Skip to main content
Toggle navigation
SIGN IN
REGISTER
You’re offline. This is a read only version of the page.
Skill Details
Essential Skill Information
View Skill (Open Access)
Skill Details
Skill Name
*
*
Skill Category
*
Business
Children & Education
Communication
Construction & Trade Skills
Creative Skills
Customer Services
Digital & AI
Events & Security
Finance & Accounting
Functional Skills
GDPR & Cyber-Security
HR
Health & Beauty
Health & Safety
Health & Social Care
Hospitality & Catering
IT & Admin
Leadership & Management
Legal, Quality & Assurance
Manufacturing & Engineering
Project Management
Sales & Marketing
Sustainability
Transport & Logistics
Wellbeing
Is Accredited
*
Is Accredited
No
Is Accredited
Yes
Is Apprenticeship
*
Is Apprenticeship
No
Is Apprenticeship
Yes
Skill Overview
*
*
Virtually or face-to-face delivery. The Official (ISC)²® Certified Information Systems Security Professional (CISSP®) training provides a comprehensive review of the knowledge required to effectively design, engineer and manage the overall security posture of an organisation. This training course will help students review and refresh their knowledge and identify areas they need to study for the CISSP exam. Content aligns with and comprehensively covers the eight domains of the (ISC)²® CISSP Common Body of Knowledge (CBK®), ensuring relevancy across all disciplines in the field of cybersecurity. As an (ISC)²® Official Training Provider, we use courseware developed by (ISC)²® –creator of the CISSP CBK– to ensure your training is relevant and up-to-date. Our instructors are verified security experts who hold the CISSP and have completed intensive training to teach (ISC)²® content.
Learning Objectives
*
*
After completing this course you should be able to: Understand and apply fundamental concepts and methods related to the fields of information technology and security Align overall organizational operational goals with security functions and implementations. Understand how to protect assets of the organization as they go through their lifecycle. Understand the concepts, principles, structures and standards used to design, implement, monitor and secure operating systems, equipment, networks, applications and those controls used to enforce various levels of confidentiality, integrity and availability. Implement system security through the application of security design principles and application of appropriate security control mitigations for vulnerabilities present in common information system types and architectures. Understand the importance of cryptography and the security services it can provide in today’s digital and information age.
Funding Option
*
Fully funded
Part funded / Co-invested
Commercial
Funding Eligibility
*
Skill Price ex VAT (£)
*
*
Skill Length
*
1 Hour or less
1 Day or Less
2 Days to 1 Week
2 to 6 Weeks
7 Weeks +
Skill Level
*
Beginner
Intermediate
Advanced
Skill Timings
*
Course is delivered anytime between Mon-Fri 9am-5pm
Evening
Weekend
Flexible
Delivery Method
*
Physical location
eLearning
Virtual classroom
Blended
Flexible
Skill Eligibility (Prerequisites for skill/software requirements)
*
QA is proud to be an (ISC)2 Official Training Partner.
Last Application Date
*
Skill Enrolment
*
Weekly
Monthly
Based on Demand
Skill Status
Pending
Live
Rejected
Finished
Skill Enquiry Details
First Name
*
*
Last Name
*
*
Email
*
*
*
Telephone
*
*
Postcode
*
*
Are you a company owner or senior decision maker?
*
Are you a company owner or senior decision maker?
No
Are you a company owner or senior decision maker?
Yes
No. of Delegates
*
*
What is your company name?
*
Would you like to explore skills support for your organisation through GM Business Growth Hub?
Would you like to explore skills support for your organisation through GM Business Growth Hub?
No
Would you like to explore skills support for your organisation through GM Business Growth Hub?
Yes
I accept the Terms and Conditions and Privacy Policy
*
I accept the Terms and Conditions and Privacy Policy
No
I accept the Terms and Conditions and Privacy Policy
Yes
Skill
*
Clear lookup field
Launch lookup modal
Lookup records
×
Close
We're sorry, an error has occurred.
There are no records to display.
You don't have permissions to view these records.
Error completing request.
Loading...
Error
×
Close
We're sorry, an error has occurred.