CISSP Training Hong Kong

10,788 Learners

Aligned to

CISSP

Want to Train your team? :Get a quote

Aligned to

CISSP

CISSP Certification Course Overview

CISSP training in Hong Kong students learn how to design systems that protect data confidentiality, integrity, and accessibility. The CISSP course in Hong Kong, will give you the skills to design, build, and maintain a secure business environment. The course also shares industry best practices and everything you need to pass the CISSP certification exam.

CISSP Training Course Key Features

100% Money Back Guarantee
No questions asked refund*

At Simplilearn, we value the trust of our patrons immensely. But, if you feel that a course does not meet your expectations, we offer a 7-day money-back guarantee. Just send us a refund request via email within 7 days of purchase and we will refund 100% of your payment, no questions asked!
  • CISSP Exam Voucher Included
  • 5 simulation test papers to prepare you for CISSP certification
  • Up-to-date CISSP curriculum with interactive exercises
  • 8X higher interaction in live online classes conducted by industry experts
  • Guaranteed to Run Live Sessions on Specified Dates
  • Exam-focused prep materials tailored specifically to the format
  • CISSP Exam Voucher Included
  • 8X higher interaction in live online classes conducted by industry experts
  • 5 simulation test papers to prepare you for CISSP certification
  • Guaranteed to Run Live Sessions on Specified Dates
  • Up-to-date CISSP curriculum with interactive exercises
  • Exam-focused prep materials tailored specifically to the format
  • CISSP Exam Voucher Included
  • 8X higher interaction in live online classes conducted by industry experts
  • 5 simulation test papers to prepare you for CISSP certification
  • Guaranteed to Run Live Sessions on Specified Dates
  • Up-to-date CISSP curriculum with interactive exercises
  • Exam-focused prep materials tailored specifically to the format

Skills Covered

  • Security and Risk Management
  • Security Architecture and Engineering
  • Identity and Access Management IAM
  • Security Operations
  • Asset Security
  • Communication and Network Security
  • Security Assessment and Testing
  • Software development security
  • Security and Risk Management
  • Asset Security
  • Security Architecture and Engineering
  • Communication and Network Security
  • Identity and Access Management IAM
  • Security Assessment and Testing
  • Security Operations
  • Software development security
  • Security and Risk Management
  • Asset Security
  • Security Architecture and Engineering
  • Communication and Network Security
  • Identity and Access Management IAM
  • Security Assessment and Testing
  • Security Operations
  • Software development security

Begin your journey to success

Get lifetime access to self-paced e-learning content

Benefits

CISSP training in Hong Kong gives you the skills you need to move ahead in the growing and lucrative field of cyber security. Cybersecurity Ventures forecasted that cyber security jobs will reach 3.5 million in 2021, investments will total US $282.3 billion by 2024, and achieve 11.1 percent growth per year.

  • Designation
  • Annual Salary
  • Hiring Companies
  • Annual Salary
    $110KMin
    $113KAverage
    $122KMax
    Source: Glassdoor
    Hiring Companies
    IBM hiring for IT Director/Manager professionals in Hong Kong
    Cisco Systems hiring for IT Director/Manager professionals in Hong Kong
    Vodafone hiring for IT Director/Manager professionals in Hong Kong
    Source: Indeed
  • Annual Salary
    $73KMin
    $100KAverage
    $130KMax
    Source: Glassdoor
    Hiring Companies
    IBM hiring for Security Architect professionals in Hong Kong
    Dell hiring for Security Architect professionals in Hong Kong
    VMware hiring for Security Architect professionals in Hong Kong
    Microsoft hiring for Security Architect professionals in Hong Kong
    Source: Indeed
  • Annual Salary
    $43KMin
    $65KAverage
    $93KMax
    Source: Glassdoor
    Hiring Companies
    IBM hiring for Security Manager professionals in Hong Kong
    TSYS hiring for Security Manager professionals in Hong Kong
    FIS Global hiring for Security Manager professionals in Hong Kong
    Source: Indeed
  • Annual Salary
    $43KMin
    $65KAverage
    $93KMax
    Source: Glassdoor
    Hiring Companies
    IBM hiring for IT Security Engineer professionals in Hong Kong
    Wipro hiring for IT Security Engineer professionals in Hong Kong
    Capgemini hiring for IT Security Engineer professionals in Hong Kong
    Source: Indeed

Training Options

Self Paced Learning

  • Lifetime access to high-quality self-paced e-learning content curated by industry experts
  • 24x7 learner assistance and support

