Certified Professional in Information Security Training

-- viewing now

Information Security is a critical field that requires professionals to protect sensitive data from cyber threats. The Certified Professional in Information Security (CPIS) training program is designed for IT professionals and security enthusiasts who want to advance their careers in this field.

4.0
Based on 3,814 reviews

6,279+

Students enrolled

GBP £ 149

GBP £ 215

Save 44% with our special offer

Start Now

About this course

Information Security is a rapidly evolving field that demands professionals who can identify and mitigate risks. The CPIS training program covers essential topics such as network security, cryptography, and threat analysis. By completing the CPIS training program, learners will gain hands-on experience in implementing security measures and protecting sensitive data. They will also learn how to stay up-to-date with the latest security threats and trends. Information Security professionals are in high demand, and the CPIS training program can help learners take their careers to the next level. If you're interested in pursuing a career in Information Security, explore the CPIS training program today and start protecting sensitive data tomorrow.

100% online

Learn from anywhere

Shareable certificate

Add to your LinkedIn profile

2 months to complete

at 2-3 hours a week

Start anytime

No waiting period

Course details


Network Security Fundamentals: This unit covers the basics of network security, including network architecture, protocols, and security measures to protect against cyber threats. Primary keyword: Network Security, Secondary keywords: Cybersecurity, Information Security. •
Threat Intelligence and Vulnerability Assessment: This unit focuses on identifying and assessing potential threats to an organization's information security posture. Primary keyword: Threat Intelligence, Secondary keywords: Vulnerability Management, Cybersecurity. •
Cryptography and Encryption: This unit explores the principles and techniques of cryptography, including encryption methods, algorithms, and protocols. Primary keyword: Cryptography, Secondary keywords: Encryption, Cybersecurity. •
Incident Response and Disaster Recovery: This unit teaches students how to respond to and recover from security incidents, including disaster recovery planning and business continuity. Primary keyword: Incident Response, Secondary keywords: Disaster Recovery, Business Continuity. •
Cloud Security Architecture: This unit covers the security design and implementation of cloud-based systems, including cloud security models, compliance, and risk management. Primary keyword: Cloud Security, Secondary keywords: Cloud Computing, Information Security. •
Identity and Access Management (IAM): This unit focuses on the management of identities and access to sensitive resources, including authentication, authorization, and accounting. Primary keyword: Identity and Access Management, Secondary keywords: IAM, Cybersecurity. •
Penetration Testing and Vulnerability Exploitation: This unit teaches students how to simulate cyber attacks and identify vulnerabilities in an organization's information security posture. Primary keyword: Penetration Testing, Secondary keywords: Vulnerability Exploitation, Cybersecurity. •
Security Governance and Compliance: This unit covers the principles and practices of security governance, including risk management, compliance, and regulatory requirements. Primary keyword: Security Governance, Secondary keywords: Compliance, Risk Management. •
Data Protection and Privacy: This unit explores the principles and practices of data protection and privacy, including data encryption, access control, and data breach response. Primary keyword: Data Protection, Secondary keywords: Privacy, Cybersecurity. •
Secure Software Development Life Cycle: This unit teaches students how to design and develop secure software, including secure coding practices, testing, and validation. Primary keyword: Secure Software Development, Secondary keywords: Secure Coding, Cybersecurity.

Career path

**Job Title** **Description**
Cyber Security Analyst Design and implement secure computer systems and networks, and respond to security incidents.
Information Security Manager Develop and implement information security strategies, policies, and procedures to protect an organization's assets.
Penetration Tester Simulate cyber attacks on computer systems and networks to test their security and identify vulnerabilities.
Incident Responder Respond to and manage security incidents, such as data breaches and system compromises, to minimize damage and downtime.
Security Consultant Provide expert advice and guidance on information security best practices, risk management, and compliance to organizations.

Entry requirements

  • Basic understanding of the subject matter
  • Proficiency in English language
  • Computer and internet access
  • Basic computer skills
  • Dedication to complete the course

No prior formal qualifications required. Course designed for accessibility.

Course status

This course provides practical knowledge and skills for professional development. It is:

  • Not accredited by a recognized body
  • Not regulated by an authorized institution
  • Complementary to formal qualifications

You'll receive a certificate of completion upon successfully finishing the course.

Why people choose us for their career

Loading reviews...

Frequently Asked Questions

What makes this course unique compared to others?

How long does it take to complete the course?

What support will I receive during the course?

Is the certificate recognized internationally?

What career opportunities will this course open up?

When can I start the course?

What is the course format and learning approach?

Course fee

MOST POPULAR
Fast Track GBP £149
Complete in 1 month
Accelerated Learning Path
  • 3-4 hours per week
  • Early certificate delivery
  • Open enrollment - start anytime
Start Now
Standard Mode GBP £99
Complete in 2 months
Flexible Learning Pace
  • 2-3 hours per week
  • Regular certificate delivery
  • Open enrollment - start anytime
Start Now
What's included in both plans:
  • Full course access
  • Digital certificate
  • Course materials
All-Inclusive Pricing • No hidden fees or additional costs

Get course information

We'll send you detailed course information

Pay as a company

Request an invoice for your company to pay for this course.

Pay by Invoice

Earn a career certificate

Sample Certificate Background
CERTIFIED PROFESSIONAL IN INFORMATION SECURITY TRAINING
is awarded to
Learner Name
who has completed a programme at
London School of Planning and Management (LSPM)
Awarded on
05 May 2025
Blockchain Id: s-1-a-2-m-3-p-4-l-5-e
Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.
SSB Logo

4.8
New Enrollment