
With below developments in tech sector, & rising cyber security risks, CISSP® certification provides essential cyber security knowledge & skills for professionals to deal with such challenges:
Cloud Security at the Forefront:
Increasing adoption of cloud services has led to significant need for professionals skilled in securing cloud environments. CISSP® certification covers key domains such as Security Architecture & Engineering, which are essential for cloud security.
AI and Machine Learning (ML) Integration:
CISSP® training prepares professionals to understand and implement these technologies responsibly, especially in Security Operations & Software Development Security domains where automation must be balanced with governance and ethical considerations.
Expanding Governance, Risk Management and Compliance (GRC) Responsibilities:
CISSP®-certified professionals are uniquely positioned to lead GRC initiatives, with strong foundations in risk-based decision-making and regulatory alignment through Security and Risk Management domain.
Demand for Incident Response Expertise:
CISSP® curriculum emphasizes readiness through Security Operations-enabling certified individuals to lead coordinated responses and mitigate operational risks alignment through Security and Risk Management domain.
Target Learners
- IT Professionals
- Security specialists
- Compliance and risk management professionals
- IT managers and supervisors
- Advanced certification seekers
- Government personnel
To Equip Cyber Security Skills in:
- Threats, Attacks and Vulnerabilities: Understand nature and impact of modern cyberthreats, e.g. ransomware, phishing, malware and advanced persistent threats. Learn how malicious actors exploit vulnerabilities across systems, software and infrastructure-and how to mitigate impact.
- Security Architecture and Design: Develop ability to design secure, scalable, & resilient architectures across cloud, on-premise & hybrid environments. Apply secure design principles to system architecture & understand role of cryptographic solutions in protecting critical assets.
- Security Implementation: Gain expertise in deploying & managing essential technologies such as firewalls, VPNs, intrusion detection & prevention systems (IDS/IPS), and identity & access management (IAM). Learn how to configure & maintain these systems to harden defenses.
- Security Operations and Incident Response: Strengthen capabilities in continuous monitoring, detection & response. Learn how to lead incident handling & digital forensics investigations that minimize risk and accelerate recovery. Become proficient in building resilient security operations.
- Governance, Risk and Compliance (GRC): Understand foundational importance of security governance, risk management & compliance frameworks. Learn how to develop, implement & enforce policies aligned with regulations such as GDPR, HIPAA and PCI-DSS-ensuring both compliance and business continuity.
Course Outcomes
After finishing this Course, learners are expected to be able to:
- Evaluate enterprise security posture & recommend improvements
- Secure hybrid environments, including cloud, mobile, & IoT
- Apply governance & compliance principles effectively
- Respond to & recover from cybersecurity incidents
Career Objectives
- This Course prepares learners for CISSP®-exam. The CISSP® certification is recognized globally & validates deep technical knowledge and strategic expertise in demand across industries.
- Preparation for Executive and Leadership Roles: Being more than just technical certification, CISSP® equips professionals to oversee security operations, manage teams, develop enterprise-wide policies, & drive cybersecurity strategy in alignment with business goals
Domain 01: Security and Risk Management
1.01 Introduction
1.02 Professional Ethics
1.03 (ISC)2 Code of Ethics
1.04 Organization Code of Ethics
1.05 Authenticity Non-Repudiation
1.06 Due Care Due Diligence
1.07 Security Controls
1.08 CIA Triad
1.09 OECD Privacy Principles
1.10 GDPR
1.11 Intellectual Property
1.12 Investigation Types
1.13 Security Policy
1.14 Business Continuity
1.15 Contingency Planning
1.16 Business Impact Analysis
1.17 Risk Management
1.18 Risk Identification
1.19 Risk Assessment
1.20 Risk Response
1.21 Risk Monitor
1.22 Threat Modeling
1.23 Threat Modeling Approaches
1.24 Threat Modeling Process
1.25 Minimum Security Requirements
1.26 Service Level Requirements
1.27 Awareness and Training
Domain 02: Asset Security
2.01 Introduction
2.02 Asset Classification
2.03 Data Lifecycle
2.04 Data Roles
2.05 Data Collection
2.06 Data Location
2.07 Data Maintenance
2.08 Data Remanence
2.09 Scoping and Tailoring
Domain 03: Security Architecture and Engineering
3.01 Introduction
3.02 Secure Design Principles
3.03 Security Models
3.04 Cloud Based Systems
3.05 Cloud Service Models
3.06 Cloud Deployment Models
3.07 Shared Responsibility Model
3.08 Microservices
3.09 Containerization
3.10 High Performance Computing Systems
3.11 Edge and Fog Computing
3.12 Cryptography
3.13 Cryptographic Hash
3.14 Digital Signatures
3.15 Cryptanalytic Attacks
3.16 Fire
Domain 04: Communication and Network Security
4.01 Introduction
4.02 OSI Model
4.03 Network Topology
4.04 Wifi
4.05 Bluetooth
4.06 Other Wireless Technology
4.07 CDN.mp4
4.08 Transmission Media
4.09 Firewall
4.10 Firewall Architecture
4.11 802.1x
Domain 05: Identity and Access Management
5.01 Introduction
5.02 Access Control
5.03 Multifactor Authentication
5.04 Biometric
5.05 Just in Time
5.06 Access control models
5.07 Identity and access provisioning lifecycle
5.08 Privilege Escalation
5.09 Kerberos
Domain 06: Security Assessment and Testing
6.01 Introduction
6.02 Security Assessment Program
6.03 Code Review
6.04 Synthetic Monitoring
6.05 Breach Attack
6.06 Compliance Checks
6.07 Account Management
6.08 Backup Verification
6.09 Management Review and Approval
6.10 Training and Awareness
6.11 Ethical Disclosure
6.12 Exception Handling
Domain 07: Security Operations
7.01 Introduction
7.02 Digital Forensics
7.03 SIEM
7.04 UEBA
7.05 SOAR
7.06 Threat Intelligence
7.07 Incident Management
7.08 Firewall Types
7.09 IDs and IPs
7.10 Whitelisting Blacklisting
7.11 Honeypots
7.12 Patch Management
7.13 Backup Storage Strategies
7.14 Backup Schemes
7.15 Electronic Backup Solutions
7.16 Recovery Sites
7.17 Personal Safety
Domain 08: Software Development Security
8.01 Introduction.mp4
8.02 SDLC
8.03 Maturity Models
8.04 Change Management.mp4
8.05 IPT
8.06 Toolsets
8.07 IDE
8.08 Runtime System
8.09. CI and CD
8.10. Software Configuration Management
8.11 Software Testing
8.12 Free and Proprietary
8.13 Secure Coding
English
The Course fee includes official CISSP Study Kit and Exam Voucher.
* Complimentary coupon of HKD200 - Can be deducted from fees for next enrolment for courses with NET fees (after discount) of HKD3,000 or above
- One year access to Learning Management System (LMS) from date of activation of LMS.
- Recordings of registered LVCs available post-class, during access period to LMS
- Upon purchase of this Course, HKD200 cash coupon can be used for next purchase (one year validity from date of purchase)
- Subject to T & Cs , as updated from time to time