$2,099

online Bootcamp

  • Flexi Pass Enabled: Flexibility to reschedule your cohort within first 90 days of access.
  • Lifetime access to high-quality self-paced e-learning content and live class recordings
  • 24x7 learner assistance and support
  • Batches in alignment with the new version
  • Batch starting in Hong Kong from:
13th Jul, Weekend Class
12th Aug, Weekday Class
View All Schedules

$1,866

Corporate Training

Upskill or reskill your teams

  • Flexible pricing & billing options
  • Private cohorts available
  • Training progress dashboards
  • Skills assessment & benchmarking
  • Platform integration capabilities
  • Dedicated customer success manager

CISSP Course Curriculum

Eligibility

The CISSP course in Hong Kong is the most globally recognized professional requirement in the IT Security domain. This CISSP training is best suited for those at the intermediate level of their career including; security consultants/managers, IT directors/managers, security auditors/architects, security system engineers, CIOs, and network architects.
Read More

Pre-requisites

To obtain a CISSP certification in Hong Kong, you must have five years or more of full-time professional experience in two or more of the eight domains of the CISSP – (ISC)² CBK 2018. Students enrolled in CISSP training in Hong Kong with less than five years of experience will receive an (ISC)² associate title.
Read More

Course Content

  • CISSP® - Certified Information Systems Security Professional

    Preview
    • Lesson 01 - Course Introduction

      07:28Preview
      • 1.01 CISSP Course Introduction
        07:28
    • Lesson 02 - Domain One: Security and Risk Management

      01:48:49Preview
      • 1.01 Introduction
        01:13
      • 1.02 Introduction to Security and Risk Management
        04:39
      • 1.03 Understand, Adhere to, and Promote Professional Ethics
        01:43
      • 1.04 Knowledge Check
      • 1.05 Understand and Apply Security Concepts
        02:01
      • 1.06 Evaluate and Apply Security Governance Principles
        03:54
      • 1.07 Goals, Mission, and Objectives
        02:40
      • 1.08 Control Frameworks, Due Care, and Due Diligence
        03:59
      • 1.09 Knowledge Check
      • 1.10 Determine Compliance and Other Requirements
        01:34
      • 1.11 Understand Legal and Regulatory Issues that Pertain to Information Security in a Holistic Context
        01:37
      • 1.12 Types of Intellectual Properties (IP) Law
        04:52
      • 1.13 OECD Principles, GDPR, and Data Protection principles
        04:12
      • 1.14 Data Protection Principles
        03:06
      • 1.15 Understand Requirements for Investigation Types
        05:10
      • 1.16 Knowledge Check
      • 1.17 Develop, Document, and Implement Security Policy, Standards,Procedures, and Guidelines
        04:02
      • 1.18 Knowledge Check
      • 1.19 Need for Business Continuity Planning (BCP)
        02:06
      • 1.20 Business Continuity Planning Phases
        01:28
      • 1.21 Business Impact Analysis
        03:29
      • 1.22 Identify Preventive Controls
        03:40
      • 1.23 Knowledge Check
      • 1.24 Contribute and Enforce Personnel Security Policies and Procedures
        05:23
      • 1.25 Introduction to Risk Management Concepts
        02:34
      • 1.26 Risk Analysis
        01:58
      • 1.27 Risk Analysis and Assessment
        04:36
      • 1.28 Countermeasure Selection
        01:48
      • 1.29 Risk Handling and Security Control Assessment
        04:12
      • 1.30 Security Control Assessment (SCA)
        02:00
      • 1.31 Risk Monitoring and Continuous Improvement
        03:41
      • 1.32 Knowledge Check
      • 1.33 Understand and Apply Threat Modeling Concepts and Methodologies
        02:13
      • 1.34 Threat Modeling Steps
        04:43
      • 1.35 DREAD Rating
        02:09
      • 1.36 Knowledge Check
      • 1.37 Apply Supply Chain Risk Management (SCRM) Concepts
        02:01
      • 1.38 Third-Party Management and Risks
        02:47
      • 1.39 Third-Party Risk Management Life Cycle
        05:51
      • 1.40 Knowledge Check
      • 1.41 Establish and Maintain a Security Awareness, Education, and Training Program
        04:28
      • 1.42 Program Effectiveness: Evaluation
        01:49
      • 1.43 Knowledge Check
      • 1.44 Quick Recap
        01:11
      • 1.45 Knowledge Check
    • Lesson 03 - Domain Two: Asset Security

