CISSP Preparation Training

If you are considering getting a career in information security, Information Systems Security Professional (CISSP®), today’s most popular information security certificate for professionals is your first target. Many firms all over the world are looking for professionals with a CISSP® certificate for technical and administrative positions in the security field. Mid-level and senior executives are interested in CISO and CSO and senior security engineers are interested in the CISSP® certificate. CISSP® certificate is the first information security certificate that is in par with ANSI (American National Standards Institute) ISO (International Standards Organization) 17024:2003 standard. CISSP® certificate has been awarded the title of “The Most Professional Certification Program” by the top authorities several times.

Training Details

Course Attendance Criteria

  • Minimum 5 years of work experience in information security,
  • Agreeing with the (ISC)² Code of Ethics,
  • Passing CISSP® Test,
  • Completing the Endorsement process successfully.

Why have a CISSP® Certificate?

  • Professionals who have a CISSP® certificate create a difference with their professional and established knowledge and experience. They are employees who are always in demand.

Benefits of the Training

CISSP® test is not available in Turkish. Alternatively, you may take the test in English. The first Turkish content that is consistent with CISSP® test content has been created by us. Learning content and images are provided in Turkish. The reason for creating Turkish content is the fact that the subjects can be understood more thoroughly in a shorter span. Test questions will be answered and example scripts will be played out in par with the test language during training.

Professionals with the CISSP® certificate continuously improve themselves and follow technology closely. They have a global security perspective since they have proved themselves internationally.

Who Should Attend?

This course is suitable for everyone with IT experience who wants to understand the concept of information security. Especially people who are involved with the positions below can attend:

  • Security Managers
  • Firewall Managers
  • Security Test Specialists
  • Internal/External Auditors
  • IT Inspectors
  • System Managers

Course Duration

Course Duration is 5 days. Training will be performed through practical applications and answering test questions.

Course Content

Course content includes 10 fields according to (ISC)2® CISSP Common Body of Knowledge® (CBK®)

Access Control

  • İdentity recognition and confirmation methods and technologies
  • Optional, semi-mandatory and mandatory access models,
  • Invasion Detection Systems
  • Potential threats against Access Control Systems.

Application Development Security

  • Software control types and applications
  • Database structures and security
  • Datawarehouse and data mining
  • Software development life cycle
  • Object-based programming components
  • Expert systems and artificial intelligence
  • Application security and precautions.

Business Continuity and Disaster Recovery Planning

  • Project components
  • Continuity plans
  • Work effect analysis
  • Creating and performing disaster and continuity plans
  • Backup and secondary facilities


  • Encryption date
  • Encryption components
  • Symmetric and asymmetric encryption components
  • PKI Infrastructure
  • Integration Algorithms and application
  • Invasions against encryption systems

Information Security Governance and Risk Management

  • Security Policies
  • Information Classification
  • Security Managements Responsibilities
  • Security Awareness Training
  • 3 Main Security Guidelines (CIA)
  • Risk Management and Analysis

Legal, Regulations, Investigations and Compliance

  • Computer Crimes
  • Laws, Evidence Types
  • Active Laws for Fighting Against Computer Crimes
  • Incident Procedures
  • Ethical Methods
  • Guidelines for Information Security Professionals

Operations Security

  • Administrative Responsibilities
  • Operating Unit Responsibilities
  • Configuration Management
  • Alteration Management
  • Systems that are in high availability and accessibility
  • E-mail Security
  • Threats against operating security

Physical (Environmental) Security

  • Administrative technical and physical controls
  • Facility positioning, building and management
  • Physical security risks, threats and precautions
  • Electricity requirements and precautions
  • Precautions against fire
  • Invasions against architecture

Security Architecture and Design

  • Operating system architecture
  • Trusted computing and security mechanisms
  • Safety models
  • Safety evaluation criteria
  • Certification and accreditation procedures
  • Invasions against architecture

Telecommunications and Network Security

  • Communicating under OSI and TCP models and other protocols
  • Network topologies
  • Cable and transmission Technologies
  • Network devices and services
  • Communication Security
  • Remote access
  • Wireless Technologies
  • Potential invasions in communication
  • protection against these

Recommended Course Books and Materials

  • Official (ISC)2 Guide to the CISSP® CBK, Second Edition ((ISC)2 Press) by Harold F. Tipton (Hardcover – Dec 22, 2009)
  • CISSP® All-in-One Exam Guide, Sixth Edition by Shon Harris (Hardcover – October 18, 2012)


  • studiSCope is a self-evaluation tool. Your strengths and weakness are detected through the pilot tests in the program and an automatic study program is created accordingly.

Official (ISC)²® CBK® Self Assessments LinkedIn CISSP Prep Group

You can reach the CISSP prep group in LinkedIn through the following link.