(ISC)2 Certified Information Systems Security Professional (CISSP)

CISSP Cyber Security Training to Advance Your IT Career!

(ISC)2 Certified Information Systems Security Professional (CISSP)

The (ISC)2 Certified Information Systems Security Professional (CISSP) certification is a globally recognized standard of achievement that verifies an individual’s knowledge and excellence in the field of information security.

CISSPs are information assurance professionals who define the architecture, design, management, and/or controls that assure the security of business environments. The CISSP certification was the first certification in the field of information technology and cyber security to meet the requirements of ISO/IEC Standard 17024.

CISSP training offers a job-related approach to the cyber security process while providing the basic skills required to prepare for CISSP certification.

Apply today to get a head start or request more information or a complete syllabus for any of our cyber security training programs by contacting us.

Course Prerequisites
It is highly recommended that students have IT certifications in Network+, Security+, or possess equivalent professional experience upon entering CISSP training.

It will be beneficial if students have one or more of the following security-related or technology-related certifications or equivalent industry experience: MCSE, MCTS, MCITP, SCNP, CCNP, RHCE, LCE, CNE, SSCP, GIAC, CISA, or CISM.

Additional CISSP certification requirements include:

  • A minimum of five years of direct professional work experience in one or more fields related to the 8 CBK security domains -OR-
  • A college degree and four years of experience.

Contact us anytime to request more information or a complete syllabus.

Course at a Glance


5 Days


(ISC)2 Certified Information Systems Security Professional (CISSP)


Advanced level – view prerequisites


This course is available at any LQ campus


See What You'll Learn

CISSP Training Objectives
Course Objectives:

  • Analyze information systems access control
  • Analyze security architecture, design, network security systems and telecommunications
  • Analyze information security management goals and classification and program development
  • Analyze risk management criteria and ethical codes of conduct
  • Analyze application security
  • Analyze cryptography characteristics and elements
  • Analyze physical and operations security
  • Apply business continuity and disaster recovery plans
  • Identify legal issues, regulations, compliance standards, and investigation practices relating to information systems security

Professional IT Career Tracks
CISSP training is intended for experienced IT security-related practitioners including auditors, consultants, investigators, instructors, or managers. More specific positions such as security and IT managers, network or security analysts and engineers, network administrators, information security specialists, and risk management professionals, who are pursuing CISSP training and CISSP certification to acquire the credibility and mobility to advance within their current cyber security careers or to migrate to a related career.

Through the study of all 8 CISSP CBK domains, students will validate their knowledge by meeting the necessary preparation requirements to qualify to sit for the CISSP certification exam.

Lesson 1 & 2: Security and Risk Management & Asset Security
  • Lesson 1: Security and Risk Management
    • Confidentiality, integrity, and availability concepts
    • Security governance principles
    • Compliance
    • Legal and regulatory issues
    • Professional ethics
    • Security policies, standards, procedures, and guidelines
  • Lesson 2: Asset Security
    • Information and asset classification
    • Ownership
    • Protect privacy
    • Appropriate retention
    • Data security controls
    • Handling requirements
Lesson 3 & 4: Security Engineering and Communication and Network Security
  • Lesson 3: Security Engineering
    • Engineering processes using secure design principles
    • Security models fundamental concepts
    • Security evaluation models
    • Security capabilities of information systems
    • Security architectures, designs, and solution elements vulnerabilities
    • Web-based systems vulnerabilities
    • Mobile systems vulnerabilities
    • Embedded devices and cyber-physical systems vulnerabilities
    • Cryptography
    • Site and facility design secure principles
    • Physical security
  • Lesson 4:
    • Secure Network architecture design
    • Secure network components
    • Secure communication channels
    • Network attacks
Lesson 5 & 6: Identity and Access Management & Security Assessment and Testing
  • Lesson 5: Identity and Access Management
    • Physical and logical assets control
    • Identification and authentication of people and devices
    • Identity as a service
    • Third-party identity services
    • Access control attacks
    • Identity and access provisioning lifecycle
  • Lesson 6: Security Assessment and Testing
    • Assessment and test strategies
    • Security process data
    • Security control testing
    • Test outputs
    • Security architectures vulnerabilities
Lesson 7 & 8: Security Operations & Software Development Security
  • Lesson 7: Security Operations
    • Investigations support and requirements
    • Logging and monitoring activities
    • Provisioning of resources
    • Foundational security operations concepts
    • Resource protection techniques
    • Incident management
    • Preventative measures
    • Patch and vulnerability management
    • Change management processes
    • Recovery strategies
    • Disaster recovery processes and plans
    • Business continuity planning and exercises
    • Physical security
    • Personnel safety concerns
  • Lesson 8: Software Development Security
    • Security in the software development lifecycle
    • Development environment security controls
    • Software security effectiveness
    • Acquired software security impact

Since I've been certified, I've gotten a job offer for every IT position I've applied for.