      51:32Preview
      • 2.01 Introduction
        01:15
      • 2.02 Introduction to Asset Security
        05:32
      • 2.03 Identify and Classify Information and Assets
        01:58
      • 2.04 Information Classification Objectives
        04:58
      • 2.05 Knowledge Check
      • 2.06 Establish Information and Asset Handling Requirements
        05:31
      • 2.07 Provision Resources Securely
        03:45
      • 2.08 Manage Data Life Cycle
        02:38
      • 2.09 Data Life Cycle: Create, Store, and Use
        04:01
      • 2.10 Data Life Cycle: Share, Archive, and Destroy
        03:38
      • 2.11 Data Remanence and Data Destruction
        03:59
      • 2.12 Knowledge Check
      • 2.13 Ensure Appropriate Asset Retention
        02:49
      • 2.14 Data and Data Security Controls
        02:29
      • 2.15 How to Select Controls
        03:14
      • 2.16 Digital Rights Management (DRM)
        00:44
      • 2.17 Data Loss Prevention (DLP)
        03:51
      • 2.18 Quick Recap
        01:10
      • 2.19 Knowledge Check
    • Lesson 04 - Domain Three: Security Architecture and Engineering

      02:05:31Preview
      • 3.01 Introduction
        01:28
      • 3.02 Introduction to Security Engineering
        01:16
      • 3.03 Research, Implement, and Manage Engineering Processes Using
        02:46
      • 3.04 Trust but Verify and Zero Trust
        01:41
      • 3.05 Privacy by Design
        02:40
      • 3.06 Knowledge Check
      • 3.07 Understand the Fundamental Concepts of Security Models
        01:08
      • 3.08_State Machine Model, Multilevel Lattice Model, Non-Interference Model, and Information Flow Model
        03:31
      • 3.09 Types of Security Models
        06:45
      • 3.10 Composition Theories, Covert Channels, and Open and Closed Systems
        03:34
      • 3.11 Knowledge Check
      • 3.12 Select Controls Based on System Security Requirements
        00:52
      • 3.13 Security Capabilities of Information Systems
        05:42
      • 3.14 Knowledge Check
      • 3.15 Assess and Mitigate the Vulnerabilities of Security Architectures
        03:19
      • 3.16 SCADA
        02:39
      • 3.17 Security Concerns of ICS
        04:01
      • 3.18 Cloud Computing
        01:58
      • 3.19 Categorization of Cloud
        03:17
      • 3.20 Internet of Things
        06:33
      • 3.21 Fog and Edge Computing
        03:37
      • 3.22 Knowledge Check
      • 3.23 Select and Determine Cryptographic Solutions
        02:44
      • 3.24 Cryptosystem Elements
        05:32
      • 3.25 Encryption Methods
        04:27
      • 3.26 Data Encryption Standards
        03:28
      • 3.27 Output Feedback, Counter, and Triple DES
        02:28
      • 3.28 Advanced Encryption Standards
        04:16
      • 3.29 Asymmetric Cryptography
        07:25
      • 3.30 Public Key Infrastructure
        02:12
      • 3.31 PKI Certificate and Processes
        02:36
      • 3.32 PKI Process: Steps
        01:09
      • 3.33 Hashing, MAC, and Digital Signatures
        04:15
      • 3.34 Key Management Principles
        02:28
      • 3.35 Knowledge Check
      • 3.36 Methods of Cryptanalytic Attacks
        04:44
      • 3.37 Knowledge Check
      • 3.38 Apply Security Principles to Site and Facility Design
        03:52
      • 3.39 Design Site and Facility Security Controls
        02:13
      • 3.40 Personnel Access Controls
        02:41
      • 3.41 Environmental Security Controls
        01:55
      • 3.42 Classes of Fires
        02:45
      • 3.43 Other Security Controls
        03:31
      • 3.44 HVAC, Power Supply, and Training
        01:50
      • 3.45 Knowledge Check
      • 3.46 Quick Recap
        02:13
      • 3.47 Knowledge Check
    • Lesson 05 - Domain Four: Communication and Network Security

      01:27:31Preview
      • 4.01 Introduction
        01:24
      • 4.02 Introduction to Communications and Network Security
        01:58
      • 4.03 Assess and Implement Secure Design Principles
        03:17
      • 4.04 Physical Layer and Data Link Layer
        04:33
      • 4.05 Network Layer
        05:10
      • 4.06 Transport Layer
        06:03
      • 4.07 Session Layer and Presentation Layer
        01:54
      • 4.08 Application Layer and Protocols
        03:48
      • 4.09 Knowledge Check
      • 4.10 IP Addressing
        04:58
      • 4.11 IPv6 and Its Address Structures
        07:02
      • 4.12 Knowledge Check
      • 4.13 Internet Security Protocol(IPsec)
        02:32
      • 4.14 IPsec Security Protocols
        03:47
      • 4.15 Secure Access Protocols
        02:39
      • 4.16 Implementation of Multilayer Protocol, Fiber Channels, and Micro-Segmentation
        02:51
      • 4.17 SDN and Wireless Technologies
        03:44
      • 4.18 Cellular Network and CDN
        03:38
      • 4.19 Knowledge Check
      • 4.20 Secure Network Components
        04:16
      • 4.21 Understand Network Access Control (NAC) and Endpoint Security
        04:42
      • 4.22 Knowledge Check
      • 4.23 Implement Secure Communication Channels
        02:27
      • 4.24 Application-Level Gateway, Circuit-Level Gateway, and Network Security Terms
        02:25
      • 4.25 Remote Access Technologies
        02:07
      • 4.26 VPN Protocols
        01:40
      • 4.27 VPN Protocols: Comparison
        04:38
      • 4.28 Multimedia Collaboration, Network Function Virtualization, and Network Attacks
        04:04
      • 4.29 Quick Recap
        01:54
      • 4.30 Knowledge Check
    • Lesson 06 - Spotlight Video One

