Let’s make it work for you 

Overview

The official ISC2 training for the Certified Information Systems Security Professional provides a comprehensive and structured review of the knowledge required to design, engineer, and manage an organisation’s security posture. Delivered as a five-day virtual instructor-led training course, with exam voucher included, this programme aligns fully with the ISC2 Common Body of Knowledge and prepares learners to approach the CISSP certification with confidence. The course combines expert-led instruction, official ISC2 courseware, and interactive learning elements to reinforce key concepts across all eight domains of cyber security. Learners will engage with real-world scenarios, case studies, and assessments to strengthen both theoretical understanding and practical application.

This training is ideal for experienced information security professionals seeking to validate their expertise, enhance career progression, and achieve globally recognised certification.

Read more +

Target Audience

Learners should have at least five years of cumulative, paid work experience across two or more CISSP domains. This course is best suited to professionals who already understand core information security concepts and want to validate and deepen that knowledge through structured exam preparation. Familiarity with security operations, risk management, network security, and access control will help learners get the most value from the course.

Target audience

This course is designed for professionals with at least five years of cumulative, paid experience in two or more of the CISSP domains.

It is particularly suitable for:

  • Security consultants
  • Security managers
  • IT directors and managers
  • Security auditors
  • Security architects
  • Security analysts
  • Security systems engineers
  • Chief information security officers
  • Security directors
  • Network architects
Read more +

Learning Outcomes

By the end of this course, learners will be able to:

  • Apply core concepts of information security across organisational environments
  • Align security strategies with business goals and operational requirements
  • Protect organisational assets throughout their lifecycle
  • Design and implement secure architectures across systems and networks
  • Apply cryptographic principles to secure data and communications
  • Evaluate physical, technical, and administrative security controls
  • Implement identity and access management solutions
  • Conduct effective security testing, auditing, and assessment
  • Manage security operations including incident response and continuity planning
  • Mitigate risks associated with software and system vulnerabilities
Read more +

Course Outline

Module 1: Security and risk management

  • Understand governance, compliance, and legal frameworks
  • Apply principles of confidentiality, integrity, and availability
  • Explore professional ethics and organisational responsibility
  • Analyse risk management concepts and methodologies
  • Evaluate regulatory and contractual requirements

Module 2: Asset security

  • Classify and categorise information assets
  • Manage data lifecycle and ownership responsibilities
  • Apply data protection methods across different states
  • Select and implement appropriate security controls
  • Align data handling with compliance requirements

Module 3: Security architecture and engineering

  • Apply secure design principles to IT systems
  • Evaluate security models and frameworks
  • Implement cryptographic solutions and key management
  • Assess vulnerabilities in hardware, firmware, and systems
  • Design secure architectures aligned with business needs

Module 4: Communication and network security

  • Analyse secure network architecture and design
  • Understand OSI model layers and associated risks
  • Secure network components and communication channels
  • Evaluate wireless and remote access security
  • Assess emerging technologies such as SDN and virtualisation

Module 5: Identity and access management

  • Implement identity lifecycle management
  • Compare access control models and mechanisms
  • Apply authentication, authorisation, and accountability
  • Secure identity stores and credential management
  • Integrate IAM into organisational security strategies

Module 6: Security assessment and testing

  • Design and implement security testing strategies
  • Conduct vulnerability assessments and penetration testing
  • Apply ethical and professional standards in testing
  • Interpret results to support risk-based decision making
  • Manage internal and external audit processes

Module 7: Security operations

  • Monitor and analyse security events and data
  • Implement incident response processes and procedures
  • Apply change and configuration management controls
  • Ensure business continuity and disaster recovery readiness
  • Manage operational security controls and environments

Module 8: Software development security

  • Identify vulnerabilities in software and applications
  • Apply secure coding practices and standards
  • Integrate security into development lifecycles
  • Evaluate database and application security risks
  • Implement testing and mitigation strategies

Module 9: Integrated security practices

  • Align governance with operational security controls
  • Conduct digital forensic investigations
  • Strengthen organisational awareness and training programmes
  • Manage supply chain and third-party risks
  • Integrate security across all business functions

What's included

  • Expert-led instruction delivered by an authorised ISC2 instructor
  • Official ISC2 student training guide
  • Scenario-based learning with applied activities
  • Facilitated discussions to encourage peer engagement
  • Hands-on activities including six case studies
  • End-of-chapter quizzes with detailed explanations
  • Official ISC2 CISSP exam voucher

Exams and assessments

This course includes a comprehensive range of assessments designed to reinforce learning, validate understanding, and prepare learners for the CISSP certification exam.

