Learning Objectives

Intellectual Point
Prerequisite

To qualify for this cybersecurity certification, you must pass the exam and have at least five years of cumulative, paid work experience in two or more of the eight domains of the ISC2 CISSP Exam Outline. Don’t have enough experience yet? You can still pass the CISSP exam and become an Associate of ISC2 while you earn the required work experience

Intellectual Point
Risk Management, Governance, and Compliance

[26%] Combines security and risk management with asset security to cover ethics, governance, compliance, privacy, risk analysis, business continuity, and data classification throughout the lifecycle.

Intellectual Point
Security Architecture and Engineering

[13%] Focuses on designing and implementing secure systems and architectures, including cryptographic solutions, security models, hardware and software security, and physical security controls.

Intellectual Point
Network, Identity, and Access Control

[26%] Encompasses communication and network security along with identity and access management (IAM), addressing secure network architecture, protocols, access controls, and identity lifecycle management.

Intellectual Point
Security Operations and Testing

[25%] Merges domains on security operations and assessment/testing, focusing on monitoring, incident response, disaster recovery, logging, auditing, vulnerability assessments, and security control testing.

Intellectual Point
Secure Software Development

[10%] Addresses secure coding practices, application development security, and integrating security throughout the software development lifecycle.

  • Intellectual Point's Certified Information Systems Security Professional (CISSP) Training Course is meticulously crafted to equip security professionals with a comprehensive understanding of information security. This course covers the eight domains of the ISC2 CISSP Common Body of Knowledge, combining theoretical concepts with practical applications to ensure a holistic learning experience. Participants will gain the skills necessary to effectively design, implement, and manage a best-in-class cybersecurity program, reflecting real-world demands of the security landscape. Whether you are looking to advance your career or deepen your expertise in security management, this course will serve as a pivotal step in achieving those goals.
  • Throughout the training, you will delve into domains such as Security and Risk Management, Asset Security, and Security Engineering. You’ll engage in interactive scenarios that help solidify your understanding of complex concepts, and apply these in practice labs tailored to real-world security challenges. By the end of the course, you will be well-prepared to tackle the CISSP certification exam and escalate your competence in the information security field. By the end of this course, participants will:
  • 1) Master the principles of information security risk management and governance.
  • 2) Design and implement robust security architectures to safeguard organizational assets.
  • 3) Develop and maintain an effective security operations framework.
  • 4) Execute security assessments and tests to ensure compliance and protect infrastructures.
  • 5) Prepare comprehensively for the CISSP certification, thereby advancing career and salary potential.

Module by Module Learning Outline

Program Materials

Security and Risk Management

Learning Objectives

  • Understand the frameworks and principles of information security governance.
  • Learn to identify, assess, and prioritize risks within an organization.

Topics Covered

  • Introduction to Security Governance: Concepts and principles of governance within cybersecurity. Establishing an effective security governance framework.
  • Risk Management Processes: Identification and assessment of risks. Strategies for mitigating and managing risk.

Asset Security

Learning Objectives

  • Comprehend the classification and handling of organizational information and assets.
  • Implement appropriate security and protective measures for asset management.

Topics Covered

  • Information and Asset Classification: Understanding asset valuation and sensitivity. Methods for classifying and safeguarding information.
  • Protecting and Securing Assets: Access control and monitoring of critical assets. Best practices for physical and logical asset protection.

Security Engineering

Learning Objectives

  • Gain expertise in secure design principles and engineering processes.
  • Learn to manage vulnerabilities and protective measures in systems.

Topics Covered

  • Security Models and Architecture: Principles of secure architecture in system design. Implementing security models to enforce policies.
  • Engineering Secure Systems: Addressing system vulnerabilities and threats. Incorporating security within the system development lifecycle (SDLC).

Network Security

Learning Objectives

  • Develop skills to secure network infrastructures against threats.
  • Explore technologies and protocols essential for network defense.

Topics Covered

  • Secure Network Design: Principles for designing and securing network architecture. Configuring network devices for optimal security.
  • Network Protocols and Security: Overview of key network protocols and their vulnerabilities. Implementing secure communication channels and measures.

Identity and Access Management

Learning Objectives

  • Understand mechanisms and processes for effective identity and access control.
  • Explore authentication and authorization techniques for robust security.

Topics Covered

  • Authentication Processes: Various methods and technologies for user authentication. Implementing multi-factor authentication (MFA) schemes.
  • Authorization and Access Control: Managing permissions and access rights. Employing role-based and least privilege access controls.

Security Assessment and Testing

Learning Objectives

  • Conduct comprehensive security assessments to identify and mitigate vulnerabilities.
  • Learn testing methodologies and tools for system evaluation.

Topics Covered

  • Security Testing Techniques: An overview of penetration testing and vulnerability assessments. Tools and frameworks for effective security testing.
  • Compliance and Audit Processes: Conducting audits to ensure regulatory compliance. Reporting and remediation of findings from assessments.

Tuition & Hours

Tuition is charged by course. The cost of the certification exam is not included in the tuition and is a separate cost based on the current rates as set by the certification vendor.

Course Total Hours Tuition
SEC-301: CISSP – Certified Information Systems Security Professional 72 $4,999.00

Books & Supplies

There are no additional charges for books or supplies.

Indirect Costs

Should a student wish to obtain the CISSP certification exam, the cost is an additional fee not covered in tuition. While encouraged, the exam is not a required expense to be paid at the time of enrollment. To obtain a voucher for the certification exam, you will need to purchase it separately.

Course Exam Exam Fee
SEC-301: CISSP – Certified Information Systems Security Professional CISSP Certification Exam $749

Program Award

Upon successful completion of the course, the student will receive a Certificate of Completion for CISSP Training.

* Exam fees are quoted based on time of publication. Voucher prices may change based on vendor rates and are updated accordingly. Please contact Intellectual Point to verify exam fee charges.

Class Registration

Date

Price

Location

August: 16, 2025 - September 14, 2025 - 8 AM - 6 PM (EST)
Schedule: Sat & Sun
$4,999.00 In-Person & Virtual Register
September: 27, 2025 - October 19, 2025 - 8 AM - 6 PM (EST)
Schedule: Sat & Sun
$4,999.00 In-Person & Virtual Register
October: 18, 2025 - November 9, 2025 - 8 AM - 6 PM (EST)
Schedule: Sat & Sun
$4,999.00 In-Person & Virtual Register

Download Course PDF

Private Team Training

Enrolling at least 3 people in this course? Consider bringing this (or any course that can be custom designed) to your preferred location as a private team training

For details, call 703-554-3827

Computer Network

Come Learn With Intellectual Point

Price Match Guarantee!

We will match Competitor’s Price Quote.
Call for more details 703-554-3827

A Certified Information System Security Professional Course at Intellectual Point Includes:
  • Live, Instructor-led training in modern classrooms
  • A thorough review of all CISSP topics by industry experts
  • Hands-on labs with real templates for policies, procedures, Incident Response, etc.
  • 24 x 7 access to the real labs in classrooms and remotely
  • 100% latest material & and thousands of realistic practice questions
  • Confidence building hands-on training with simulated exams
  • Authorized Pearson VUE testing at the same location to help you complete your exam*
  • Study material, notes, videos, and practice questions included in the course price

happy clients

What Our Customers Say - Based on over 600+ Reviews!

Our Top Customers
Training and Testing Partners