Eccentrix - Trainings catalog - Information security - Certified Information Systems Security Professional (CISSP) (CS8502)

Certified Information Systems Security Professional (CISSP) (CS8502)

This course complements your broad knowledge and experience in information security. It expands your knowledge by covering the eight domains defined by the Common Body of Knowledge (CBK) for information security professionals. The training offers an approach based on implementing a security process within an enterprise, while also serving as a preparation tool for the CISSP certification.

The CISSP certification is highly regarded in the world of technology and security today. This reputation is maintained because the organization (ISC)² continually improves the content through the engagement of industry experts, ensuring that the material and questions remain relevant despite the ongoing changes and challenges in the security field. By defining the eight CBK domains, an industry standard has been established, and the CISSP training thoroughly covers all of them. The skills and knowledge you will gain from this course will give you a deep understanding of these eight domains, establishing credibility and success for every professional in the field of information security.

Related trainings

Exclusives

  • Video recording: 365 days of access to your course for viewing
  • Class material: Delivered in digital format for everyone, downloadable, accessible during and after the training
  • Proof of attendance: Digital badge and completion certificate available for all participants
  • Fast and guaranteed private class delivery: Maximum wait of 4 to 6 weeks after registration, guaranteed date

Public class

Our public classes allow individual professionals from different organizations to join training sessions via Microsoft Teams, creating a dynamic learning environment. Perfect for individual attendances or smaller teams.

Each date below represents the start date of the training course. Courses may be single-day or multi-day, with most multi-day sessions delivered consecutively. Click on any date to proceed with registration for your preferred session.

Planned date
19.01.2026
1400 EUR
English
Planned date
23.02.2026
1400 EUR
English
Planned date
23.03.2026
1400 EUR
English
Planned date
13.04.2026
1400 EUR
English
Planned date
18.05.2026
1400 EUR
English

Private class

Reserve this training exclusively for your organization with pricing adapted to the number of participants. Our pricing for private training is determined based on the size of your group, with a minimum number of participants required for the training to be held.

  • Volume-based pricing discount according to the number of participants
  • Training delivered in an environment dedicated to your team
  • Scheduling flexibility according to your availability
  • Enhanced interaction among colleagues from the same organization
  • Same exclusive benefits as our public training sessions

How to get a proposal?

Use the request form by specifying the number of participants. We will quickly send you a complete quote with the exact pricing, available dates, and details of all the benefits included in your private training.

Training plan

  • Security Governance Principles
  • Compliance
  • Professional Ethics
  • Security Documentation
  • Risk Management
  • Threat Modeling
  • Business Continuity Plan Fundamentals
  • Acquisition Strategy and Practice
  • Personnel Security Policies
  • Security Awareness and Training
  • Asset Classification
  • Privacy Protection
  • Asset Retention
  • Data Security Controls
  • Secure Data Handling
  • Security in the Engineering Lifecycle
  • System Component Security
  • Security Models
  • Controls and Countermeasures in Enterprise Security
  • Information System Security Capabilities
  • Design and Architecture Vulnerability Mitigation
  • Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
  • Cryptography Concepts
  • Cryptography Techniques
  • Site and Facility Design for Physical Security
  • Physical Security Implementation in Sites and Facilities
  • Network Protocol Security
  • Network Components Security
  • Communication Channel Security
  • Network Attack Mitigation
  • Physical and Logical Access Control
  • Identification, Authentication, and Authorization
  • Identity as a Service
  • Authorization Mechanisms
  • Access Control Attack Mitigation
  • System Security Control Testing
  • Software Security Control Testing
  • Security Process Data Collection
  • Audits
  • Security Operations Concepts
  • Physical Security
  • Personnel Security
  • Logging and Monitoring
  • Preventative Measures
  • Resource Provisioning and Protection
  • Patch and Vulnerability Management
  • Change Management
  • Incident Response
  • Investigations
  • Disaster Recovery Planning
  • Disaster Recovery Strategies
  • Disaster Recovery Implementation
  • Security Principles in the System Lifecycle
  • Security Principles in the Software Development Lifecycle
  • Database Security in Software Development
  • Security Controls in the Development Environment
  • Software Security Effectiveness Assessment

Recommended prerequisite knowledge

  • Basic Understanding of Information Security: Participants should have a fundamental knowledge of information security concepts, such as confidentiality, integrity, and availability.
  • Experience in IT or Related Fields: While not mandatory, it’s beneficial to have some experience in IT, networking, or cybersecurity. This helps in understanding the course content more effectively.
  • Familiarity with Networking Concepts: A basic understanding of networking principles, including TCP/IP, firewalls, and network security, is recommended.
  • Knowledge of Security Policies and Practices: Awareness of security policies, risk management, and security frameworks can be advantageous.
  • Technical Background: While not required, having a technical background in areas such as system administration, software development, or network administration can be helpful in grasping more complex topics covered in the course.
  • Interest in Security Management: A strong interest in cybersecurity management and the desire to learn about advanced security practices is essential.

