CISSP Certification Training in Singapore

CISSP training will help you gain an in-depth understanding of computer security and access control systems. This course will ensure you are up-to-date with the latest best practices in the industry, which will help you pass the exam in the first attempt. This training course is aligned with the requirements of (ISC)².

As an outcome, you will gain expertise in CISSP architecture and will obtain the knowledge required for designing, developing, and managing a secure business environment essential for an organization.


  • 4/5-day instructor-led training*

  • 100% money back guarantee**

  • 1-year e-learning access

  • Course completion certificate

Request a Quote

We value your privacy. We will never spam you.

What you get

  • Learn to design, implement, and manage cybersecurity programs with online learning for 4-5 days.
  • Improve your score with one full-length simulated exam accompanied by comprehensive exam analytics.
  • Accelerate your cybersecurity career with support from leading professionals and mentors.
  • Dive deep into different CISSP domains with unlimited e-learning access for 1 year.
  • Get a rewarding career as you prepare for passing the CISSP certification by (ISC)² in one go.

Upcoming Batches

September 22,23,24,25 2020 (09:00 AM - 05:00 PM SGT)

September 26,27 October 03,04 2020 (09:00 AM - 05:00 PM SGT)

October 24,25,31 November 01 2020 (09:00 AM - 05:00 PM SGT)

October 27,28,29,30 2020 (09:00 AM - 05:00 PM SGT)

November 21,22,28,29 2020 (09:00 AM - 05:00 PM SGT)

November 24,25,26,27 2020 (09:00 AM - 05:00 PM SGT)

Course Outcomes


Increase your competence levels as an information security professional.


Course is aligned to the CISSP certification exam syllabus as per (ISC)2


Pass the CISSP certification exam by (ISC)2.

Our 100% Money Back Guarantee

We offer a no questions asked, 100% money back guarantee to all of our training participants. This guarantee covers you when you are dissatisfied with any aspect of the CISSP Certification Training, and communicate it to us via an email ( within 24 hours from the time when the first session of the bootcamp training. It's that easy!

Course Curriculum

Introduction to the course
CISSP Certification Goals
Security Professional Certification Value
Exam Common Body of Knowledge
Becoming a CISSP
Cryptography Concepts Part1
Cryptography Concepts Part2
History of Cryptography
Cryptosystem Features
Encryption Systems Part1
Encryption Systems Part2
Substitution Ciphers
Symmetric Algorithms Part1
Symmetric Algorithms Part2
Asymmetric Algorithms
Message Integrity
Digital Signatures
Public Key Infrastructure Part1
Public Key Infrastructure Part2
Trusted Platform Module
Encryption Communication Levels
E-Mail Security
Internet Security
Cryptography Attacks
Threat Mitigation Techniques
Geographical-Man Made and Political Threats
Site and Facility Design
Perimeter Security
Building and Internal Security
Secure Data Centers and Fire Detection Systems
Types of Power Issues
HVAC Guidelines
Equipment Security and Personal Security
Security Model Concepts
System Architecture
Computing Platforms
Virtual Computing and Security Services
System Components
Memory Concepts
Enforcing Process Security and Multitasking
System Security Architecture
Security Models and Modes Part1
Security Models and Modes Part2
System Evaluation and Ass...
Certification and Accreditation
Security Architecture Threats
Database Security and Distributed Systems Security
Access Control Concepts
Identification and Authentication
Password Types and Management
Ownership-Character-Physiological-Behavioral Factors
Biometric Considerations
Authorization Concepts Part1
Authorization Concepts Part2
User Accountability
Vulnerability Assessment
Penetration Testing and Threat Modeling
Access Control Categories-Types-Models and Administration
Provisioning Life Cycle and Access Control Monitoring
Access Control Threats
System Development Life Cycle
Software Testing and Validation
Software Development Security Best Practices
Software Development Methods
Programming Languages
Database Architecture and Models
Database Interface Languages
Data Warehouse-Mining and Threats
Database and Application Access Control
Monitoring for Problems
Software Threats and Security
Principles and Terms
Security Frameworks & Methodologies Part1
Security Frameworks & Methodologies Part2
Risk Assessment
Asset Values-Vulnerabilities and Threats
Quantitative Risk Analysis
Safeguard Selection
Risk Management
Security Governance Components
Security Policies
Classification Life Cycle
Responsibilities and Roles
Personnel Security
Security Awareness Training
OSI and TCIP Models Part1
OSI and TCIP Models Part2
IP Addressing
Transmission Methods
Types of Cabling
Network Topologies
Network Protocols and Services
Network Routing and Devices
Network Connection Types Part1
Network Connection Types Part2
Network Authentication
Wireless Technologies
WLAN Security Methods
Network Threats and Cabling Behaviors
Operation Security Concepts
Protecting Tangible and Intangible Assets
Asset and Media Management
Storage Options
Network and Resource Management
Incident Response and Change Management
Patch Management-Audit and Review
Threats and Preventative Measures
Trusted Paths-Trusted Recovery and System Hardening
Monitoring and Reporting
Business Continuity and Disaster Recovery Concepts Part1
Business Continuity and Disaster Recovery Concepts Part2
BIA Development
Business Continuity Planning
Preventive Controls
Recovery Strategies Part1
Recovery Strategies Part2
Data Backup Types
Data Recovery Terms
Critical Teams and Duties
BCP Testing
Digital Crime
Computer Crime Concepts
Major Legal Systems
Intellectual Property Law
Privacy Part1
Privacy Part2
Incident Response
Forensic and Digital Investigations Part1
Forensic and Digital Investigations Part2
Evidence Part1
Evidence Part2
Security Professional Ethics
Course Outro