CISSP – Certified Information Systems Security Professional

Price

$3,395.00

Duration

5 days

Delivery Methods

Virtual

Why Professionals
Choose TOPTALENT?

WhatsApp-Image-2026-02-18-at-10.16.35-AM
Dedicated Texas-Based Support

Get assistance every step of the way from our Texas-based team, ensuring your training experience is hassle-free and aligned with your goals.

WhatsApp-Image-2026-02-18-at-10.16.35-AM-2
3000+ Curated Professional Courses

Access an extensive portfolio of over 3000 courses across IT, Business Application and Leadership – Designed to meet evolving Industry demands

Frame-1000001494
95% Client Approval Rating

Trusted by professionals nationwide our 95% approval rating reflects consistent quality, measurable impact and exceptional service.

WhatsApp-Image-2026-02-18-at-10.16.35-AM-4
Certified Industry Instructor

Learn from professionaly certified experts with real world experience and a proven commitment to learner success.

Course Schedule

DateTimePriceOption
06/01/202609:00 AM - 05:00 PM CT$3,395.00
Buy Now Enroll

Overview

Information security is part of every IT professional’s job. Hackers are constantly trying to compromise your networks, steal sensitive data, and overwhelm your systems. Planning, implementing, enforcing, or even removing security are tasks we all do to keep users and systems safe. Performing these tasks properly and in alignment with industry best practices is critical to virtually every technology role, from decision maker to developer to operator.

This scenario-based course focuses on computer security as an applied process across job roles and industries. The course also helps to prepare students for achieving the Certified Information Systems Security Professional (CISSP) certification. CISSP is widely regarded as the most valuable vendor-neutral credential a computer security professional can hold. It is frequently identified as a prerequisite for security jobs across all industries including security design, implementation, maintenance, policy development, and management of secured systems, process/procedures, policies, applications and networks.

This course is primarily for Information Technology Security Professionals who want to advance their security certifications such as Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), Certified Ethical Hacker (CEH), and related courses. This course also covers most of the knowledge required to prepare for the Systems Security Certified Practitioner (SSCP) certification exam.

Audience Profile

This course is primarily designed for the IT professional whose role includes some information security tasks or responsibilities. Common job titles for students include CISO, Director, Manager, Supervisor, Analyst, Information Architect, Program Manager, Lead, Information Security Officer, Security Specialist, and Auditor. The ideal student has some practical experience in the information security industry. Experienced information security professionals will also find value in this course to update their security skills, expand their knowledge of theoretical security, practice security exercises in areas that require a “safe” environment, and deepen exposure to areas outside their current role.
DoD Directive 8570.1-M- CISSP meets Government and DoD agencies compliance with Federal Information Security Management Act (FISMA) and DoD Directive 8570.1-M
Exams.

At Course Completion

After completing this course, you will have an understanding of:
Security Architecture and Design
Implementing Governance Compliance Strategies and Risk Management
Security Access Control models, methods and implementations.
Disaster Recovery Planning
Cryptography Methodology
Operations in Information Security
Legal, Regulations, Investigations and Compliance in Security
Vulnerability Assessment
Continuous Security Lifecycle
Physical and Software Development Security
Network Security Considerations

Outline

1.Access Control
2. Information Security Governance and Risk Management
3. Security Architecture and Design
4. Business Continuity and Disaster Recovery Planning
5. Cryptography
6. Legal, Regulations, Investigations and Compliance
7. Operations Security (formerly Security Operations)
8. Physical (Environmental) Security
9. Software Development Security
10. Telecommunications and Network Security

Prerequisites

Before taking this course, students should have six to nine months in a role that is relevant to security practices. It is also recommended that student have successfully completed the following courses or have equivalent experience.

ICND1 v3.0 Interconnecting Cisco Networking Devices CCNA Part 1

A+1001: CompTIA A+ Certification with Exam 220-1001

FAQ

What if I have to reschedule my class due to conflict?

Ten (10) business days’ notice is required to reschedule a class with no additional fees. Notify TOPTALENT LEARNING as soon as possible at 469-721-6100 or by written notification to info@toptalentlearning.com to avoid rescheduling penalties.

How do I enroll for this class?

Please contact our team at 469-721-6100; we will gladly guide you through the online purchasing process.

What happens once I purchase a class?

You will receive a receipt and an enrollment confirmation sent to the email you submitted at purchase. Your enrollment email will have instructions on how to access the class. Any additional questions our team is here to support you. Please call us at 469-721-6100.

What is your late policy?

If a student is 15 minutes late, they risk losing their seat to a standby student. If a student is 30 minutes late or more, they will need to reschedule. A no-show fee will apply. Retakes are enrolled on a stand-by basis. The student must supply previously issued courseware. Additional fees may apply.

What happens when I finish my class?

You will receive a ‘Certificate of Completion’ once you complete the class. If you purchased an exam voucher for the class, a team member from TOPTALENT LEARNING will reach out to discuss your readiness for the voucher and make arrangements to send it.