Even though these prerequisites are helpful, many CISSP course objectives are designed to cater to a wide range of professionals, often providing a start with foundational concepts to build up the knowledge necessary for more advanced topics.

Credentials and certification

Exam features

  • Preparation for the Certified Information Systems Security Professional (CISSP) Certification
  • Cost: 749 USD
  • Questions Format: Multiple choice and advanced innovative questions
  • Duration: 3 hours
  • Number of Questions: 150
  • Passing Score: 700/1000

Exam topics

  • Security and Risk Management
  • Asset Security
  • Security Architecture and Engineering
  • Communication and Network Security
  • Identity and Access Management (IAM)
  • Security Assessment and Testing
  • Security Operations
  • Software Development Security

All details >>

Certified Information Systems Security Professional (CISSP) (CS8502)

The Certified Information Systems Security Professional (CISSP) (CS8502) training is designed for IT professionals who aspire to excel in the field of information security. This globally recognized course prepares participants to safeguard sensitive information, manage security risks, and ensure compliance with industry standards. The training encompasses the eight domains of the CISSP Common Body of Knowledge (CBK), providing a comprehensive understanding of key cybersecurity principles.

Participants will engage in interactive learning and practical exercises, enabling them to prepare effectively for the CISSP certification exam. This certification validates your expertise in designing, implementing, and managing an effective cybersecurity program.

Why Choose the CISSP Certification Training?

The CISSP certification is a gold standard in the cybersecurity industry. It demonstrates your ability to create robust security architectures, manage IT risks, and ensure compliance with organizational security requirements. With cybersecurity threats on the rise, organizations need skilled professionals to protect their critical assets.

This training equips you with the knowledge and skills to excel in high-demand roles such as information security manager, cybersecurity consultant, and IT auditor. Earning the CISSP credential enhances your career prospects and establishes you as a leader in the field.

Key Skills Developed in the Training

  1. Comprehensive security knowledge
    Master the eight domains of the CISSP CBK, including security and risk management, asset security, and security operations.

  2. Risk management and mitigation
    Learn to identify vulnerabilities, evaluate risks, and implement appropriate controls to mitigate potential threats.

  3. Security architecture and engineering
    Develop expertise in designing secure IT systems and implementing effective security frameworks.

  4. Compliance and governance
    Understand regulatory requirements and align security strategies with organizational goals.

  5. Incident response and recovery
    Acquire the skills to manage incidents, recover from breaches, and ensure business continuity.

  6. Prepare for the CISSP certification exam
    Gain the knowledge and confidence to succeed in the CISSP exam, demonstrating your expertise in information security.

Interactive Training by Certified Experts

The CISSP training is delivered by certified instructors with extensive experience in cybersecurity. Participants will benefit from real-world case studies, interactive discussions that reinforce theoretical knowledge with practical application.

Who Should Attend?

This training is ideal for:

  • IT professionals aiming to advance their careers in information security
  • Security consultants and analysts responsible for protecting organizational assets
  • Systems and network administrators seeking to enhance their security expertise
  • Individuals preparing for the CISSP certification exam

Elevate Your Career with CISSP Certification

The Certified Information Systems Security Professional (CISSP) (CS8502) training equips you with the skills and knowledge to lead in the field of information security. Enroll today to earn a globally recognized certification and advance your career in cybersecurity.

Frequently asked questions - CISSP certification training (FAQ)

The training covers the eight domains of the CISSP CBK, including security management, network security, cryptography, and incident response.

Candidates should have at least five years of professional experience in two or more of the eight domains of the CISSP CBK.

Yes, the course features practical exercises and real-world scenarios to enhance learning.

The CISSP credential validates your expertise in information security, increasing your career opportunities and earning potential.

The CISSP is recognized globally by organizations in various industries, including finance, healthcare, and government.

Yes, the course content is fully aligned with the objectives of the CISSP exam, ensuring comprehensive preparation.

Request form for a private class training

Dear Customer,

We thank you for your interest in our services. Here is the important information that will be provided to us upon completion of this form:

Training name: Certified Information Systems Security Professional (CISSP) (CS8502)

Language: English

Duration: 5 days / 35 hours

Number of participants from your organization *

Minimum number of participants: 6

Organization name *
Your first and last name *
Telephone number *
Professional email *
Please provide a work or professional email address.
How did you hear about us? *
Comments or Remarks
The General Conditions are accessible on this page.

Our website uses cookies to personalize your browsing experience. By clicking ‘I accept,’ you consent to the use of cookies.