CISSP Certification Training in Singapore

This course offers all the information which ensures that the security leaders get an in-depth knowledge and understanding about the new threats, technologies, regulations, standards, and practices.

  • 5 Days Instructor-led Training*

  • 100% Money Back Guarantee**

  • 1-year e-learning access

Request a Quote

We value your privacy. We will never spam you.

What you get

  • 5-day immersive training in Singapore.
  • 1-year access to the audio-video lectures.
  • 100% Money back guarantee 

Fill in the form alongside to get up to USD 400 Off on the standard course fee. (Limited time offer)

Upcoming Batches

October 14,15,16,17,18 2019 (Mon,Tue,Wed,Thu,Fri)

October 21,22,23,24,25 2019 (Mon,Tue,Wed,Thu,Fri)

November 11,12,13,14,15 2019 (Mon,Tue,Wed,Thu,Fri)

November 18,19,20,21,22 2019 (Mon,Tue,Wed,Thu,Fri)

December 02,03,04,05,06 2019 (Mon,Tue,Wed,Thu,Fri)

Course Outcomes


Increase your competence levels as an information security professional.


Course is aligned to the CISSP certification exam syllabus as per (ISC)2


Pass the CISSP certification exam by (ISC)2.

Our 100% Money Back Guarantee

We offer a no questions asked, 100% money back guarantee to all of our training participants. This guarantee covers you when you are dissatisfied with any aspect of the CISSP Certification Training, and communicate it to us via an email ( within 24 hours of the start of the classroom training program. It's that easy!

Course Curriculum

Introduction to the course
CISSP Certification Goals
Security Professional Certification Value
Exam Common Body of Knowledge
Becoming a CISSP
Cryptography Concepts Part1
Cryptography Concepts Part2
History of Cryptography
Cryptosystem Features
Encryption Systems Part1
Encryption Systems Part2
Substitution Ciphers
Symmetric Algorithms Part1
Symmetric Algorithms Part2
Asymmetric Algorithms
Message Integrity
Digital Signatures
Public Key Infrastructure Part1
Public Key Infrastructure Part2
Trusted Platform Module
Encryption Communication Levels
E-Mail Security
Internet Security
Cryptography Attacks
Threat Mitigation Techniques
Geographical-Man Made and Political Threats
Site and Facility Design
Perimeter Security
Building and Internal Security
Secure Data Centers and Fire Detection Systems
Types of Power Issues
HVAC Guidelines
Equipment Security and Personal Security
Security Model Concepts
System Architecture
Computing Platforms
Virtual Computing and Security Services
System Components
Memory Concepts
Enforcing Process Security and Multitasking
System Security Architecture
Security Models and Modes Part1
Security Models and Modes Part2
System Evaluation and Ass...
Certification and Accreditation
Security Architecture Threats
Database Security and Distributed Systems Security
Access Control Concepts
Identification and Authentication
Password Types and Management
Ownership-Character-Physiological-Behavioral Factors
Biometric Considerations
Authorization Concepts Part1
Authorization Concepts Part2
User Accountability
Vulnerability Assessment
Penetration Testing and Threat Modeling
Access Control Categories-Types-Models and Administration
Provisioning Life Cycle and Access Control Monitoring
Access Control Threats
System Development Life Cycle
Software Testing and Validation
Software Development Security Best Practices
Software Development Methods
Programming Languages
Database Architecture and Models
Database Interface Languages
Data Warehouse-Mining and Threats
Database and Application Access Control
Monitoring for Problems
Software Threats and Security
Principles and Terms
Security Frameworks & Methodologies Part1
Security Frameworks & Methodologies Part2
Risk Assessment
Asset Values-Vulnerabilities and Threats
Quantitative Risk Analysis
Safeguard Selection
Risk Management
Security Governance Components
Security Policies
Classification Life Cycle
Responsibilities and Roles
Personnel Security
Security Awareness Training
OSI and TCIP Models Part1
OSI and TCIP Models Part2
IP Addressing
Transmission Methods
Types of Cabling
Network Topologies
Network Protocols and Services
Network Routing and Devices
Network Connection Types Part1
Network Connection Types Part2
Network Authentication
Wireless Technologies
WLAN Security Methods
Network Threats and Cabling Behaviors
Operation Security Concepts
Protecting Tangible and Intangible Assets
Asset and Media Management
Storage Options
Network and Resource Management
Incident Response and Change Management
Patch Management-Audit and Review
Threats and Preventative Measures
Trusted Paths-Trusted Recovery and System Hardening
Monitoring and Reporting
Business Continuity and Disaster Recovery Concepts Part1
Business Continuity and Disaster Recovery Concepts Part2
BIA Development
Business Continuity Planning
Preventive Controls
Recovery Strategies Part1
Recovery Strategies Part2
Data Backup Types
Data Recovery Terms
Critical Teams and Duties
BCP Testing
Digital Crime
Computer Crime Concepts
Major Legal Systems
Intellectual Property Law
Privacy Part1
Privacy Part2
Incident Response
Forensic and Digital Investigations Part1
Forensic and Digital Investigations Part2
Evidence Part1
Evidence Part2
Security Professional Ethics
Course Outro


Our Training Venue in Singapore

MENON NETWORK PTE LTD - 152 Beach Road, Level 28, Gateway East, Singapore 189721

Menon Network facilitates training rooms for various modules with flexible space to host corporate presentations and video conferences. It provides an optimum learning environment with high-speed WiFi connection, corporate essentials, power and support facility. There are on-site administrative and technical support teams, security and video surveillance and a spacious lounge with complimentary food. Menon Network has been a regular hub for Grey Campus classroom training with positive reviews.