CISSP Certification Training

30+ Hours CISSP Certification Training, 100+ Lectures, Real-Life Scenarios, Practices, Handouts & more.


 

Course Description

CISSP Certification training from Master of Project Academy is designed to ensure that you become the CISSP certified security professional demanded by today's IT world. Our hands-on training approach, entrusted by 50,000+ learners, will help you to imbibe the workings of the CISSP certification as prescribed by (ISC) ² CBK 2015. We guarantee that you will walk away with all the preparation and confidence you need to conquer the CISSP exam and earn the CISSP Certification in your first attempt and become a Certified Information Systems Security Professional.

Get Started



"Designed and led by seasoned industry professionals with a deep well of academic and field knowledge, Master of Project Academy courses guide professionals easily and effectively through certification exams."

yahoo finance image


100+ Lectures


30+ Hours


Lifetime Access option


30 day money back guarantee!


100% Online & Self-Paced


Course Completion Certificate


  • Learn theoretical concepts with real-world examples
  • Get prompt answers & support from the instructor within 24 hours!
  • Clear CISSP Exam
  • Define the architecture, and design and manage the security of your organization.
  • Acquire the relevant knowledge and skills required to clear the CISSP certification exam.
  • Earn the requisite 30 CPEs required to take up the CISSP certification exam.
  • Develop working knowledge in the 8 domains areas prescribed by the CISSP Common Book of Knowledge, 2015.
  • Analyze information systems access control.
  • Analyze security architecture and design
  • Analyze network security systems and telecommunications.
  • Analyze information security classification and program development.
  • Analyze risk management criteria and ethical codes of conduct.
  • Analyze cryptography characteristics and elements.
  • Analyze physical security.
  • Analyze operations security.
  • Apply Business Continuity and Disaster Recovery Plans.
  • Analyze software development security.
  • Identify legal issues, regulations, compliance standards, and investigation practices relating to information systems security.

IT security became a critical issue with the evolution of information age. And the demand for CISSP certified professionals in organizations increased respectively. CISSP Certification Training is best suited for:

  • IT security-related practitioner
  • Security Administrators
  • Security Auditors
  • Network Analysts
  • Security Analysts/Architects
  • Information Security Officers (ISO)
  • Consultants
  • Security Instructors

In today fast evolving times, technological solutions by itself cannot protect an organizations important information assets. So, Employers demand qualified information security staff give their organizations a leading edge by providing the highest standard of security for their customers, employees, stakeholders and organizational information assets.

The CISSP Certification is an internationally recognized certification for information security professionals. CISSP Certification is offered by the International Information Systems Security Certification Consortium, (ISC)2. CISSP certification is both an objective measure of excellence and a globally recognized standard of achievement.


Benefits of the CISSP Certification for Professionals:

  • Indicates a working knowledge of information security
  • Commitment to profession
  • Provides a career distinction, with enhanced credibility and marketability
  • Has exclusive benefits as an (ISC)² member, including valuable resources such as peer networking and idea exchange
  • Certified Information Systems Security Professionals (CISSP) earn more than their non-certified counterparts, according to the Global Information Security Workforce Study
  • Satisfies the government and organization requirements for information security certification mandates

Enroll in our free CISSP certification training to learn more about CISSP certification.