      10:50
      • CISSP Spotlight One
        10:50
    • Lesson 07 - Domain Five: Identity and Access Management (IAM)

      46:03Preview
      • 5.01 Introduction
        00:57
      • 5.02 Introduction to Identity and Access Management (IAM)
        01:35
      • 5.03 Control Physical and Logical Access to Assets
        01:32
      • 5.04 Manage Identification and Authentication of People Devices and Services
        03:53
      • 5.05 Biometrics and Accuracy Measurement
        02:08
      • 5.06 Passwords and Its Types
        03:39
      • 5.07 Tokens, Token Devices, and Authorization
        05:26
      • 5.08 Federated Identity Management (FIM) and Credential Management System
        02:36
      • 5.09 Single Sign-On (SSO) and Just-In-Time (JIT)
        03:07
      • 5.10 Knowledge Check
      • 5.11 Federated Identity with a Third-Party Service
        01:48
      • 5.12 Implement and Manage Authorization Mechanisms
        02:45
      • 5.13 Attribute-Based Access Control (ABAC) and Risk-Based Access Control
        03:00
      • 5.14 Knowledge Check
      • 5.15 Manage the Identity and Access Provisioning Life Cycle
        02:18
      • 5.16 Privilege Escalation
        02:33
      • 5.17 Implement Authentication Systems
        03:12
      • 5.18_Kerberos and Its Steps, RADIUS, TACACS, and TACACS Plus
        03:42
      • 5.19 Quick Recap
        01:52
      • 5.20 Knowledge Check
    • Lesson 08 - Domain Six: Security Assessment and Testing

      01:01:18Preview
      • 6.01 Introduction
        01:04
      • 6.02 Introduction to Security Assessment and Testing
        00:49
      • 6.03 Design and Validate Assessment, Test, and Audit Strategies
        05:12
      • 6.04 SOC Reports and Security Assessments
        05:28
      • 6.05 Internal Audit and Assessment
        03:43
      • 6.06 External Audit and Assessment
        02:15
      • 6.07 Third-Party Audit and Assessment
        02:57
      • 6.08 Knowledge Check
      • 6.09 Vulnerability Assessment
        01:45
      • 6.10 Network Discovery Scan
        01:20
      • 6.11 Network Vulnerability Scan and Web Vulnerability Scan
        02:41
      • 6.12 Penetration Testing
        01:00
      • 6.13 Penetration Testing Process and Testing Types
        03:27
      • 6.14 Log Management and Review
        05:11
      • 6.15 Security Testing in SDLC
        03:32
      • 6.16 Code Review and Testing
        01:41
      • 6.17 Testing Methods
        05:41
      • 6.18 Interface Testing
        03:16
      • 6.19 Knowledge Check
      • 6.20 Collect Security Process Data
        03:11
      • 6.21 KPI Process
        02:36
      • 6.22 Knowledge Check
      • 6.23 Analyze Test Output and Generate Report
        03:09
      • 6.24 Quick Recap
        01:20
      • 6.25 Knowledge Check
    • Lesson 09 - Domain Seven: Security Operations

