Top of Page
 

Online Training

Official ISC2 CISSP Online Self-Paced Training

Course Description

< Return to Listing

Official ISC2 CISSP Online Self-Paced Training

Product Type:

Online Self-Paced

Official ISC2 CISSP Online Self-Paced Training gives you the freedom to go-at-your-own-pace training using artificial intelligence that enables participants to tailor their learning to their individual needs. The experience includes interactive study materials, robust search functionality to hone in on topics, analytics dashboards to track learner progress, email support in lieu of instructor, and 24/7 course availability..

Language:

Content is offered in English.

Learning Summary:

This course leverages the power of artificial intelligence to guide students through a self-paced learning experience adapted to their unique needs. Providing a comprehensive review of information systems security concepts and industry best practices included in the CISSP Exam Outline, this data-driven experience brings to participants interactive study materials guided by their level of understanding and confidence, nurturing self-awareness and boosting learning efficiency.

  • • Domain 1: Security and Risk Management
  • • Domain 2: Asset Security
  • • Domain 3: Security Architecture and Engineering
  • • Domain 4: Communication and Network Security
  • • Domain 5: Identity and Access Management (IAM)
  • • Domain 6: Security Assessment Testing
  • • Domain 7: Security Operations
  • • Domain 8: Software Development Security

Who Should Take this Learning:

Prior to taking this experience, the learner should have the expertise, skills or knowledge obtained while serving in roles similar to the following:

  • • Chief Information Officer
  • • Chief Information Security Officer
  • • Chief Technology Officer
  • • Compliance Manager/ Officer
  • • Director of Security
  • • Information Architect
  • • Information Manager / Information Risk Manager or Consultant
  • • IT Specialist/Director/Manager
  • • Network/System Administrator
  • • Security Administrator
  • • Security Architect / Security Analyst
  • • Security Consultant
  • • Security Manager
  • • Security Systems Engineer/ Security Engineer

Official Learning Provides:

  • • Self-Paced online adaptive learning journey
  • • Data-driven analytics dashboard providing real-time feedback on learner progress
  • • Robust search functionality to focus on specific topics
  • • Digital textbook in printable electronic format: Includes "Check your understanding questions, Activities, Case studies, Applied scenarios, Domain quizzes, and Key takeaways"
  • • Over 400 practice questions throughout the learning
  • • Content support email
  • • Interactive content
  • • Sliders to gauge confidence with question answers
  • • Online interactive flash cards
  • • Pre- and post-assessments
  • • Glossary of terms
  • • Validation of completion
  • • 24x7x365 technical support

What to Expect:

This learning experience provides an AI-led adaptive learning platform through which individualized paths are provided based on prior knowledge, learning speed, and confidence levels. As learners experience the material, they answer questions using the accompanying sliders to rate their level of confidence, which helps to detect knowledge gaps while building self-awareness regarding competency. Analytics provide a complete overview into one’s learning progress and performance. A robust search feature enables learners to find specific content for reinforcement and further study. The practical assessment helps learners to evaluate their mastery and understanding of domain concepts as they prepare for the certification examination.

New to this Experience:

Enhancements to this course include revision of content, textbook format, and assessment items to improve the overall experience and align with the CISSP exam outline update effective April 15, 2024. There are also now over 400 practice questions throughout the learning experience. The adaptive platform tailors the learning journey for each individual. This non-linear experience analyzes learning progress in real-time and offers analytics dashboards to help learners make better data-driven decisions and guide their focus. Each customized experience is supplemented by a robust search capability that enables learners to find the content they need when they need it.

