Let’s make it work for you
ISC2 Certified Information Systems Security Professional (CISSP)
From £2,409 + VAT was £4,135
- SFIA
Skills Framework for the Information Age (SFIA) identifies and describes over 100 skills and 7 levels of job roles. To find out more, read What is SFIA?
Interested in this course? Check out when this course is running and book today
Overview
The official ISC2 training for the Certified Information Systems Security Professional provides a comprehensive and structured review of the knowledge required to design, engineer, and manage an organisation’s security posture. Delivered as a five-day virtual instructor-led training course, with exam voucher included, this programme aligns fully with the ISC2 Common Body of Knowledge and prepares learners to approach the CISSP certification with confidence. The course combines expert-led instruction, official ISC2 courseware, and interactive learning elements to reinforce key concepts across all eight domains of cyber security. Learners will engage with real-world scenarios, case studies, and assessments to strengthen both theoretical understanding and practical application.
This training is ideal for experienced information security professionals seeking to validate their expertise, enhance career progression, and achieve globally recognised certification.
Target Audience
Learners should have at least five years of cumulative, paid work experience across two or more CISSP domains. This course is best suited to professionals who already understand core information security concepts and want to validate and deepen that knowledge through structured exam preparation. Familiarity with security operations, risk management, network security, and access control will help learners get the most value from the course.
Target audience
This course is designed for professionals with at least five years of cumulative, paid experience in two or more of the CISSP domains.
It is particularly suitable for:
- Security consultants
- Security managers
- IT directors and managers
- Security auditors
- Security architects
- Security analysts
- Security systems engineers
- Chief information security officers
- Security directors
- Network architects
Learning Outcomes
By the end of this course, learners will be able to:
- Apply core concepts of information security across organisational environments
- Align security strategies with business goals and operational requirements
- Protect organisational assets throughout their lifecycle
- Design and implement secure architectures across systems and networks
- Apply cryptographic principles to secure data and communications
- Evaluate physical, technical, and administrative security controls
- Implement identity and access management solutions
- Conduct effective security testing, auditing, and assessment
- Manage security operations including incident response and continuity planning
- Mitigate risks associated with software and system vulnerabilities
Course Outline
Module 1: Security and risk management
- Understand governance, compliance, and legal frameworks
- Apply principles of confidentiality, integrity, and availability
- Explore professional ethics and organisational responsibility
- Analyse risk management concepts and methodologies
- Evaluate regulatory and contractual requirements
Module 2: Asset security
- Classify and categorise information assets
- Manage data lifecycle and ownership responsibilities
- Apply data protection methods across different states
- Select and implement appropriate security controls
- Align data handling with compliance requirements
Module 3: Security architecture and engineering
- Apply secure design principles to IT systems
- Evaluate security models and frameworks
- Implement cryptographic solutions and key management
- Assess vulnerabilities in hardware, firmware, and systems
- Design secure architectures aligned with business needs
Module 4: Communication and network security
- Analyse secure network architecture and design
- Understand OSI model layers and associated risks
- Secure network components and communication channels
- Evaluate wireless and remote access security
- Assess emerging technologies such as SDN and virtualisation
Module 5: Identity and access management
- Implement identity lifecycle management
- Compare access control models and mechanisms
- Apply authentication, authorisation, and accountability
- Secure identity stores and credential management
- Integrate IAM into organisational security strategies
Module 6: Security assessment and testing
- Design and implement security testing strategies
- Conduct vulnerability assessments and penetration testing
- Apply ethical and professional standards in testing
- Interpret results to support risk-based decision making
- Manage internal and external audit processes
Module 7: Security operations
- Monitor and analyse security events and data
- Implement incident response processes and procedures
- Apply change and configuration management controls
- Ensure business continuity and disaster recovery readiness
- Manage operational security controls and environments
Module 8: Software development security
- Identify vulnerabilities in software and applications
- Apply secure coding practices and standards
- Integrate security into development lifecycles
- Evaluate database and application security risks
- Implement testing and mitigation strategies
Module 9: Integrated security practices
- Align governance with operational security controls
- Conduct digital forensic investigations
- Strengthen organisational awareness and training programmes
- Manage supply chain and third-party risks
- Integrate security across all business functions
What's included
- Expert-led instruction delivered by an authorised ISC2 instructor
- Official ISC2 student training guide
- Scenario-based learning with applied activities
- Facilitated discussions to encourage peer engagement
- Hands-on activities including six case studies
- End-of-chapter quizzes with detailed explanations
- Official ISC2 CISSP exam voucher
Exams and assessments
This course includes a comprehensive range of assessments designed to reinforce learning, validate understanding, and prepare learners for the CISSP certification exam.
- Official ISC2 CISSP exam is included at no additional cost, taken post class
- Exam duration of three hours
- Computer adaptive testing format with 100 to 150 questions
- Question styles include multiple-choice and advanced item types
- Passing score set at 700 out of 1000
Learners will leave the course with a clear understanding of their strengths and areas for further study, ensuring a focused and effective approach to exam readiness.
Hands-on learning
This course emphasises practical application through immersive, scenario-based learning designed to reflect real-world cybersecurity challenges.
- A comprehensive applied scenario spanning the course with nine structured activities
- Realistic exercises simulating tasks performed by practising security professionals
- Interactive flashcards to support active recall and knowledge reinforcement
- Guided problem-solving activities across all eight CISSP domains
- Case studies exploring security incidents, risk management, and control implementation
- Instructor-led walkthroughs of complex security concepts and solutions
- Peer discussions to explore different approaches to security challenges


