The Certified Information Systems Security Professional (CISSP) training course is a comprehensive programme to equip IT professionals with advanced cybersecurity skills. As one of the most recognised and valued certifications globally, CISSP is essential for professionals aspiring to build and advance their careers in information security. The course covers various security practices, policies, and procedures to secure an organisation's information systems, including access control, cryptography, disaster recovery, and security management.  

This training is structured to provide a thorough understanding of the eight domains of the CISSP Common Body of Knowledge (CBK), which are key to the certification. Each domain delves into critical topics like software development security, risk management, and network security to ensure participants are well-prepared to handle real-world security challenges.  

This course combines theoretical knowledge with practical insights and is designed for those who aspire to be security consultants, IT managers, or security auditors. Through case studies, simulations, and hands-on exercises, participants will gain experience assessing and mitigating risks, implementing security controls, and understanding the legal and regulatory frameworks governing information security.  

At the end of the course, participants will have the necessary tools to pass the CISSP certification exam, positioning themselves as leaders in the ever-evolving cybersecurity landscape. The CISSP credential enhances career prospects and ensures that professionals can protect their organisations against modern security threats.  

Upon completion of this course, participants will be able to:  

  • Provide a comprehensive understanding of the eight CISSP CBK domains.  
  • Develop skills in identifying and mitigating security risks.  
  • Equip participants with knowledge of best practices in information security management.  
  • Prepare participants for the CISSP certification exam.  
  • Enhance participants' ability to design, implement, and manage secure information systems.  

This course is ideal for IT professionals and security practitioners responsible for managing and protecting an organisation’s information systems. It is particularly beneficial for:  

  • Information security analysts  
  • Network security engineers  
  • Security consultants  
  • IT managers  
  • Systems administrators  
  • Security auditors and architects  
  • Professionals looking to advance their careers in cybersecurity  

The CISSP training course adopts a blended learning approach to ensure participants can apply theoretical and practical knowledge. It includes lectures, case studies, real-world scenarios, and hands-on labs. Interactive discussions and group activities are integrated into each session to encourage collaborative learning and knowledge-sharing among participants. Simulated cybersecurity exercises and exams provide participants practical experience managing security incidents and implementing protective measures.  

Participants can also access online resources, including sample questions, study guides, and mock exams to support self-paced learning and exam preparation.  

Day 5 of each course is reserved for a Q&A session, which may occur off-site. For 10-day courses, this also applies to day 10

ID التواريخ المتاحة المدينة الرسوم الإجراءات

Section 1: Introduction to CISSP and Cybersecurity Fundamentals  

  • Overview of CISSP certification and its importance  
  • The role of cybersecurity in today’s IT environment  
  • Introduction to the eight domains of the CISSP CBK  

 

Section 2: Security and Risk Management  

  • Security governance principles  
  • Compliance and legal issues in cybersecurity  
  • Risk management frameworks and methodologies  
  • Business continuity and disaster recovery planning  

 

Section 3: Asset Security and Security Architecture  

  • Classification and protection of assets  
  • Security models and frameworks  
  • Designing and implementing secure architectures  

 

Section 4: Communication and Network Security  

  • Network protocols and services  
  • Securing network infrastructure  
  • Virtual private networks (VPNs) and firewalls  
  • Intrusion detection and prevention systems  

 

Section 5: Identity and Access Management (IAM)  

  • Access control models and methods  
  • Authentication and authorisation techniques  
  • Identity as a service (IDaaS)  
  • Managing user lifecycle and privileges  

 

Section 6: Security Assessment and Testing  

  • Types of security assessments  
  • Vulnerability management  
  • Penetration testing methodologies  
  • Incident response and forensic investigation  

 

Section 7: Security Operations  

  • Security operations management  
  • Logging and monitoring activities  
  • Security event management systems  
  • Incident management and disaster recovery  

 

Section 8: Software Development Security  

  • Secure coding practices  
  • Software development life cycle (SDLC) and security  
  • Application security threats and mitigations  
  • Testing and auditing software for vulnerabilities  

عند إتمام هذه الدورة التدريبية بنجاح، سيحصل المشاركون على شهادة إتمام التدريب من Holistique Training. وبالنسبة للذين يحضرون ويكملون الدورة التدريبية عبر الإنترنت، سيتم تزويدهم بشهادة إلكترونية (e-Certificate) من Holistique Training.  

شهادات Holistique Training معتمدة من المجلس البريطاني للتقييم (BAC) وخدمة اعتماد التطوير المهني المستمر (CPD)، كما أنها معتمدة وفق معايير ISO 9001 وISO 21001 وISO 29993.  

يتم منح نقاط التطوير المهني المستمر (CPD) لهذه الدورة من خلال شهاداتنا، وستظهر هذه النقاط على شهادة إتمام التدريب من Holistique Training. ووفقًا لمعايير خدمة اعتماد CPD، يتم منح نقطة CPD واحدة عن كل ساعة حضور في الدورة. ويمكن المطالبة بحد أقصى قدره 50 نقطة CPD لأي دورة واحدة نقدمها حاليًا.  

  • كود الكورس PI1 - 134
  • نمط الكورس
  • المدة 5 أيام

الدورات المميزة