies, penetration testing phases (reconnaissance, scanning, exploitation, post-exploitation), security audits, log review, and security metrics (KPIs, KRIs)
  • Master security operations – understand incident response (NIST 800-61), forensic procedures, chain of custody, disaster recovery planning, business continuity planning, backup strategies, physical security controls, and personnel security (background checks, separation of duties)
  • Know software development security – understand secure SDLC phases, threat modeling (STRIDE, DREAD), secure coding practices, code review, application testing (SAST, DAST, IAST), database security, and API security

Final Week Preparation

  • Take 3-4 full practice exams (100-150 questions each) to build stamina and identify knowledge gaps 
  • Review the official (ISC)² CISSP exam outline and CBK domains one final time
  • Focus on your weakest domains – Security and Risk Management, Security Architecture and Engineering, and Asset Security are the most common challenge areas
  • Practice the “CISSP mindset” – for each practice question, understand WHY the correct answer is best from a risk management and business perspective
  • Review key frameworks and standards – NIST (800-53, 800-61, Cybersecurity Framework), ISO 27001/27002, COBIT, ITIL, and their applications
  • Avoid learning completely new security concepts – focus on reinforcing and integrating what you already know across all eight domains
  • Prepare your exam day logistics – required identification, test center location (or computer setup for online proctoring)
  • Review the (ISC)² Code of Ethics – understand the four canons and how they apply to professional conduct

Mental Preparation Strategies

  • Visualize success scenarios – imagine yourself calmly analyzing security scenarios and selecting the best risk-based solutions
  • Recall your security experience – you have 5+ years of professional experience; trust your judgment and expertise
  • Stay positive when facing difficult questions – the CAT format is designed to challenge you; difficult questions mean you’re performing well
  • Remember that CISSP tests managerial and strategic thinking – you’re demonstrating leadership capability, not just technical knowledge
  • Approach the exam as a validation of your security expertise and decision-making ability, not a test of memorized facts
  • Embrace the “CISSP mindset” – think like a risk manager who balances security, business needs, and resource constraints

How to Schedule Your CISSP Exam

  • Exam booking is done through the (ISC)² official website at https://www.isc2.org
  • Exam voucher is NOT included in your Eccentrix training – you must purchase the exam separately from (ISC)²
  • Scheduling Process: Create an (ISC)² account, purchase your exam voucher ($749 USD as of 2025), schedule your exam through Pearson VUE (linked from your (ISC)² account), select your preferred test center location, choose your date and time
  • Scheduling Timeline: Book at least 3-4 weeks in advance for better test center and time slot availability
  • Rescheduling Policy: Rescheduling fees apply; check (ISC)² policy for current fees and deadlines
  • Required ID: Two forms of identification required – primary (government-issued photo ID with signature) and secondary (credit card or other ID with name matching registration)
  • Test Center Requirements: CISSP exams are administered at Pearson VUE test centers only; controlled environment with immediate preliminary pass/fail result provided at the end of the exam
  • Experience Requirement: CISSP requires 5 years of cumulative, paid work experience in two or more of the eight domains of the CBK; if you have less than 5 years, you can become an Associate of (ISC)² and earn the CISSP after meeting the experience requirement
  • Endorsement Requirement: After passing the exam, you must be endorsed by an (ISC)² certified professional who can attest to your professional experience

Success Mindset: Approach CISSP as a validation of your ability to lead security programs, make risk-based decisions, and align security strategy with business objectives using broad knowledge across all eight CBK domains, not as a test of deep technical expertise in one area. Your professional security experience and strategic thinking mindset are your greatest assets. Think like a security leader who balances risk, cost, and business value in every decision.

Frequently asked questions - CISSP certification training (FAQ)

The training covers the eight domains of the CISSP CBK, including security management, network security, cryptography, and incident response.

Candidates should have at least five years of professional experience in two or more of the eight domains of the CISSP CBK.

Yes, the course features practical exercises and real-world scenarios to enhance learning.

The CISSP credential validates your expertise in information security, increasing your career opportunities and earning potential.

The CISSP is recognized globally by organizations in various industries, including finance, healthcare, and government.

Yes, the course content is fully aligned with the objectives of the CISSP exam, ensuring comprehensive preparation.

Yes, the CISSP training is offered as a live, interactive virtual class via Microsoft Teams, allowing participants to attend remotely while engaging in practical exercises and expert-led discussions.

The CISSP certification validates your expertise in information security management, risk assessment, and compliance, enhancing your credibility and opening career opportunities in cybersecurity leadership roles.

Request form for a private class training

Dear Customer,

We thank you for your interest in our services. Here is the important information that will be provided to us upon completion of this form:

Training name: Certified Information Systems Security Professional (CISSP) (CS8502)

Language: English

Duration: 5 days / 35 hours

Number of participants from your organization *

Minimum number of participants: 6

Organization name *
Your first and last name *
Telephone number *
Professional email *
Please provide a work or professional email address.
How did you hear about us? *
Comments or Remarks
The General Conditions are accessible on this page.

Our website uses cookies to personalize your browsing experience. By clicking ‘I accept,’ you consent to the use of cookies.