0 Items Total: $0
Certified Information Systems Security Professional
Certified Information Systems Security Professional
Certified Information Systems Security Professional
Digital transformation is set to revolutionise the economic landscape in the Middle East.

At PwC, we help our clients unlock the potential of digital to transform what they do, and how they do it. We have a proven track record of helping solve tomorrow’s problems today and we believe training and ongoing education is at the heart of this.

PwC’s Academy, the education and training business of PwC, has designed a suite of digital training courses for all levels of staff. Our goal is simple: to equip our clients with the knowledge and skills to embrace the many challenges of this new digital age.

Certified Information Systems Security Professional

The Certified Information Systems Security Professional (CISSP), awarded by the the International Information Systems Security Certification Consortium, Inc. (ISC)2 ®, is the premier certification for today’s information systems security professional. The awarding body regularly updates the test by using subject matter experts (SMEs) to make sure the material and the questions are relevant in today’s security environment.

In this course, participants will develop the skills and knowledge required to master the eight CISSP domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals.They will learn a practical, job-related approach to the security process, ensure their credibility and success within the information systems security and also get a framework to prepare for CISSP certification.

Certified Information Systems Security Professional

This course is ideal for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and engineers, network administrators, information security specialists, and risk management professionals, who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career.

Certified Information Systems Security Professional

To qualify for this cybersecurity certification, participants must have:

  • At least five years of cumulative, paid, full-time work experience in two or more of the eight domains of the (ISC)2 CISSP Common Body of Knowledge (CBK)


  • A four-year college degree (or a regional equivalent)


  • An approved credential from the CISSP Prerequisite pathway

Alternately, participants can pass the CISSP exam to earn an Associate of (ISC)2 designation. They will then have up to six years to earn the required work experience for the CISSP.

Certified Information Systems Security Professional

Participants have 3 hours to complete a maximum of 150 exam items on the CISSP exam.

They must pass the exam with a scaled score of 700 points or greater.

(ISC)² is an international, nonprofit membership association for information security leaders. with more than 130,000 certified members. They empower professionals who touch every aspect of information security.

(ISC)² are committed to helping their members learn, grow and thrive through their globally recognised certifications, through networking and collaboration opportunities, and through professional development and leadership tools. They are also committed to educating the general public through their support of The Center for Cyber Safety and Education.

To know more about please visit their website: https://www.isc2.org/

Course structure

In this course, participants will cover:

Security and Risk Management

  • Security Governance Principles
  • Compliance
  • Professional Ethics
  • Security Documentation
  • Risk Management
  • Threat Modeling
  • Business Continuity Plan Fundamentals
  • Acquisition Strategy and Practice
  • Personnel Security Policies
  • Security Awareness and Training

Asset Security

  • Asset Classification
  • Privacy Protection
  • Asset Retention
  • Data Security Controls
  • Secure Data Handling

Security Engineering

  • Security in the Engineering Lifecycle
  • System Component Security
  • Security Models
  • Controls and Countermeasures in Enterprise Security
  • Information System Security Capabilities
  • Design and Architecture Vulnerability Mitigation
  • Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
  • Cryptography Concepts
  • Cryptography Techniques
  • Site and Facility Design for Physical Security
  • Physical Security Implementation in Sites and Facilities

Communications and Network Security

  • Network Protocol Security
  • Network Components Security
  • Communication Channel Security
  • Network Attack Mitigation

Identity and Access Management

  • Physical and Logical Access Control
  • Identification, Authentication, and Authorization
  • Identity as a Service
  • Authorization Mechanisms
  • Access Control Attack Mitigation

Security Assessment and Testing

  • System Security Control Testing
  • Software Security Control Testing
  • Security Process Data Collection
  • Audits

Security Operations

  • Security Operations Concepts
  • Physical Security
  • Personnel Security
  • Logging and Monitoring
  • Preventative Measures
  • Resource Provisioning and Protection
  • Patch and Vulnerability Management
  • Change Management
  • Incident Response
  • Investigations
  • Disaster Recovery Planning
  • Disaster Recovery Strategies
  • Disaster Recovery Implementation

Want to run this in-house?
Frequently asked questions

Enquire now