CISSP Certification (Certified Information Systems Security Professional)

| /


Do you want to take this course remotely or in person?

Contact us by email: , phone: +34 91 031 66 78, WhatsApp: +34 685 60 05 91 , or contact Our Offices


Course Description: CISSP Certification (Certified Information Systems Security Professional)

This course is taught in online mode and consists of 8 units.

The duration of the course is approximately 20 hours, which is distribute between content and collaboration tools. Upon completion, the student will receive an accrediting diploma .

Training is done through our Virtual Campus , with this modality you will have all the didactic content on the course platform and it will be accessible, from the start day of the course, 24 hours a day, every day of the week. The student will also have participation forums , as well as a continuous tutoring .

The course is taught in tele-training modality (100% bonus option) and in-person and tele-in-person training actions can also be carried out on demand.


The CISSP (Certified Information Systems Security Professional) certification, from (ISC2) , validates the technical and management knowledge of the information security professional to effectively design, build and manage the security of an organization.

The content of our course is based on the CBK (Common Body of Knowledge) of ISC2 and the 8 domains of CISSP covering all disciplines of Information security. Technical topics are included, such as access controls , Cryptography , as well as those related to risk management, compliance and security operations.

Addressed to

The course is aimed at consultants, auditors, managers, businessmen and people who wish to develop and deepen their skills and concepts in the field of information security.

Course content

Introduction: Concepts about ISC2 and CISSP Certification

Domain 1 -Security and risk management

  • Information classification
  • Policies
  • Safety standards and regulations
  • Roles and responsibilities
  • Risk management
  • Quantitative and qualitative analysis
  • Change control
  • Threat model

Domain 2 – Asset Security

  • Asset evaluation
  • computer architecture
  • Protection Mechanisms
  • Certification and accreditation

Domain 3 - Security and engineering architecture

  • Security models
  • Security architectures
  • Cloud Computing
  • Mobile Systems Cryptography

Domain 4 – Communications and network security

  • Secure Design Principles
  • Reference Model
  • Cabling
  • Topologies and Access Methods
  • Secure network components

Domain 5 – Identity and Access Management

  • Access controls
  • Identification, authentication
  • Authorization and audit (AAA)
  • Biometric systems
  • Single Sign On (SSO)
  • Authorization mechanisms

Domain 6 – Security Assessment and Testing

  • Threats and Attacks
  • Business Impact Analysis (BIA)
  • Business Continuity Plan (BCP) and Backups
  • Documentation and Security Testing (pentesting)

Domain 7 – Security Operations

  • Administrative Management and Controls
  • Registration and Monitoring
  • Redundancy and resource availability
  • Incident Management
  • Preventive and Detective Measures
  • Recovery Strategies (DRP)
  • Physical security

Domain 8 – Security in software development

  • Common Problems in Application Development
  • Application Development Models
  • Software Capability Maturity Model (CMM)
  • Databases
  • Maintenance and Support
  • Types of Malware and Attacks

Previous requirements

No prior technical requirements are necessary to take this course. However, basic computer skills and knowledge of environments related to Information Technology are recommended.


If you are interested in taking this course in any training modality, contact us to request an offer .

Information related to training

Soporte siempre a tu lado

Training support: Always by your side

Formación presencial y telepresencial

Do you need another training modality?


Bonuses for companies