      01:34:04Preview
      • 7.01 Introduction
        01:08
      • 7.02 Introduction to Security Operations
        00:51
      • 7.03 Understand and Comply with Investigations
        03:39
      • 7.04 Digital Forensics
        03:31
      • 7.05 Understand the Digital Evidences
        04:34
      • 7.06 Knowledge Check
      • 7.07 Conduct Logging and Monitoring Activities
        02:51
      • 7.08 Knowledge Check
      • 7.09 Continuous Monitoring
        01:53
      • 7.10 Digital Forensics Tools, Tactics, Procedures, Artifacts, and UEBA
        04:34
      • 7.11 Knowledge Check
      • 7.12 Perform Configuration Management
        01:53
      • 7.13 Apply Foundational Security Operation Concepts
        01:15
      • 7.14 Identity and Access Management with Various Types of Accounts
        01:55
      • 7.15 Apply Resource Protection
        01:55
      • 7.16 Controls for Protecting Assets
        02:34
      • 7.17 Conduct Incident Management
        02:17
      • 7.18 Understand Incident Response Life Cycle
        03:36
      • 7.19 Knowledge Check
      • 7.20 Operate and Maintain Detective and Preventive Measures
        03:26
      • 7.21 Understand Anti-Malware Systems, AI, Machine Learning, and Deep Learning
        03:23
      • 7.22 Implement and Support Patch and Vulnerability Management
        04:07
      • 7.23 Understand and Participate in Change Management Processes
        02:51
      • 7.24 Implement Recovery Strategies
        02:37
      • 7.25 Types of Recoveries
        02:37
      • 7.26 Operational Recovery
        02:16
      • 7.27 Recovery Partner Strategies
        01:56
      • 7.28 Redundancy and Fault Tolerance
        04:49
      • 7.29 Knowledge Check
      • 7.30 Implement Disaster Recovery (DR) Processes
        06:47
      • 7.31 Knowledge Check
      • 7.32 Test Disaster Recovery Plans (DRP)
        03:07
      • 7.33 Knowledge Check
      • 7.34 Participate in Business Continuity (BC) Planning and Exercises
        03:21
      • 7.35 Implement and Manage Physical Security
        04:55
      • 7.36 Importance of Lighting in Security Management
        00:58
      • 7.37 Access Control
        04:52
      • 7.38 Knowledge Check
      • 7.39 Address Personnel Safety and Security Concerns
        02:10
      • 7.40 Quick Recap
        01:26
      • 7.41 Knowledge Check
    • Lesson 10 - Domain Eight: Software Development Security

      01:00:08Preview
      • 8.01 Introduction
        01:03
      • 8.02 Introduction to Software Development Security
        00:46
      • 8.03 Integrate Security in the Software Development Life Cycle
        01:17
      • 8.04 Software Development Models
        04:42
      • 8.05 Extreme Programming Model
        01:28
      • 8.06 DevOps and DevSecOps
        02:44
      • 8.07 CMM and SAMM
        02:23
      • 8.08 Change Management and Integrated Product Team (IPT)
        02:49
      • 8.09 Knowledge Check
      • 8.10 Security Controls in Software Development Ecosystems
        04:58
      • 8.11 Other Security Controls in Software Development Ecosystems
        03:21
      • 8.12 Software Configuration Management (SCM)
        04:25
      • 8.13 Database and Data Warehousing Environments
        03:27
      • 8.14 Knowledge Check
      • 8.15 Assess the Effectiveness of Software Security
        02:20
      • 8.16 Software Security and Assurance: Granularity of Controls and Separation of Environments
        02:18
      • 8.17 Software Security and Assurance: TOC or TOU, Prevention of Social Engineering, Backup, Software Forensics, Cryptography
        02:51
      • 8.18 Software Security and Assurance: Password Protection, Mobile Mode Controls, and Sandbox
        01:41
      • 8.19 Software Security and Assurance: Strong Language Support, XML, and SAML
        01:12
      • 8.20 Assessing the Effectiveness of Software Security
        02:51
      • 8.21 Knowledge Check
      • 8.22 Assess Security Impact of Acquired Software
        01:26
      • 8.23 Free and Open Source Software
        03:13
      • 8.24_Knowledge Check
      • 8.25 Define and Apply Secure Coding Guidelines and Standards
        04:31
      • 8.26 Web Application Environment
        02:54
      • 8.27 Knowledge Check
      • 8.28 Quick Recap
        01:28
      • 8.29 Knowledge Check
    • Lesson 11 - Spotlight Video Two

      11:51
      • Spotlight Two
        11:51

CISSP Course Advisor

  • Dean Pompilio

    Dean Pompilio

    Technical Trainer, Owner- Steppingstonesolutions Inc

    Mr.Pompilio has been an IT Professional since 1989. He has worn many hats along the way and holds over 20 IT certifications which include EC-Council CEI, CEH, CHFI, CISSP, CISA, CISM. His passion is to help IT professionals achieve their training goals and career growth.

prevNext

CISSP Exam & Certification

CISSP Training Hong Kong
  • How do I become a CISSP® certified professional in Hong Kong?

    You must pass the CISSP exam to become certified. The CISSP exam is a computer-based test (CBT) administered at Pearson VUE Testing centres around the world.

