College of Management and IT (CMIT)

Certified Information Systems Security Professional (CISSP)

Leads to Industry certification.

Self-paced course
Online self-paced course.

Start any time and work at your own pace.

Learn anywhere
Learn anytime, anywhere.

Course Details

Developed and maintained by the International Information Systems Security Certification Consortium (ISC) 2, CISSP is a premium, vendor-neutral certification that recognizes mastery of an international standard for information security and understanding of a Common Body of Knowledge (CBK). The CISSP course provides you with the knowledge and skills to pass the CISSP certification, after which you’ll have the ability to manage, operate, develop and plan an effective network security infrastructure. This certification gives you the opportunity to demonstrate your competence with information security best practice.  CISSP® certification is a globally recognised standard of achievement that confirms an individual’s knowledge in the field of information security. CISSPs are information assurance professionals who define the architecture, design, management and/or controls that assure the security of business environments. It was the first certification in the field of information security to meet the stringent requirements of ISO/IEC Standard 17024.

This CISSP course includes the following features:

  • Instructor-led demonstrations and visual presentations to develop your skills based on real-world scenarios.
  • Unlike a live class, you can fast-forward, repeat or rewind all your lectures. This gives you all the benefit of hands-on training with the flexibility of doing it around your schedule 24/7.
  • Flash Cards and Education Games are also provided throughout the course.
  • Practice exams prepare you for your exams. These exams are on average 100 questions to ensure you are 100% prepared if you are taking a certification exam.
  • You can also interact and collaborate with other students through our forums, student contributions and announcement features.
Who should complete this course?

These job roles align with the content and objectives of the Certified Information Systems Security Professional (CISSP) course at CMIT. As cybersecurity threats continue to evolve and organisations place a higher emphasis on securing their digital assets, the demand for skilled professionals with CISSP certification remains strong. This course prepares individuals to excel in leadership positions and contribute to the security of organisations on a global scale.

  • Information Security Managers: The CISSP certification is highly regarded in the field of information security. It’s an excellent choice for individuals aspiring to become Information Security Managers. According to the (ISC)² Cybersecurity Workforce Study, there is a global shortage of cybersecurity professionals, with millions of unfilled positions. CISSP-certified professionals are well-prepared to take on leadership roles and oversee an organization’s security strategy effectively.
  • Chief Information Security Officers (CISOs): CISOs are responsible for setting and implementing an organisation’s cybersecurity vision. Completing the CISSP course and obtaining certification equips individuals with the advanced knowledge and skills needed to excel in this high-level executive position.
  • Security Architects: Security architects design and implement comprehensive security solutions for organisations. This course prepares individuals to become security architects by providing them with a deep understanding of security principles and practices.
  • Security Consultants: Security consultants play a critical role in helping organizations assess their security posture and develop effective security strategies. CISSP-certified professionals are trusted advisors to organisations seeking to enhance their cybersecurity defenses.
  • Risk Management Professionals: Professionals in risk management roles can benefit from this course as it covers essential cybersecurity risk management principles. With the increasing complexity of cyber threats, organisations require individuals with expertise in assessing and managing cybersecurity risks to protect their assets effectively.
Entry Requirements / Prerequisites
  • Learners intending to take the exams should ensure they meet any specific entry requirements
  • For technical requirements required to access CMIT eLearning click here>
  • For more details on the suitability of this course click here>


How CMIT eLearning Works…
Topics covered in this CISSP Course
Access Control
  • General Concepts
  • Authentication
  • Principles
  • Types and Categories
  • Reference Monitor
  • Techniques
  • Models
  • Passwords
  • Smart Cards
  • Biometrics
  • Access Control Systems
  • Administration
  • Residuals
  • Accountability
  • Summary
Telecommunications and Network Security
  • OSI Reference Model
  • ISO/OSI Layers and Characteristics
  • Topologies
  • LAN Access Methods
  • Wireless
  • System and Security Management
  • Internet Protocols and Security
  • Firewall Terms and Types
  • Web Security
  • Common Attacks
  • Remote Access Security
  • Summary
Information Security Governance and Risk Management
  • Key Concepts
  • Definitions
  • Key Concepts
  • Risk Management
  • Risk Assessment
  • Useful Formulas
  • 3rd Party Governance
  • Information Classification
  • Roles and Responsibilities
  • Written Guidance
  • Policies and Standards
  • Employment Policies
  • Employee Education Programs
  • Change Management
  • Summary
Software Architecture and Design
  • Problems
  • Databases
  • Query Language
  • Object Oriented
  • Applications Beyond the Database
  • Definitions
  • Application System Development
  • Controls
  • Compiled vs. Interpreted
  • Vulnerabilities
  • Botnets
  • Summary
  • Definitions
  • Cryptanalysis Terms
  • Symmetric Encryption
  • Asymmetric Encryption
  • Hybrid Encryption
  • Public Key Infrastructures
  • Hash Functions
  • Digital Signatures
  • Protocol Based
  • Pretty Good Privacy
  • Cracking Techniques
  • Summary
Security Architecture and Design
  • Abstract Levels
  • Computer Hardware
  • Operating Systems
  • Processors
  • Types of Storage
  • Information Security Architecture
  • Open and Closed Systems
  • Access Controls
  • Architectural Foundation
  • Modes of Operation
  • Certification and Accreditation
  • Evaluation Criteria
  • Security Models
  • Summary
Operations Security
  • Threats in an Operating Environment
  • Control Categories
  • Accountability
  • Trusted Recovery
  • Management and Administrative Control
  • Due Care and Diligence
  • Hardware and Software Controls
  • Email and Fax
  • Privilege
  • Physical Access
  • Monitoring Techniques
  • Problem Management
  • Threats and Vulnerabilities
  • Defense in Depth
  • Summary
Business Continuity and Disaster Recovery
  • The Basics
  • Reasons for BCP
  • Key Concepts
  • Definitions
  • Business Continuity Life Cycle
  • Project Initiation
  • Business Impact Analysis
  • Assessing Risk
  • Recovery Strategies
  • Off-Site Requirements
  • Data Redundancy
  • System Backups
  • Plan Development
  • Testing and Maintenance
  • Stages in an Incident
  • Summary
Legal Requirements and Investigations
  • Ethics
  • Code of Ethics
  • Laws
  • Intellectual Property
  • Proprietary Rights
  • Liability
  • Computer Crime
  • Computer Crime Laws
  • Computer Investigation
  • Investigation Steps
  • Computer Forensics
  • Evidence Admissibility
  • Summary
Physical and Environmental Security
  • Physical Security
  • Crime Prevention
  • Site Design and Configuration
  • Boundary Protection
  • Computing Facility Requirements
  • Fire Prevention
  • Fire Suppression
  • Fire Classes
  • Media Protection
  • Access Controls
  • Physical Security
  • Summary
  • Once you successfully pass the programme(s), you will be able to download a CMIT Digital Certificate of Completion. This can be accessed via the Progress Reports section located on the top right side of your eLearning platform.
  • You may optionally take exams to receive certification. Exam fees are not included in the course price. Click here for exam information.

Request Prospectus

Complete the form below to request a prospectus.

Opt in
This field is for validation purposes and should be left unchanged.

Student Reviews
of this course

{{ reviewsOverall }} / 5 Users (0 votes)
What students say... Leave your rating
Order by:

Be the first to leave a review.

{{{review.rating_comment | nl2br}}}

Show more
{{ pageNumber+1 }}
Leave your rating

Request A Prospectus

Opt in
This field is for validation purposes and should be left unchanged.