We are an ISC2 accredited CPE submitter.

QA is proud to be an ISC2 Official Training Partner.
Learn more about our ISC2 certification training.

QA is an approved training provider for ELCAS, proud to support service leavers in their transition into the tech industry. Learn more about Elcas approved training here.
For commercials please refer to:
or the ELCAS Portal.
Why choose QA
- Award-winning training, top NPS scores
- Over 500,000 learners in 2024
- Our training experts are industry leaders
- Read more about QA
Special Notices
If you want to know more about becoming certified, please visit our dedicated CISSP certification guide.
Related courses
Cyber Security learning paths
Want to boost your career in cyber security? Click on the roles below to see QA's learning pathways, specially designed to give you the skills to succeed.
Cyber Defensive Operations learning paths
Want to boost your career in Cyber Defensive Operations? View QA's learning pathways below, specially designed to give you the skills to succeed.
Frequently asked questions
How can I create an account on myQA.com?
There are a number of ways to create an account. If you are a self-funder, simply select the "Create account" option on the login page.
If you have been booked onto a course by your company, you will receive a confirmation email. From this email, select "Sign into myQA" and you will be taken to the "Create account" page. Complete all of the details and select "Create account".
If you have the booking number you can also go here and select the "I have a booking number" option. Enter the booking reference and your surname. If the details match, you will be taken to the "Create account" page from where you can enter your details and confirm your account.
Find more answers to frequently asked questions in our FAQs: Bookings & Cancellations page.
How do QA’s virtual classroom courses work?
Our virtual classroom courses allow you to access award-winning classroom training, without leaving your home or office. Our learning professionals are specially trained on how to interact with remote attendees and our remote labs ensure all participants can take part in hands-on exercises wherever they are.
We use the WebEx video conferencing platform by Cisco. Before you book, check that you meet the WebEx system requirements and run a test meeting to ensure the software is compatible with your firewall settings. If it doesn’t work, try adjusting your settings or contact your IT department about permitting the website.
How do QA’s online courses work?
QA online courses, also commonly known as distance learning courses or elearning courses, take the form of interactive software designed for individual learning, but you will also have access to full support from our subject-matter experts for the duration of your course.
Once you have purchased the Online course and have completed your registration, you will receive the necessary details to enable you to immediately access it through our e-learning platform and you can start to learn straight away, from any compatible device. Access to the online learning platform is valid for one year from the booking date.
All courses are built around case studies and presented in an engaging format, which includes storytelling elements, video, audio and humour. Every case study is supported by sample documents and a collection of Knowledge Nuggets that provide more in-depth detail on the wider processes.
When will I receive my joining instructions?
Joining instructions for QA courses are sent two weeks prior to the course start date, or immediately if the booking is confirmed within this timeframe. For course bookings made via QA but delivered by a third-party supplier, joining instructions are sent to attendees prior to the training course, but timescales vary depending on each supplier’s terms. Read more FAQs.
When will I receive my certificate?
Certificates of Achievement are issued at the end the course, either as a hard copy or via email. Read more here.