    Link: https://www.isc2.org/-/media/ISC2/Certifications/Exam-Outlines/CISSP-Exam-Outline-2018-v718.ash

    Exam Pass Guarantee*: Except for India, Indian Subcontinent, and Africa
    Simplilearn offers Exam Pass Guarantee to our students who complete our course training. We offer a voucher (free of charge) to the students to retake the exam in case they fail ISC2 CISSP final exam.

    T&C for claiming the retake voucher as a part of exam pass guarantee:
    • Attend at least one complete instructor-led class
    • Score over 85% in at least 3 of the 5 test papers provided along with the course
    • Must give final exam within 30 days from the date of course completion

    *Due to COVID-19 this has been increased to 365 days from the date of enrollment. This update is only valid for enrollment between 1st Oct 2020 to 31st March 2021.

    • Produce exam failure notice received from ISC2
       

  • How long is the CISSP Certification valid?

    CISSP Certification is valid for three years. CISSP training in Hong Kong students should contact Simplilearn for more information.

  • How do I unlock my Simplilearn certificate?

    Online classroom:

    • CISSP training in Hong Kong students must attend one complete batch of courses.
    • Students must complete one simulation test and get a minimum score of 60%.

    Online self-learning:

    • CISSP certification in Hong Kong students must complete 85% of the course.
    • · Students must complete one simulation test and get a minimum score of 60%.

  • What is the passing score for CISSP Certification exam?

    CISSP training in Hong Kong students must earn a 700 to pass the CISSP Certification exam.

  • How do I fill out and submit the CISSP application form online?

    1. First, CISSP training in <Location Name> students should review exam availability by credential.
    2. Create an account on the Pearson VUE website and review the NDA.
    3. Choose a convenient test center location.
    4. Choose an appointment time.
    5. Last, CISSP course in <Location Name> students need to pay for the exam.

  • Does Simplilearn provide exam application assistance?

    Yes, Simplilearn does provide exam application help to CISSP training in Hong Kong students. CISSP certification in Hong Kong students need to contact Help and Support for more information.

  • How many attempts do I have to pass the CISSP exam?

    CISSP training in Hong Kong students have one attempt to pass the exam.

  • How long does it take to receive the CISSP Certification exam results?

    CISSP certification in Hong Kong students will receive results in 2-4 weeks.

  • If I fail in the CISSP Exam, can I apply for re-evaluation?

    If you fail the exam, you cannot ask for an exam re-evaluation. After 30 days, CISSP course in Hong Kong students can retake the exam.

  • How do I apply for CISSP re-examination?

    CISSP training in Hong Kong students who don’t pass the exam the first time can retest after 30 days.

  • I have passed the CISSP Certification examination. When and how do I receive my certificate?

    CISSP training in Hong Kong students will receive their certification via email four to six weeks after receiving their exam results email.

  • Are the training and course material effective in preparing students for the CISSP exam?

    Simplilearn’s CISSP training in Hong Kong gives candidates all the tools and knowledge they need to pass the certification exam on their first attempt. Because it leverages a Global Learning Framework and uses a hands-on learning approach, Simplilearn’s CISSP course in Hong Kong provides students the training to pass their exam and the skills to succeed in their career.

  • What if I miss a class?

    Simplilearn CISSP training in Hong Kong course records each class so students can review them. CISSP certification in Hong Kong students can use Flexi-pass to watch 15 course sessions for 90 days.

  • How do I schedule/book my exam?

    CISSP training in students can click the link below for information about the booking process:

    https://www.simplilearn.com/ice9/about_course_images/Raise_exam_request_through_LMS.pdf

  • When can I register for the CISSP exam?

    CISSP training in Hong Kong graduates can schedule their CISSP examination within six months from their class enrollment date. Once you are ready to take your exam, contact Simplilearn to receive an exam voucher code. Graduates of the CISSP training in Hong Kong course need to take their test within 12 months of the date of the exam voucher.

  • Do you provide any practice tests as part of this course?

    Yes, Simplilearn students can take one free practice exam as part of their CISSP training in Hong Kong preparation for the actual certification test. CISSP certification in Hong Kong candidates can try this Free CISSP Exam Prep Practice Test to grasp the course curriculum.

  • What is Simplilearn’s Exam Pass Guarantee?

    U.S., Canadian, and European students have an Exam Pass Guarantee.*

    An Exam Pass Guarantee is a benefit given to those who complete their CISSP training in Hong Kong course. If the student fails the ISC2 CISSP final exam, Simplilearn offers a free voucher to retake the test.

    The terms and conditions for claiming the retake voucher are:

    • Attend at least one complete instructor-led CISSP course in Hong Kong.
    • Score above 85% in at least three of the five test papers. 
    • Take the final exam within 30 days of completing the CISSP certification in Hong Kong course.
    • Produce proof of the exam failure notice received from ISC2.

  • What are the prerequisites for CISSP certification?

