Top of Page

Online Training

Official (ISC)² CISSP® Review

Price: $0.00

Course Description

The Certified Information Systems Security Professional (CISSP) Self-Paced Review Course offered by (ISC)2 is intended to help you determine whether you are ready to pursue the CISSP certification. Before you begin your credentialing journey, you may want to establish exactly what the CISSP entails, in terms of the concepts and depth of understanding you’ll be expected to demonstrate. This course can help you start that aspect of your process.

The course itself will introduce you to the many areas of study you’ll be expected to know and understand as a CISSP candidate. While this course does not constitute training (it will not explain, in detail, what you need to know to pass the exam), it will convey the concepts and ideas that comprise the Exam Outline for the CISSP. It will introduce you to which subjects may be covered in the actual preparatory courseware and the exam.

After taking this course, you’ll have a better understanding of the truly vast scope of material the CISSP is expected to know, and you may be in a better position to determine if you’re ready for the exam, or if you will best your serve your own study purposes by taking a preparatory course. Good luck on your path toward certification!

Please note that this course is not intended to teach you these topics and shouldn’t be perceived as a means to acquire the knowledge and experience required for certification; rather, this course is intended to highlight the breadth and extent of the various subjects you’ll be expected to understand when taking the CISSP examination.

Course Includes:

  • Pre-test for each of the seven lessons
  • Introduction to topics relevant to the CISSP certification
  • Knowledge checks at the end of every topic
  • End of course assessment

    Audience or Who Should Take This Course

    This course is intended for professionals considering the CISSP certification.


    Seven Lessons

  • Security Fundamentals
  • Systems and Networks
  • Incidents/BCDR
  • Security in Action
  • Access Control
  • Software Development Lifecycle (SDLC)
  • Legal Matters

    Learning Objectives

  • Recognize the need to be able to evaluate and apply security governance principles.
  • Recognize the need to understand and apply risk management concepts.
  • Recognize the need to be able to properly develop, document, and implement security policy, standards, procedures, and guidelines.
  • Have a basic familiarity with how to secure communication in a network environment, common network detective and preventative measures, and the applications of various cryptographic concepts, practices, and attacks.
  • Understand basic incident management processes/goals and the facets of BCDR actions.
  • Understand various testing and audit methods/practices and basic aspects of physical security.
  • Recognize the needs for continual logging and monitoring.
  • Recognize how both physical and logical access control protects people and assets in an environment.
  • Identify the elements of basic identity and access management.
  • Recognize the importance for including security in all aspects of software development.
  • Be familiar with professional ethics concerns and global legal matters pertaining to the practice of information security.
  • Price: $0.00