{"id":22717,"date":"2026-05-07T15:13:23","date_gmt":"2026-05-07T15:13:23","guid":{"rendered":"https:\/\/sigmaxhub.com\/?post_type=lp_course&#038;p=22717"},"modified":"2026-05-07T15:13:23","modified_gmt":"2026-05-07T15:13:23","slug":"cissp-preparation","status":"publish","type":"lp_course","link":"https:\/\/sigmaxhub.com\/ar\/courses\/cissp-preparation\/","title":{"rendered":"CISSP Preparation"},"content":{"rendered":"<h2>Course Overview<\/h2>\n<p>This professional training course is designed to prepare students and security professionals for the globally recognized CISSP certification exam.<\/p>\n<h2>\u0645\u0627 \u0633\u062a\u062a\u0639\u0644\u0645\u0647<\/h2>\n<ul>\n<li>Security Governance &amp; Compliance<\/li>\n<li>Risk Management<\/li>\n<li>Security Architecture<\/li>\n<li>Identity &amp; Access Management<\/li>\n<li>Security Operations<\/li>\n<li>Software Development Security<\/li>\n<li>Cryptography Concepts<\/li>\n<li>CISSP Exam Preparation Techniques<\/li>\n<\/ul>\n<h2>Who Should Enroll<\/h2>\n<ul>\n<li>Security Professionals<\/li>\n<li>Cybersecurity Engineers<\/li>\n<li>Security Managers<\/li>\n<li>IT Auditors<\/li>\n<\/ul>\n<h2>Course Features<\/h2>\n<ul>\n<li>Advanced Security Training<\/li>\n<li>Practical Exam Preparation<\/li>\n<li>Real Security Scenarios<\/li>\n<li>\u0634\u0647\u0627\u062f\u0629 \u0634\u0645\u0644\u062a<\/li>\n<\/ul>\n<h2>Career Opportunities<\/h2>\n<ul>\n<li>Security Consultant<\/li>\n<li>Cybersecurity Manager<\/li>\n<li>Information Security Officer<\/li>\n<\/ul>","protected":false},"excerpt":{"rendered":"<p>Professional CISSP preparation course covering Governance, Risk Management, Security Architecture, and advanced security operations.<\/p>","protected":false},"author":1,"featured_media":22675,"comment_status":"open","ping_status":"closed","template":"","course_category":[48],"course_tag":[113,115,114,116,117],"class_list":["post-22717","lp_course","type-lp_course","status-publish","has-post-thumbnail","hentry","course_category-cybersecurity","course_tag-cissp","course_tag-governance","course_tag-information-security","course_tag-risk-management","course_tag-security-architecture","course"],"_links":{"self":[{"href":"https:\/\/sigmaxhub.com\/ar\/wp-json\/wp\/v2\/lp_course\/22717","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sigmaxhub.com\/ar\/wp-json\/wp\/v2\/lp_course"}],"about":[{"href":"https:\/\/sigmaxhub.com\/ar\/wp-json\/wp\/v2\/types\/lp_course"}],"author":[{"embeddable":true,"href":"https:\/\/sigmaxhub.com\/ar\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sigmaxhub.com\/ar\/wp-json\/wp\/v2\/comments?post=22717"}],"version-history":[{"count":1,"href":"https:\/\/sigmaxhub.com\/ar\/wp-json\/wp\/v2\/lp_course\/22717\/revisions"}],"predecessor-version":[{"id":22718,"href":"https:\/\/sigmaxhub.com\/ar\/wp-json\/wp\/v2\/lp_course\/22717\/revisions\/22718"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sigmaxhub.com\/ar\/wp-json\/wp\/v2\/media\/22675"}],"wp:attachment":[{"href":"https:\/\/sigmaxhub.com\/ar\/wp-json\/wp\/v2\/media?parent=22717"}],"wp:term":[{"taxonomy":"course_category","embeddable":true,"href":"https:\/\/sigmaxhub.com\/ar\/wp-json\/wp\/v2\/course_category?post=22717"},{"taxonomy":"course_tag","embeddable":true,"href":"https:\/\/sigmaxhub.com\/ar\/wp-json\/wp\/v2\/course_tag?post=22717"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}