    Simplilearn’s CISSP training in Hong Kong helps professionals who want to advance in the information security field. To merit a CISSP certificate from ISC2, CISSP certification in Hong Kong course graduates must have a minimum of five years of recent experience working full-time in two or more of the eight domains of the CISSP – CBK 2018. Those who do not have the required five years of experience can earn an ISC2 associate title. A CISSP certificate will replace the associate title after five years of experience.

  • How can I submit the CISSP Exam application online? Is any assistance available?

    The CISSP examination can be scheduled within 6 months from the date of enrolment. Once you are ready to take the exam, contact Simplilearn and you will receive an exam voucher code. You must complete the CISSP examination within a year from the day we issue the exam voucher.

    Please click the link for information regarding the booking process.

    • Review CISSP exam availability by credential.
    • Visit the Pearson VUE website, create an account, and review the Pearson VUE NDA.
    • Select the most convenient test center location.
    • Select an appointment time.
    • Pay for your exam.

    Yes, we do assist with the exam application process. Please get in touch with our help and support for more information. 

  • How many attempts does it take to pass the CISSP exam, and how long until I receive the certification results?

    You will have one attempt to pass the CISSP exam, and the results will be available in 2-4 weeks.

  • What are the re-evaluation options after failing the CISSP Exam, and how do I apply for a re-examination?

    If you fail, you won’t be able to apply for re-evaluation. If you don’t pass the exam the first time, you can retest after 30 days re-evaluation.

  • How long is the CISSP Certification valid for?

    You will receive your certification via email 4-6 weeks after you receive your exam results email. CISSP Certification is valid for three years.

CISSP Course Reviews

  • Peter Bartow

    Peter Bartow

    Sr Project Manager IT PMO at University of Miami, Miami

    I enjoyed taking the class with so many people from all over the world.

  • Ebenezer Fowobaje

    Ebenezer Fowobaje

    Product Owner at High Products Consulting, Dallas

    The training is very efficient and accurate...Simple and direct teaching technique was helpful.

  • Erik Smidt

    Erik Smidt

    Sr. Security Manager, Washington

    The course was well balanced and covered each domain clearly and in good detail. The instructor was very knowledgeable and led a very effective course.

  • Rohit Dohare

    Rohit Dohare

    IT Security and Compliance @ Anglepoint Inc., San Francisco

    I would like to thank Simplilearn for providing a knowledgeable trainer. It was a great experience with Simplilearn team.

  • Manoj Sharma

    Manoj Sharma

    Information Security Manager, Delhi

    The comprehensive syllabus, the quality of the WebEx app, the expertise of the trainers, and the user-friendliness of the Simplilearn website... Highly satisfied with the CISSP certification and CISSP training programs.

  • Vijay Chaitanya Reddy Kovvuri

    Vijay Chaitanya Reddy Kovvuri

    Information Security at Syntel, Pune

    Interactive sessions, along with example scenarios, were highly beneficial and contributed to the overall positive flow. The inclusion of CISSP certification and CISSP training further enhanced the learning experience.

  • Fernandez Vijay

    Fernandez Vijay

    Technical Specialist - Security at Microland Limited, Bangalore

    Simplilearn has been an excellent learning platform for me. I enrolled in their CISSP certification program, and my expectations were fully met due to the trainer's expertise in the concepts. I look forward to taking more CISSP training courses with Simplilearn.

  • R Giri

    R Giri

    Sr.Manager - IT at Syndicate Bank, Bangalore

    The CISSP certification training offered mind-blowing concepts from the instructor, enriched with numerous industry examples. The entire program was very well organized.

  • Thomas Kurian

    Thomas Kurian

    Information Security Engineer at Kuwaiti Canadian Consulting Group, Kuwait

    The training is online and interactive. The recordings are also shared for our reference.

  • Nityanand Singh

    Nityanand Singh

    Associate Manager-IT Operations at Tredence, Bangalore

    Really good training. It helped me to clear a lot of doubts which were present in my mind for a long time.

  • Sujay Sonar

    Sujay Sonar

    Business Analyst at Cognizant Technology Solutions, Pune

    The course content is very good and satisfactory. The trainer is also good with his teaching abilities.

  • Chandrakant Khairnar

    Chandrakant Khairnar

    Product Manager, Mumbai

    Training was up to the mark, solved my purpose of joining the course, a kick-starter to exam preparation and getting the basics right.

  • Rakesh Sharma

    Rakesh Sharma

    IT Consultancy and Advisory, Mumbai

    I loved the course on CISSP® - Certified Information Systems Security Professional from Simplilearn. It was concise, comprehensive and easy to follow. Their videos, live sessions, and exams are excellent.

