Certified Information Systems Security Professional - CISSP

Live Workshop

🗓️ Start date: 9 September
⏰ Time: 12 PM EST
🔁 Reoccurring: One session per week - Every Saturday
⏳ Duration: 24 hours >> 8 weeks >> 2 months
⏱️ Session duration: 1:00 hour

Welcome to our live, immersive Certified Information Systems Security Professional (CISSP) workshop! This hands-on workshop offers a comprehensive, in-depth exploration of the knowledge required to expertly design, engineer, and manage the security posture of an organization. Designed to prepare you for the CISSP exam, this workshop will provide you with a vibrant platform to review, refresh your knowledge, and identify areas of focus.

Who Should Attend?

This interactive workshop is tailor-made for professionals working in roles including, but not limited to:

  • Security Consultants
  • Security Managers
  • IT Directors/Managers
  • Security Auditors
  • Security Architects
  • Security Analysts
  • Security Systems Engineers
  • Chief Information Security Officers
  • Security Directors
  • Network Architects

Workshop Objectives

By the end of this workshop, participants will be able to:

  • Comprehend and apply essential concepts and techniques related to IT and security.
  • Align organizational operational goals with security functions and implementations.
  • Protect the organization's assets throughout their lifecycle.
  • Understand the structures and standards used to secure operating systems, networks, applications, and implement relevant security controls.
  • Implement system security through the application of security design principles and suitable control mitigations.
  • Appreciate the importance of cryptography in today's digital age.
  • Evaluate the impact of physical security elements on information system security and recommend appropriate protections.
  • Understand the components of communication and network security along with their functionalities.
  • Discuss concepts and architectures that define the technology and implementation systems and protocols at OSI model layers 1-7.
  • Understand and apply physical and logical access controls to different environments.
  • Evaluate various access control models to meet business security requirements.
  • Design and validate test and audit strategies that align with business requirements.
  • Enhance the operational function and capacity of an organization by applying suitable security controls and countermeasures.
  • Identify risks to an organization's operations and assess specific threats, vulnerabilities, and controls.

This live workshop is more than just a training course. It's an interactive, collaborative experience that offers real-time interaction with experts and peers. Beyond just theory, it includes practical case studies, group discussions, and activities to ensure a well-rounded understanding. Get ready to dive deep, ask questions, share insights, and expand your professional horizons in the dynamic field of information security.


Your Instructor

Mohamed Atef
Mohamed Atef

Dr. Mohamed Atef is a distinguished Cybersecurity Consultant and Certified Instructor, boasting an impressive career spanning over two decades of hands-on experience orchestrating and overseeing impactful Cybersecurity projects. His expertise extends across a spectrum of pivotal domains, including:

  • ISMS Implementation
  • CS Standards / Compliance
  • Security Operation Center
  • Penetration Testing
  • CS Enterprise Technical Solutions

With an impressive track record, Dr. Atef has authored three books on cybersecurity and has garnered acclaim as the creator of 14 best-selling online courses. His passion for cybersecurity education shines through in his engaging and informative teaching style, making complex concepts accessible to learners of all levels.

Professional Experience

Get started now!