Limited Offer: Save 20% on this CISSP Self-Paced course when bundled with an exam voucher!*
Bundle Training with Exam* >> >>
Certified Information Systems Security Professional (CISSP) Online Self-Paced Training
CISSP Overview
Certified Information Systems Security Professional (CISSP) training leverages the power of artificial intelligence, guiding students through a self-paced learning experience adapted to their unique needs. It covers the knowledge and skills for designing, developing, and managing the overall security posture of an organization.
Who Can Enroll?
CISSP training is for those seeking a comprehensive review to pursue CISSP certification. It is ideal for mid-level career security professionals with at least five years of experience in two or more of the domains listed below.
What Is Covered?
- • Domain 1: Security and Risk Management
- • Domain 2: Asset Security
- • Domain 3: Security Architecture and Engineering
- • Domain 4: Communication and Network Security
- • Domain 5: Identity and Access Management
- • Domain 6: Security Assessment and Testing
- • Domain 7: Security Operations
- • Domain 8: Software Development Security
What Will You Learn?
- • Apply the fundamental concepts and methods related to the fields of information technology and security.
- • Align the overall organizational operational goals with security functions and implementations.
- • Determine how to protect assets of the organization as they go through their life cycle.
- • Leverage the concepts, principles, structures, and standards used to design, implement, monitor, and secure operating systems, equipment, networks, applications, and those controls used to enforce various levels of confidentiality, integrity, and availability.
- • Apply the security design principles to select appropriate mitigations for vulnerabilities present in common information system types and architectures.
- • Explain the importance of cryptography and the security services it can provide in today's digital and information age.
- • Evaluate the physical security elements relative to information security needs.
- • Evaluate the elements that comprise communication and network security relative to information security needs.
- • Leverage the concepts and architecture that define the associated technology and implementation systems and protocols at Open Systems Interconnection (OSI) model layers 1–7 to meet information security needs.
- • Determine the appropriate access control models to meet business security requirements.
- • Apply the physical and logical access controls to meet information security needs.
- • Differentiate between primary methods for designing and validating test and audit strategies that support information security requirements.
- • Apply the appropriate security controls and countermeasures to optimize an organization's operational function and capacity.
- • Assess the information systems risks to an organization's operational endeavors.
- • Determine the appropriate controls to mitigate specific threats and vulnerabilities.
- • Apply the information systems security concepts to mitigate the risk of software and systems vulnerabilities throughout the systems' life cycles.
What’s Included?
- • Self-paced online adaptive learning journey
- • Data-driven analytics dashboard for real-time feedback on learner progress
- • Robust search functionality to narrow topics
- • Pre- and post-course assessments
- • Knowledge checks and end-of-domain quizzes
- • Digital eTextbook
- • Interactive content
- • Domain-by-domain study sheets with key points
- • Online interactive flash cards
- • Glossary of terms
- • Email content support
- • 24/7/365 chat technical support
- • 90-day or 180-day access available
Languages Offered
At this time, content is only available in English.
Learn More > Online learning options, certificate requisites and use, Continuing Professional Education (CPE) credits, and special requirements