  • Akbar Ali

    Akbar Ali

    Systems Engineer at Allscripts, Pune

    One of the interesting and interactive sessions I have ever attended.

  • Hussein Ali AL-Assaad

    Hussein Ali AL-Assaad

    IT Manager at O&G Engineering, Kuwait

    Simplilearn has been a great learning experience. The trainer is extremely knowledgeable. The full team is very helpful and flexible. I recommend Simplilearn to my friends and families.

prevNext

Why Online Bootcamp

  • Develop skills for real career growthCutting-edge curriculum designed in guidance with industry and academia to develop job-ready skills
  • Learn from experts active in their field, not out-of-touch trainersLeading practitioners who bring current best practices and case studies to sessions that fit into your work schedule.
  • Learn by working on real-world problemsCapstone projects involving real world data sets with virtual labs for hands-on learning
  • Structured guidance ensuring learning never stops24x7 Learning support from mentors and a community of like-minded peers to resolve any conceptual doubts

CISSP Training Course FAQs

  • What certification will I receive after completing the CISSP training in Hong Kong?

    After successful completion of the CISSP training in Hong Kong, you will be awarded the course completion certificate along with the 30 hours CPE's certificate from Simplilearn.

  • What else will I receive as part of the CISSP training in Hong Kong?

    You will get access to our e-learning content along with the practice simulation tests,  complemented by our tips and tricks videos that help you tackle the toughest exam questions. You will also get an online participant handbook with cross references to the e-learning segments for learning reinforcement.

  • What are the modes of training offered for this CISSP course in Hong Kong?

    This CISSP training in Hong Kong is available in two learning modes. One is the self-paced mode where candidates need to follow pre-recorded high-quality videos. The other is the blended learning mode where candidates are offered instructor-led live classes along with the pre-recorded content.

  • What comes after a CISSP certification course in Hong Kong?

    Achieving a CISSP certification in Hong Kong offers you many career benefits. However, you shouldn’t stop upskilling yourself as the world of cybersecurity is quite dynamic. Here are some of the courses you can consider taking after becoming CISSP certified:

  • Will CISSP Certification get me a job?

    CISSP certification can be pursued only if you have at least five years of experience in IT security. As such, CISSP will increase your credibility and open your doors to many high-paying cybersecurity jobs. CISSP meets the strict conditions of the ANSI/ISO/IEC 17024 standard and is also approved by the US Department of Defense (DoD), further increasing your employment chances.

    In the current scenario, the demand for CISSPs- is increasing rapidly in the cybersecurity and information security industries. As a CISSP Certified security consultant has the potential to design and implement effective security strategies, organizations highly demand them.

    The Demand For CISSP in the future witnessing the growth in demand for security professionals in the present scenario, it is easily predictable that the demand for these professionals will rise as long as security threats exist.

  • Can I cancel my enrollment? Will I get a refund?

    Yes, you can cancel your enrollment. We will refund you after deducting the administration fee. To learn more, please review our Refund Policy.

  • How does the exam pass guarantee work?

    Simplilearn offers an exam pass guarantee to students who complete the course training. Simplilearn uses top learning methodologies to equip learners with the knowledge and confidence to pass the CISSP exam on the first attempt. If you do not pass the CISSP exam on the first attempt, Simplilearn will provide you with one free exam retake.

    To ensure success, we strongly recommend taking the CISSP exam within a week of the course completion date—or a maximum of 45 days from completing the online training

    CISSP Exam Attempts:

    Attempt Time Frame Result Free Exam Retake
    First Within 6 months (180 days) from enrollment date Did Not Pass Yes

    Exam Pass Guarantee:
    If you do not pass the exam on the first attempt, Simplilearn will provide you one free exam retake.  You must submit a copy of your scorecard.  

    Terms and Conditions for qualifying:

    This money-back guarantee applies only to Simplilearn’s CISSP blended learning course and does not apply to Simplilearn’s self-paced learning CISSP course. It is valid only for participants who have paid the entire enrollment fee.

    The guarantee becomes void if:

    • Participants do not take the CISSP examination within 45 days of unlocking the certificate.
    • Participants do not maintain 100% attendance during the training sessions.
    • Participants fail to score at least 80% in at least 2 simulation tests available at lms.Simplilearn.com
    • Participants do not follow the trainer's instructions and do not complete the exercises given during the training.
    • Participants do not submit the required documents to Simplilearn.

Find Cyber Security Programs in Hong Kong

CEH (v12)- Certified Ethical Hacker
  • Disclaimer
  • PMP, PMI, PMBOK, CAPM, PgMP, PfMP, ACP, PBA, RMP, SP, and OPM3 are registered marks of the Project Management Institute, Inc.