Certified Information Systems Security Professional (CISSP)

    • Duration: Approx. 40 hours (equivalent to 40 CPD hours or 5 days full-time study). 
    • Qualification: This course is aligned with the CISSP curriculum. Students can comfortably sit the CISSP exam after attending this course.
    •  Prerequisites: None.
    •  Course fee per participant:
      •  Online : $750 (USD) delivered through zoom/Webex
      •  Onsite: Send us an email at info@canadiancyber.ca to get a quotation
      • Lunch and Learn: The training can also be conducted in hourly online sessions for corporate clients and individuals. Send us an email at info@canadiancyber.ca to get a quotation

Certified Information Systems Security Professional (CISSP)  

CISSP Training  Course overview  

CISSP certification is an industry-standard certification designed to cover all the aspects related to Information Security, Network Security, Application Security, Database Security, Web Security, Cloud Security, Logical Security, Environmental Security, Physical Security, and Cyber Security, Cyber Crimes, and its related issues. The CISSP certification confirms knowledge in the information security field and is imperative to a cyber-security career. CISSPs are information assurance professionals that assure a secure business environment. This certification is for anyone pursuing a career in cyber security or currently employed in the field and gaining more experience.  

Course details  

This training course will help students review and refresh their knowledge and identify areas they need to study for the CISSP exam. Taught by an (ISC)² trained instructor.  

During the CISSP training sessions the following the course, objectives will be covered. 

  • Information technology and cyber security’s field’s fundamental concepts and methods.  
  • Ways of protecting an organization’s information assets  
  • The concepts, principles, structures, and standards used to design, implement, monitor, and secure operating systems, equipment, networks, applications, and those controls used to enforce various levels of confidentiality, integrity, and availability.  
  • Cryptography’s importance and the security services it can provide in today’s digital and information age. 
  • Physical security elements’ impact on information system security and secure design principals’ application to evaluate or recommend appropriate physical security protections. 
  • Communication and network security elements with a thorough description of communication and network systems functionality. 
  • The System Lifecycle (SLC) and the Software Development Lifecycle (SDLC), application of security to information technology, identification of security control(s) appropriate for the development environment, and assessment of software security’s effectiveness.   
  • Align organizational operational goals with security functions. 
  • Implement security design principles applying appropriate security control mitigations for common information system types and architectures’ vulnerabilities.  
  • Learning terms for applying physical and logical access controls to environments related to their security practice  
  • Appraise various access control models for business security requirements.  
  • Name designing and validating test methods and audit strategies supporting business requirements.  
  • Developing an organization’s operational function and capacity by applying appropriate security controls and countermeasures. 

CISSP Training: Course prerequisites  

Although not mandatory, working knowledge of IT security concepts could be helpful for students to make the best out of this training.  

Software requirement  

None.  

Who should attend?  

The training is ideal for those working in positions such as but not limited to:  

  • Security Consultant  
  • Security Manager  
  • IT Director/Manager  
  • Security Auditor  
  • Security Architect  
  • Security Analyst  
  • Security Systems Engineer  
  • Chief Information Security Officer  
  • Security Director  
  • Network Architect 

CISSP Training- Course Outline 

 The training will cover the 8 domains as given in the CBK by (ISC) ². They are listed as under.  

  • Domain 1: Security and Risk Management  
  • Domain 2: Asset Security  
  • Domain 3: Security Architecture and Engineering  
  • Domain 4: Communication and Network Security  
  • Domain 5: Identity and Access Management (IAM)  
  • Domain 6: Security Assessment and Testing  
  • Domain 7: Security Operations  
  • Domain 8: Software Development Security  

(Disclaimer: The course outline of CISSP training offered by Canadian Cyber Inc. is in line with domains listed in (ISC) ² CBK . However the course is neither endorsed nor constitute official training offered by (ISC) ²).  

Course Outline

For a detailed outline of syllabus components covered every day along with the upcoming training schedule, drop us an email at info@canadiancyber.ca

Enquire about this course

For more information on this or any of our other courses, please do not hesitate to contact our support team: info@canadiancyber.ca

Enquire about this course

For more information on this or any of our other courses, please do not hesitate to contact our support team: info@canadiancyber.ca

Instructor profile

WAQAR MEHBOOB
CEO & Trainer

Waqar has over 20 years of professional experience assisting clients around the world in Data Governance, Conversion, Quality Management, Analytics.

I provide information security services. Some of my projects include the following:

  1. BISP / Ehsaas Program – Government of Pakistan: Performed ISO 27001 Risk Assessment, Developed Remediation Plan Development, Developed Information Security Policies, developed and delivered ISO 27001 training, developed strategies for Disaster Recovery and BCP
  2. TD Bank, Information Security, SME for Information Security Audit Remediation
  3. TD Bank, Canada: Information Security Risk Reporting for GRC Archer using Tableau and MS Access. Includes Security Risk Data Aggregation and Reporting. Assisted with various security projects including Security KPI
  4. National Savings – Government of Pakistan: Developed IT and Information Security Strategy for the Digitization project
  5. TD Bank, Canada: Performed several Information Security Audits including SOX Audits
  6. Global Trade Corporation, Canada: Provided ISO 27001 consultancy
  7. Bank of Montreal, Canada: Developed Audit Programs for several Information Security areas such as Data Leakage Prevention, Fraud, IT Operations, Network Security, Disaster Recovery, etc.
  8. Meridian Credit Union, Canada – Information Security assessment using COBIT 5 Maturity Assessment
  9. Volunteer Work: I am giving free coaching and training support to CISSP aspiring individuals. If interested, please connect with me.