CISSP Certification



Course completion rate


  • (5 Reviews)
courses details


10% OFF

Upcoming Batches

  • Sep 28th 4 Weeks
  • OCT 05th4 Weeks
  • Oct 14th2 Weeks
  • Oct 26th10 Weeks
  • Nov 15th9 Weeks


The Certified Information Systems Security Professional (CISSP) certification is considered the gold standard in the field of information security. This CISSP training is aligned with (ISC)² CBK 2018 requirements and will train you to become an information assurance professional who defines all aspects of IT security, including architecture, design, management, and controls. Most IT security positions require or prefer a CISSP certification, so get started with your CISSP training today.

Why should you take AWS Architect Certification Training?

  • Propel your career: As other CISSPs will tell you, this certification will raise your visibility and credibility, improve your job security, create new opportunities for you or even increase your salary. On average, (ISC) ² members report having 35 percent higher salaries than non-members. (Source: “2017 Global Information Security Workforce Study”)
  • High Weightage Given To Certification-Holders: The Global Workforce Study also points out that knowledge and certification of knowledge weigh heavily in job placement and advancement – possessing a broad understanding of the security field was the #1 factor in contributing to career success
  • Increased Spending In IT Security: Over 33% of respondents on the Frost and Sullivan survey suggest an increase in budget availability and spending into the IT security domain. With a CISSP certification, you are assured of a place at the very front of the queue as increased spending begins to translate to IT security hiring sprees.


  • 13 Lectures
  • 12 Weeks
Certified Information Systems Security Professional (CISSP) is an independent information security certification governed by the not-for-profit International Information Systems Security Certification Consortium, (ISC)2.

The CISSP certification was the first credential in the field of information security, accredited by the ANSI (American National Standards Institute) to ISO (International Standards Organization) Standard 17024:2003. It is approved by the U.S. Department of Defense (DoD) in both their Information Assurance Technical (IAT) and Managerial (IAM) categories. CISSP certified professionals are considered authorities on key security issues including mobile security, risk management, application development security, cloud computing, among others.

CISSP certification is not only an objective measure of excellence, but a globally recognized standard of achievement for security training. Koenig provides comprehensive CISSP training for participants who wish to gain expertise in defining the design, architecture, management and controls leading to a secure business environment. Individuals possessing this vendor neutral credential are high in demand by corporations all over the world who want to protect their organizations from a growing spurt of sophisticated cyber attacks.
● Security and Risk Management
● Information Security Management
● Security Controls
● Information Security Management and Governance
● Goals, Mission, and Objectives
● Due Care
● Security Policy
● Compliance
● Computer Crimes
● Legal Systems
● Intellectual Property (IP) Law
● Privacy
● General Data Protection Regulation
● Security
● Risk Analysis
● Types of Risk Analysis
● Security Control Assessment
● Threat Modeling
● Supply-Chain Risk Management
● Third-Party Management
● Business Continuity Planning
● Business Continuity Planning Phases
● Managing Personnel Security
● Security Awareness Training
● Program Effectiveness Evaluation
● Key Takeaways
● Knowledge Check

● Asset Security
● Information Classification
● Data Classification
● Data Life Cycle
● Data Management
● Different Roles
● Data Remanence
● Privacy
● States of Data
● Data Loss Prevention
● Key Takeaways
● Knowledge Check

● Introduction
● Security Engineering
● Security Architecture
● Security Models1
● Evaluation Criteria
● System Security
● Memory
● Security Mode
● Cloud Computing
● Industrial Control System (ICS)
● Cryptography
● Encryption Methods
● Asymmetric Cryptography
● Public Key Infrastructure
● Cryptanalysis
● Key Management
● Critical Path Analysis
● Site Location
● Fire
● Key Takeaways
● Knowledge Check

● Introduction
● Network Architecture and Design
● IP Addressing
● Network Protocols
● Transmission Media
● Firewall
● Intrusion Detection System and Intrusion Prevention System
● Network Access Control (NAC)
● Content Delivery Network (CDN)
● Networks
● Software-Defined Networking (SDN)
● Remote Access
● Internet Security Protocol (IPsec)
● Voice over Internet Protocol (VoIP)
● Phreaking
● Secure Access Protocols
● Wireless Technologies
● Network Attacks
● Key Takeaways
● Knowledge Check

● Identity and Access Management
● Identity Management
● Biometrics
● Passwords
● Tokens
● Memory Cards and Smart Cards
● Access and Authorization Concepts
● Identity Management Implementation
● Kerberos
● Access Control Types
● Access Control Models
● Access Control Tools and Techniques
● Accountability
● Access Control Monitoring
● Identity Proofing
● Markup Languages
● Identity as a Service (IDaaS)
● Key Takeaways
● Knowledge Check

● Security Assessment and Testing
● Security Assessment
● Vulnerability Assessment
● Penetration Testing
● Audits
● Log Management
● Synthetic Transaction and Real Transaction
● Testing
● Software Testing
● Interface
● Key Performance Indicators (KPI)
● Key Takeaways
● Knowledge Check

● Security Operations
● Investigation
● Forensic Investigation
● Evidence
● Electronic Discovery
● Incident Management
● Security Operations Management
● Identity and Access Management
● Assets
● Malware
● Management
● Recovery and Backup
● Disaster Recovery
● Perimeter Security
● Key Takeaways
● Knowledge Check

● Software Development Security
● Importance of Software Development Security
● Programming Concepts
● Systems Development Life Cycle
● Application Program Interface
● Software Security and Assurance
● Database and Data Warehouse Environments
● Knowledge Management
● Web Application Environment
● Security Threats and Attacks
● Key Takeaways
● Knowledge Check

About Teachers

Andrew Flecher

Business Studies

Andrew Flecher

Business Studies



Rated 5 out of 5 Ratings

5 Stars
5 Stars
5 Stars
5 Stars
5 Stars
Mike Helcher
  • Great

What do you think is better to receive after each lesson: a lovely looking badge or important skills you can immediately put into practice.