top of page


Seiber are an ISC2® Official Training Partner for  the Certified Information Systems Security Professional (CISSP) course.


2024 dates:

  • January 22nd to 26th (5 Days, Hybrid In-person / Virtual Instructor led training)

  • June 10th to 14th (5 Days, Hybrid In-person / Virtual Instructor led training)

  • October 21st to 25th (5 Days, Hybrid In-person / Virtual Instructor led training)

  • December 16th to 20th (5 Days, Hybrid In-person / Virtual Instructor led training)

All of our courses are delivered by certified trainers, who remain actively operational in their discipline, using highly developed and quality content presentations and live demonstrations.


The course provides a comprehensive review of the knowledge required to effectively design, engineer and manage the overall security posture of an organisation.

Course details

CISSP course

This training course will help students review and refresh their knowledge and identify areas they need to study for the CISSP exam.

Content aligns with and comprehensively covers the eight domains of the ISC² CISSP Common Body of Knowledge (CBK®), ensuring relevancy across all disciplines in the field of cybersecurity.


Official courseware is developed by ISC² – creator of the CISSP CBK – to ensure your training is relevant and up-to-date. Our instructors are verified security experts who hold the CISSP and have completed intensive training to teach ISC² content.

Training features

  • Instruction from an ISC2 Authorised Instructor

  • Official ISC2 Student Training Guide

  • Interactive flash cards to reinforce learning

  • An applied scenario with 9 corresponding activities teaching you how to apply security concepts to a situation that CISSPs likely encounter in the workplace

  • 8 discussions encouraging peer to peer interaction around key topics

  • 71 content specific activities, including 6 case studies

  • 9 end of chapter quizzes with answer explanation to assess comprehension

  • 180 question post course assessment with answer explanation highlighting areas for further study

Course domains

Domain 1: Security and Risk Management

Domain 2: Asset Security

Domain 3: Security Architecture and Engineering

Domain 4: Communication and Network Security

Domain 5: Identity and Access Management (IAM)

Domain 6: Security Assessment and Testing

Domain 7: Security Operations

Domain 8: Software Development Security

Who should attend?

This training course is intended for professionals who have at least five years of cumulative, paid work experience in two or more of the eight domains of the ISC2 CISSP CBK and are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current information security careers.

The training seminar is ideal for those working in positions such as, but not limited to:

  • Security Consultant

  • Security Manager

  • IT Director/Manager

  • Security Auditor

  • Security Architect

  • Security Analyst

  • Security Systems Engineer

  • Chief Information Security Officer

  • Security Director

  • Network Architect

Course objectives

CISSP course objectives

After completing this course, the student will be able to:

  • Apply fundamental concepts and methods related to the fields of information technology and security.

  • Align overall organisational operational goals with security functions and implementations.

  • Determine how to protect assets of the organisation as they go through their lifecycle.

  • Leverage the concepts, principles, structures, and standards used to design, implement, monitor, and secure operating systems, equipment, networks, applications, and those controls used to enforce various levels of confidentiality, integrity, and availability.

  • Apply security design principles to select appropriate mitigations for vulnerabilities present in common information system types and architectures.

  • Explain the importance of cryptography and the security services it can provide in today’s digital and information age.

  • Evaluate physical security elements relative to information security needs.

  • Evaluate the elements that comprise communication and network security relative to information security needs.

  • Leverage the concepts and architecture that define the associated technology and implementation systems and protocols at Open Systems Interconnection (OSI) model layers 1–7 to meet information security needs.

  • Determine appropriate access control models to meet business security requirements.

  • Apply physical and logical access controls to meet information security needs.

  • Differentiate between primary methods for designing and validating test and audit strategies that support information security requirements.

  • Apply appropriate security controls and countermeasures to optimise an organisation’s operational function and capacity.

  • Assess information systems risks to an organisation’s operational endeavours.

  • Determine appropriate controls to mitigate specific threats and vulnerabilities.

  • Apply information systems security concepts to mitigate the risk of software and systems vulnerabilities throughout the systems’ lifecycles.

What our clients say

“Well paced, gave lots of example use cases, which were really interesting and helped me to memorise concepts and helped to broaden my security horizon.”

CISSP Attendee, Global Tech Company 

bottom of page