Curriculum


  Introduction
Available in days
days after you enroll
  • Start
    1. Introduction (1:51)
  • Start
    2. What is CISSP Certificate (5:47)
  • Start
    3. Course Outline (5:18)
  • Start
    4. Latest CISSP Curriculum (4:33)
  • Start
    5. Course Materials and Resources 2 (5:19)
  • Start
    6. Course flow and follow up (7:22)
  • Start
    7. Important communication channel (2:49)
  Security and Risk Management
Available in days
days after you enroll
  • Start
    8. Introduction to Security and Risk Management (4:11)
  • Start
    11. Governance Requirements (5:22)
  • Start
    13. Question (3:09)
  • Start
    15. Important Document (6:47)
  • Start
    17. Question (3:00)
  • Start
    18. Security Document 2 (15:35)
  • Start
    19.Security Document Types (5:18)
  • Start
    20. Policy Sample (3:14)
  • Start
    21. The Relationship Between Security Document Types (3:09)
  • Start
    22. Risk Management (7:51)
  • Start
    24. Asset Evaluation (18:33)
  • Start
    25. Exam Question (4:03)
  • Start
    27. ARIS GRC (1:41)
  • Start
    28. Business Continuity Plans (1:16)
  • Start
    30. Business Impact Analysis- BIA (10:15)
  • Start
    31. MTD - RTO- RPO (11:44)
  • Start
    32. Disaster Recovery Plan -DRP (3:34)
  • Start
    35. The Need of Personnel Security (8:39)
  • Start
    36. Employment Policies (2:20)
  • Start
    38. Termination (1:40)
  Asset Security
Available in days
days after you enroll
  • Start
    41. Asset Management (10:38)
  • Start
    43. Classification (8:10)
  • Start
    44. Labeling (4:44)
  • Start
    45. DLP (2:55)
  • Start
    46. DLP - Data Classification (3:37)
  • Start
    47. Klassify - Data Labeling 2 (2:50)
  • Start
    48. Privacy (13:02)
  • Start
    50. Data Security Control (8:01)
  • Start
    Domain Evaluation 2 (5:34)
  Security Architecture and Engineering
Available in days
days after you enroll
  • Start
    51. Introduction to Security Architecture and Engineering (3:52)
  • Start
    52. Security Engineering Lifecycle (4:14)
  • Start
    53. NISP SP 14-27 (11:36)
  • Start
    54. Trusted Computing Base (9:22)
  • Start
    54.1 TCB Vulnerability (9:48)
  • Start
    55. Security Models (17:08)
  • Start
    56. TCSEC (5:51)
  • Start
    57. ITSEC (6:14)
  • Start
    58. Security Architecture Questions (3:18)
  • Start
    59. Enterprise Security Architecture (5:06)
  • Start
    60. Virtualization (9:51)
  • Start
    61. Fault Tolerance (6:32)
  • Start
    62. Server Fault Tolerance Techniques (2:06)
  • Start
    63. New Technology (6:28)
  • Start
    64. Spoofing Number (5:52)
  • Start
    65. Spoofing Email (7:04)
  • Start
    66. Cryptography (16:31)
  • Start
    67. Alternative Ciphers (7:56)
  • Start
    68. Symmetric Encryption (12:43)
  • Start
    70. Hash (6:10)
  • Start
    71. Physical Security (7:44)
  • Start
    72. Physical Access barriers (9:49)
  • Start
    73. Power Issue (3:15)
  Communications and Network Security
Available in days
days after you enroll
  • Start
    75. The OSI Model (17:27)
  • Start
    77. Network Architecture Components (17:09)
  • Start
    81. Wireless Network (7:20)
  • Start
    82. Network Attacks (9:03)
  • Start
    83. Remote Access Security Mechanisms (2:17)
  • Start
    84. RAID (7:00)
  • Start
    85. Backup (6:00)
  Identity and Access Management
Available in days
days after you enroll
  • Start
    87. Access Control (6:50)
  • Start
    88. Authorization (19:23)
  • Start
    89. Authentication (18:50)
  • Start
    90. Single Sign on SSO (13:10)
  • Start
    91. Central Administration (RADUIS) (4:16)
  • Start
    92. Access Control Attack (17:15)
  • Start
    93. Instrusion Detection System (IDS) (6:58)
  • Start
    94. Access Control Inportant exam area (4:15)
  Cloud Security
Available in days
days after you enroll
  • Start
    96. Introduction to Cloud Security (2:50)
  • Start
    97. NIST 800-145 (1:55)
  • Start
    99. SaaS (4:25)
  • Start
    102. Storage Architecture (1:25)
  • Start
    104. Hypervisor (4:49)
  • Start
    105. Virtualization Security (5:26)
  • Start
    106. Perimeter Security (6:05)
  • Start
    Domain Evaluation 2 (5:34)
  Security Assessment and Testing
Available in days
days after you enroll
  • Start
    108. Test Output (4:33)
  • Start
    109. Vulnerability asessment - Part 1 (2:16)
  • Start
    112. Nessus VA (13:25)
  • Start
    113. Nessus VA- Part 2 (14:05)
  • Start
    114. Nessus VA Report (5:20)
  • Start
    118. Reconnaissance Demo -Maltego 2 (7:59)
  • Start
    119. Scanning Demo -Zenmap (5:06)
  • Start
    120. Exploitation Demo -MetaSploit 2 (14:33)
  • Start
    121. Event Log Review 2 (7:19)
  • Start
    122. NIST 800-92 (2:56)
  • Start
    123. SIEM Solution (6:16)
  • Start
    124. SIEM Solution Demo - Qradar (3:09)
  • Start
    126. Security KPI's (6:57)
  • Start
    Domain Evaluation 2 (5:34)
  Security Operations
Available in days
days after you enroll
  • Start
    127. Introduction to Security Operation 2 (1:40)
  • Start
    128. Security Operation 2 (9:53)
  Software Development Security
Available in days
days after you enroll
  • Start
    130. Software development Methods (6:42)
  • Start
    132. Change Control Process (3:07)
  • Start
    133. Security Consideration (1:54)
  • Start
    135. Introduction to SQL Injection 2 (11:26)
  • Start
    136. What is SQL Injection (11:26)
  • Start
    Domain Evaluation 2 (5:34)

