Certified Information Systems Security Professional (CISSP) Training

Network Intelligence has scheduled a 4 day (CISSP) Certified Information Systems Security Professional training for professionals who are looking to appear for their CISSP certification and also for professionals that are looking to get a broad-based view of the key aspects of information security. This training helps professionals to bridge the gap in their knowledge and understand all the key concepts in information security. The CISSP training workshop conducted by Network Intelligence is 28 hours of online training spread across 4 days 7 hours each day.

The CISSP training is designed to help the professionals better understand the 8 domains of information security in much detail. The focus of this course is on security fundamentals, practice tests, chapter review questions, and real-life case studies. We have trained over 1000+ professionals across globe on CISSP and with our participants passing rate of 95% makes our training program very successful.

Network Intelligence even commits to refund the entire training cost to any participants who have appeared for the CISSP examination within 6 months of the training and have been unsuccessful in achieving the passing marks in the CISSP certification.

Training Details:
  • Date: 18th – 21st December 2023
  • Timing: 6:00 AM – 01:00 PM EST
  • Mode: Online through Microsoft Teams
  • Region: Asia & Middle East
  • Fees:
    • USD $ 450 (Early bird discount : Register before 30th November)
    • USD $ 550 (Regular Participant)
Register your interest

Objective of the program:
  • What should one do when there is a suspicion of a computer-based crime?
  • What tools and techniques are most likely to yield the right set of clues?
  • What is the procedure to deal with incident response and remediation?
  • How should the investigation be carried out such that it can be presented in a court of law?
  • Demonstration with the worlds’ leading forensics tool – Encase.
Download CISSP Brochure (PDF)

4 Day – Certified Information Systems Security Professional (CISSP) Training Course Details
Domain 1
  • Understand and apply concepts of confidentiality, integrity and availability
  • Evaluate and apply security governance principles
  • Determine compliance requirements
  • Understand legal and regulatory issues that pertain to information security in a global context
  • Identify, analyse, and prioritize Business Continuity (BC) requirements
  • Understand and apply risk management concepts
  • Apply risk-based management concepts to your environment
  • Establish and maintain a security awareness, education, and training program
Domain 2
  • Identify and classify ownership of information and assets
  • Determine and maintain information and asset ownership
  • Protect privacy
  • Ensure appropriate asset retention
  • Determine data security controls
  • Establish information and asset handling requirements
Domain 3
  • Implement and manage processes using secure design principles
  • Understand the fundamental concepts of security models
  • Understand security capabilities of information systems (e.g., memory protection, Trusted Platform Module (TPM), encryption/decryption)
  • Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements
  • Apply security principles to site and facility design
  • Designing and implementing physical security
Domain 4
  • Implement secure design principles in network architectures
  • Secure network components
  • Implement secure communication channels according to design
Domain 5
  • Control physical and logical access to assets
  • Manage identification and authentication of people, devices, and services
  • Integrating identity as a service and third-party identity services
  • Implement and manage authorization mechanisms
  • Manage the identity and access provisioning lifecycle
  • VAPT
Domain 6
  • Security policy creation and update
  • Conduct document review.
  • Implement risk identification.
  • Conduct vulnerability scan.
  • Understand data analysis.
  • Manage Report & briefing.
Domain 7
  • Understand and support investigations ( forensics)
  • Understand requirements for investigation types
  • Understand administrative security
  • Conduct incident response management
  • Operate and maintain detective and preventative measures
  • Implement and support patch and vulnerability management
  • Understand and participate in change management processes
  • Implement Disaster Recovery (DR) processes
  • Test Disaster Recovery Plans (DRP)
  • Participate in Business Continuity (BC) planning and exercise
Domain 8
  • Understand and support investigations ( forensics)
  • Understand requirements for investigation types
  • Understand administrative security
  • Conduct incident response management
  • Operate and maintain detective and preventative measures
  • Implement and support patch and vulnerability management
  • Understand and participate in change management processes
  • Implement Disaster Recovery (DR) processes
  • Test Disaster Recovery Plans (DRP)
  • Participate in Business Continuity (BC) planning and exercise
Terms & Conditions:
  • Fees, speakers and date are subject to change.
  • Any cancellations received within the last ten calendar days would be liable for 50% of the course fees. Cancellations must be received in writing at least one week prior to course commencement. No-shows would be fully charged.
  • Registered attendees who are unable to attend the above course can send replacements subject to one week’s notification. * Membership fee applies.
Privacy Notice:

We are committed to respecting your privacy and we recognize the importance of protecting the information collected about you. All of the personal information that you have submitted during the registration shall only be processed in relation to your attendance to this event (i.e., processing of payments, issuance of certificate, sending of any announcements, future events and activities). All the information that you have provided in relation to this event shall be protected with reasonable and appropriate measures and shall only be retained as long as necessary in its processing.