  • Official ISC2 CISSP exam is included at no additional cost, taken post class
  • Exam duration of three hours
  • Computer adaptive testing format with 100 to 150 questions
  • Question styles include multiple-choice and advanced item types
  • Passing score set at 700 out of 1000

Learners will leave the course with a clear understanding of their strengths and areas for further study, ensuring a focused and effective approach to exam readiness.

Hands-on learning

This course emphasises practical application through immersive, scenario-based learning designed to reflect real-world cybersecurity challenges.

  • A comprehensive applied scenario spanning the course with nine structured activities
  • Realistic exercises simulating tasks performed by practising security professionals
  • Interactive flashcards to support active recall and knowledge reinforcement
  • Guided problem-solving activities across all eight CISSP domains
  • Case studies exploring security incidents, risk management, and control implementation
  • Instructor-led walkthroughs of complex security concepts and solutions
  • Peer discussions to explore different approaches to security challenges
Read more +

We are an ISC2 accredited CPE submitter.

QA is proud to be an ISC2 Official Training Partner.

Learn more about our ISC2 certification training.

 

ELCAS Enhanced Learning Credits Administration Service

QA is an approved training provider for ELCAS, proud to support service leavers in their transition into the tech industry. Learn more about Elcas approved training here.  

For commercials please refer to:

qal.elcassupport@qa.com

or the ELCAS Portal.

 

Why choose QA

Special Notices

If you want to know more about becoming certified, please visit our dedicated CISSP certification guide.

Dates & Locations

Cyber Security learning paths

Want to boost your career in cyber security? Click on the roles below to see QA's learning pathways, specially designed to give you the skills to succeed.

= Required
= Certification
AI Governance
AI Security
Secure Engineering
Cyber Defence
Cloud Security
Incident Response
Industrial Controls & OT Security
Information Security
Security Assurance Pathway
Offensive Security
Privacy Professional
Reverse Engineer
Security Auditing
Security Risk
Core Cyber Security

Cyber Defensive Operations learning paths

Want to boost your career in Cyber Defensive Operations? View QA's learning pathways below, specially designed to give you the skills to succeed.

= Required
= Certification
Cyber Defence
Incident Response
Core Cyber Security
Yellow
Need to know

Frequently asked questions

How can I create an account on myQA.com?

There are a number of ways to create an account. If you are a self-funder, simply select the "Create account" option on the login page.

If you have been booked onto a course by your company, you will receive a confirmation email. From this email, select "Sign into myQA" and you will be taken to the "Create account" page. Complete all of the details and select "Create account".

If you have the booking number you can also go here and select the "I have a booking number" option. Enter the booking reference and your surname. If the details match, you will be taken to the "Create account" page from where you can enter your details and confirm your account.

Find more answers to frequently asked questions in our FAQs: Bookings & Cancellations page.

How do QA’s virtual classroom courses work?

Our virtual classroom courses allow you to access award-winning classroom training, without leaving your home or office. Our learning professionals are specially trained on how to interact with remote attendees and our remote labs ensure all participants can take part in hands-on exercises wherever they are.

We use the WebEx video conferencing platform by Cisco. Before you book, check that you meet the WebEx system requirements and run a test meeting to ensure the software is compatible with your firewall settings. If it doesn’t work, try adjusting your settings or contact your IT department about permitting the website.

How do QA’s online courses work?

QA online courses, also commonly known as distance learning courses or elearning courses, take the form of interactive software designed for individual learning, but you will also have access to full support from our subject-matter experts for the duration of your course.

Once you have purchased the Online course and have completed your registration, you will receive the necessary details to enable you to immediately access it through our e-learning platform and you can start to learn straight away, from any compatible device. Access to the online learning platform is valid for one year from the booking date.

All courses are built around case studies and presented in an engaging format, which includes storytelling elements, video, audio and humour. Every case study is supported by sample documents and a collection of Knowledge Nuggets that provide more in-depth detail on the wider processes.

When will I receive my joining instructions?

Joining instructions for QA courses are sent two weeks prior to the course start date, or immediately if the booking is confirmed within this timeframe. For course bookings made via QA but delivered by a third-party supplier, joining instructions are sent to attendees prior to the training course, but timescales vary depending on each supplier’s terms. Read more FAQs.

When will I receive my certificate?

Certificates of Achievement are issued at the end the course, either as a hard copy or via email. Read more here.

Let's talk

By submitting this form, you agree to QA processing your data in accordance with our Privacy Policy.