Type
Virtual
Classroom ILT
Skill Level

Available dates
Learning Path
Virtual
Duration
1 Day

TYPE
Virtual
Classroom ILT
LEARNING PATH
SKILL LEVEL

DURATION
AVAILABLE DATES
Choose date
From: R32 900,00
Price excluding VAT
Introduction:
In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish holistic security programs that assure the protection of organisations information assets. CISSP is the most globally recognised certification in the information security market. Required by the world’s most security-conscious organisations, CISSP is the industry-leading credential that assures you have the deep technical and managerial knowledge and experience to effectively design, engineer, and manage the overall security posture of an organisation. The vendor-neutral CISSP certification is the ideal credential for those with proven deep technical and managerial competence, skills, experience, and credibility to design, engineer, implement, and manage their overall information security program to protect organisations from growing sophisticated attacks.
Backed by ISC2, the globally recognised, non-profit organisation dedicated to advancing the information security field, the CISSP was the first credential in the field of information security to meet the stringent requirements of ISO/IEC Standard 17024. Not only is the CISSP an objective measure of excellence, but also a globally recognised standard of achievement.
Audience profile:
This training course is intended for professionals who have at least 5 years of recent full-time professional work experience in 2 or more of the 8 domains of the CISSP CBK and are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current information security careers. The training course is ideal for those working in positions such as, but not limited to:
- Security Consultant
- Security Manager
- IT Director/Manager
- Security Auditor
- Security Architect
- Security Analyst
- Security Systems Engineer
- Chief Information Security Officer
- Director of Security
- Network Architect
Pre-requisites:
The knowledge and skills that a learner must have before attending this course is as follows:
- A firm understanding and good knowledge base of Information Security Principles, Concepts and Best Practices.
- While there are no formal prerequisites to attend the course, there are prerequisites to be met before a delegate can attempt the CISSP exam. **See below under Associated Certifications and Exams for more details.
On completion of this program, the participants will be able to:
- Understand and apply the concepts of risk assessment, risk analysis, data classification, and security awareness and Implement risk management and the principles used to support it (Risk avoidance, Risk acceptance, Risk mitigation, Risk transference).
- Apply a comprehensive and rigorous method for describing a current and/or future structure and behaviour for an organization’s security processes, information security systems, personnel, and organizational sub-units so that these practices and processes align with the organization’s core goals and strategic direction and address the frameworks and policies, concepts, principles, structures, and standards used to establish criteria for the protection of information assets, as well as to assess the effectiveness of that protection and establish the foundation of a comprehensive and proactive security program to ensure the protection of an organization’s information assets.
- Apply a comprehensive and rigorous method for describing a current and/or future structure and behaviour for an organization’s security processes, information security systems, personnel, and organizational sub-units so that these practices and processes align with the organization’s core goals and strategic direction and examine the principles, means, and methods of applying mathematical algorithms and data transformations to information to ensure its integrity, confidentiality, and authenticity.
- Understand the structures, transmission methods, transport formats, and security measures used to provide confidentiality, integrity, and availability for transmissions over private and public communications networks and media and identify risks that can be quantitatively and qualitatively measured to support the building of business cases to drive proactive security in the enterprise.
- Offer greater visibility into determining who or what may have altered data or system information, potentially affecting the integrity of those asset and match an entity, such as a person or a computer system, with the actions that entity takes against valuable assets, allowing organizations to have a better understanding of the state of their security posture.
- Plan for technology development, including risk, and evaluate the system design against mission requirements, and identify where competitive prototyping and other evaluation techniques fit in the process.
- Protect and control information processing assets in centralized and distributed environments and execute the daily tasks required to keep security services operating reliably and efficiently.
- Understand the Software Development Life Cycle (SDLC) and how to apply security to it, and identify which security control(s) are appropriate for the development environment, and assess the effectiveness of software security.
Module 1: Security and Risk Management |
Module 2: Asset Security |
Module 3: Security Architecture & Engineering |
Module 4: Communication and Network Security |
Module 5: Identity and Access Management (IAM) |
Module 6: Security Assessment and Testing |
Module 7: Security Operations |
Module 8: Software Development Security |
Torque IT specializes in providing our Clients with Vendor authorized instructor-led training, enablement IT courses, and certification solutions.
Associated certifications and exam
The CISSP draws from a comprehensive, up-to-date, global common body of knowledge that ensures security leaders have a deep knowledge and understanding of new threats, technologies, regulations, standards, and practices. The CISSP exam tests one’s competence in the 8 domains of the CISSP CBK, which cover:
- Security and Risk Management
- Asset Security
- Security Engineering
- Communications and Network Security
- Identity and Access Management
- Security Assessment and Testing
- Security Operations
- Software Development Security
**Candidates must have a minimum of 5 years cumulative paid full-time work experience in 2 or more of the 8 domains of the CISSP. Earning a 4-year college degree or regional equivalent or an additional credential from the ISC2 approved list will waive 1 year of the required experience. Only a 1 year experience exemption is granted for education**
CISSP Exam Information:
- Length of exam: 6 hours
- Number of questions: 250
- Question format: Multiple choice and advanced innovative questions
- Passing grade: 700 out of 1000 points
- Exam availability: English, French, German, Brazilian Portuguese, Spanish, Japanese, Simplified Chinese,
- Korean, Visually impaired
- Testing center: Pearson Vue Testing Center

ISC2 Overview
In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish holistic security programs that assure the protection of an organisations information assets.
ISC2 is an international non-profit membership association leading in educating and certifying cyber, information, software, and infrastructure security professionals throughout their careers. Headquartered in the United States and with offices in London, Hong Kong, and an authorized China agency in Beijing, ISC2, is recognized for the acclaimed Certified Information Systems Security Professional (CISSP®) certification, along with a portfolio of credentials and world-class education programs in the form of vendor-neutral education products and career services.
ISC2 members represent an elite, global network of dedicated cybersecurity professionals – preeminent experts in their field – who have committed themselves to the highest ethical standards and best practices. All members are certified professionals who have passed ISC2 examinations attesting to skill and knowledge in their field. Through their ISC2 certification, they have demonstrated superior competency and devoted themselves to making the cyber world a safer place for all. With more than 120,000 certified members in more than 160 countries, the ISC2 community plays a vital role not only in the organizations they serve but in society. Without them, our critical infrastructures would go unprotected and we wouldn’t be as safe. As organizations are increasingly recognizing information security as imperative, ISC2 members are in greater demand than ever before.
Torque IT has embarked into a new and exciting growth phase that will further cement our organizations position as the leading Training, Enablement and Certification solutions provider in our market. As part of this strategy, Torque IT has achieved the status of Official Training Provider for ISC2.