Get Started Now!

For corporate training solutions please email us

Monthly

$67

per month

Why should I opt for monthly subscription?

The quicker you complete, the less you pay.

You will have access to the course unless you cancel your monthly subscription.

Annual

$335

1-year duration

Why should I opt for an Annual subscription?

1 year is fair-enough to complete the training and get ready for the exam.

You will have access to the course for 1-year duration.

Lifetime

$670

lifetime access

Why should I opt for lifetime access?

You pay once, access to all course material forever and get all future updates at no additional cost.

Once you purchase the course, you will have lifetime access.

30 Day Money Back Guarantee - Our Overall Full Refund Rate is < 1%

Need more information?


Frequently Asked Questions


When does the course start and finish?
The course starts now and never ends! It is a completely self-paced online course - you decide when you start and when you finish.
How long do I have access to the course?
How does lifetime access sound? After enrolling, you have unlimited access to this course for as long as you like - across any and all devices you own.
What if I am unhappy with the course?
We would never want you to be unhappy! If you are unsatisfied with your purchase, contact us in the first 30 days and we will give you a full refund.
Any further questions?
Please visit our FAQ page

Meet Your Instructor


Mohamed Atef
Mohamed Atef

ICT Consultant and certified instructor with more than 20 years of experience. Delivers professional and academic courses and author of 2 published books.

-Certified Information System Security Professional (CISSP) ID #517943
-Microsoft Certified Trainer (MCT) ID #3022752
-EC Council Certified Instructor (CEI) ID #ECC51750391761
-CEH: Certified Ethical Hacking ID #ECC64515022319
-Certified Cisco System Instructor (CCSI)
-Microsoft Certified System Engineer (MCSE)
-Microsoft Certified IT Professional (Windows Server Administration 2008)
-CompTIA Certified (Network +) ID #
-CompTIA Certified (Server +)
-CompTIA Certified (Linux +)
-CompTIA Certified (Security +)
-Cisco Certified Network Associate (CCNA)ID #CSCO11273248
-Cisco Certified Network Professional (CCNP)
-Project Management Professional (PMP) )ID #1772374