- Marcus Mingo

LeaderQuest Graduate, CompTIA Security+, EC-Council CEH, and CND-Certified

Student Testimonial

Need More Details? Download the Course Syllabus!

Complete the form below to instantly receive a course syllabus in your inbox.

Job Outlook

Individuals who complete Certified Information Systems Security Professional (CISSP) training and certification qualify for the following job roles:

Security and IT Managers, Network Engineer, Security Analysts, Network Analyst, Security Engineer, Network Administrators, Information Systems Security Manager, Risk Management Professionals, and similar roles.

  • Median Information Systems Security Manager national salary range: $115,250 – $194,250*
CISSP Cyber Security Training and Certification

*Robert Half 2018 Technology & IT Salary Guide

Learn In...

  • May 26 - May 30, 2020
  • 8:00am – 5:00pm MST
  • Aug 17 - Aug 21, 2020
  • 8:00am – 5:00pm MST
  • Jun 1 - Jun 12, 2020
  • 6:00pm – 10:00pm MST
  • May 26 - May 30, 2020
  • 8:00am – 5:00pm MST
  • Aug 17 - Aug 21, 2020
  • 8:00am – 5:00pm MST
  • Jun 1 - Jun 12, 2020
  • 6:00pm – 10:00pm MST
  • May 26 - May 30, 2020
  • 8:00am – 5:00pm CST
  • Aug 17 - Aug 21, 2020
  • 8:00am – 5:00pm CST
  • Jun 1 - Jun 12, 2020
  • 6:00pm – 10:00pm CST
  • May 26 - May 30, 2020
  • 8:00am – 5:00pm CST
  • Aug 17 - Aug 21, 2020
  • 8:00am – 5:00pm CST
  • Jun 1 - Jun 12, 2020
  • 6:00pm – 10:00pm CST
  • May 26 - May 30, 2020
  • 8:00am – 5:00pm EST
  • Aug 17 - Aug 21, 2020
  • 8:00am – 5:00pm EST
  • Jun 1 - Jun 12, 2020
  • 6:00pm – 10:00pm EST

Request More Information!

To learn more or apply for this program, please complete the form below and a training counselor will contact you.

Financing Options


Workforce Innovation and Opportunity Act (WIOA) Adult and Dislocated Worker Program:
This program provides government funding for employment and training services. WIOA aids eligible adults and dislocated workers in both finding and qualifying for meaningful employment.

Trade Adjustment Assistance (TAA):
TAA is a federally funded employment program. It provides benefits to workers who lose their jobs or had their hours reduced as a result of foreign trade. Benefits may include training, job search allowances, relocation allowances, and other reemployment services.


Veteran Employment Through Technology Education Courses (VET TEC)
VET TEC is a new tuition and housing assistance program designed to help veterans get short term technology training without using their GI Bill® benefits. If you’re a military veteran with at least one day of unexpired GI Bill® entitlement, you may be eligible, subject to approval by LeaderQuest. Learn more about VET TEC and whether this program is right for you.

Post 9/11 GI Bill® Education Program:
The Post 9/11 GI Bill® is an education benefit program for Active Duty, Selected Reserve, and National Guard service members who served on active duty after September 10, 2001.

Veterans Workforce Investment Program (VWIP):
VWIP provides resources for the training necessary to prepare eligible veterans for meaningful employment within the labor force.

The Vocational Rehabilitation and Employment (VR&E) VetSuccess Program:
The VR&E VetSuccess program, also known as Voc-Rehab or Chapter 31, offers disabled vets counseling, training, education and other services needed to prepare for, find, and keep suitable jobs.

Military Spouse Career Advancement Accounts (MyCAA):
MyCAA provides up to $4,000 (over 2 years) of Financial Assistance for military spouses who are pursuing degree programs, licenses or credentials leading to employment in portable career fields.

Scholarship Opportunities

LeaderQuest IT Impact Scholarship
LeaderQuest’s core purpose is to create meaningful outcomes that impact lives. The LeaderQuest IT Impact Scholarship was launched in 2019 to help us further fulfill that mission. Learn more and view application.


LeaderQuest has partnered with Climb Credit! Climb Credit offers tuition financing at fixed interest rates starting at 5%. They offer high approvals and low monthly payments. Climb’s online application takes minutes to complete with instant pre-approval. Apply with a qualifying co-borrower for the best rates.

Approved and available funding programs vary by location. Visit www.climbcredit.com/leaderquest for complete details and eligibility requirements.

GI Bill® is a registered trademark of the U.S. Department of Veterans Affairs (VA).