Objectives Covered in this Learning:

At the end of this learning, learners will be able to:

Domain 1: Security and Risk Management

Learning Objectives:

  • • Justify an organizational code of ethics.
  • • Explain the ethical standards every professional security professional is expected to uphold.
  • • Specify the standards of behavior and performance expected of ISC2 members.
  • • Explain the security concepts of confidentiality, integrity, availability, authenticity, non-repudiation, privacy and safety.
  • • Relate security governance to organizational business strategies, goals, missions and objectives.
  • • Relate concepts and principles to due care and due diligence.
  • • Describe contractual, legal and industry standards, as well as regulatory requirements for information security.
  • • Explain how transborder data flow and import and export controls apply to data protection and privacy. 
  • • Understand requirements for investigation types an organization may conduct in the case of a cyber incident. 
  • • Review various privacy, cybersecurity and risk frameworks from an operational security perspective and as compliance requirements to their role in operational processes.
  • • Explain the overall organizational business continuity practice and the importance of the business impact analysis (BIA) to the planning process.
  • • Advocate for security considerations in personnel practices.
  • • Apply basic risk management theory to information security risks.
  • •Demonstrate the readiness of the human component of organizational information security. 

Domain 2: Asset Security

Learning Objectives:

  • • Identify, classify, and categorize information assets.    
  • • Explain the importance of treating information as an asset.
  • • Differentiate the IT asset management lifecycle from the data security lifecycle.
  • •Relate the data states of in use, in transit, and at rest to the data lifecycle.
  • •Relate the different roles that people and organizations have with respect to data.
  • •Describe the different security control types and categories. 
  • •Explain the use of data security standards and baselines to meet organizational compliance requirements. 

Domain 3: Security Architecture and Engineering

Learning Objectives:

  • •Explain the significance of basic secure design principles.
  • •Compare and contrast the key security characteristics of security models.
  • • Explain the hardware foundations of security.
  • • Apply security principles to different information systems and their environments.
  • • Determine the best application of cryptographic approaches to solving organizational information security needs.
  • •Manage the use of certificates and digital signatures to meet organizational information security needs.
  • •Apply different cryptographic management solutions to meet organizational information security needs.
  • •Describe defenses against common cryptanalytic attacks.
  • •Apply the lessons of Crime Prevention through Environmental Design (CPTED) to information systems security design and operation.
  • •Identify information security implications of various physical facilities, systems and infrastructure.

Domain 4: Communication and Network Security

Learning Objectives:

  • •Describe the architectural characteristics, relevant technologies, protocols and security considerations of each of the layers in the Open Systems Interconnection (OSI) model.
  • •Explain the application of secure design practices in developing network infrastructure.
  • • Describe the evolution of methods to secure IP communications protocols.
  • •Explain the security implications of bound (cable and fiber) and unbound (wireless) network environments.
  • •Describe the evolution of, and security implications for, key network devices.
  • •Evaluate and contrast the security issues with voice communications in traditional and voice over internet protocol (VoIP) infrastructures.
  • •Describe and contrast the security considerations for key remote access technologies.
  • •Explain the security implications of software-defined networking (SDN) and network virtualization technologies.

Domain 5: Identity and Access Management

Learning Objectives:

  • •Explain the identity lifecycle as it applies to human and nonhuman users.
  • •Compare and contrast access control models, mechanisms and concepts.
  • •Explain the role of authentication, authorization and accounting in achieving information security goals and objectives.
  • •Explain how IAM implementations must protect physical and logical assets.
  • •Describe the role of credentials and the identity store in IAM systems.

Domain 6: Security Assessment and Testing

Learning Objectives:

  • •Describe the purpose, process and objectives of formal and informal security assessment and testing.
  • •Apply professional and organizational ethics to security assessment and testing.
  • •Explain internal, external and third-party assessment and testing.
  • •Explain management and governance issues related to planning and conducting security assessments.
  • •Explain the role of assessment in data-driven security decision-making.

Domain 7: Security Operations

Learning Objectives:

  • •Show how to efficiently and effectively gather and assess security data.
  • •Explain the security benefits of effective change management and change control.
  • •Develop incident response policies and plans.
  • •Link incident response to needs for security controls and their operational use.
  • •Relate security controls to improving and achieving required availability of information assets and systems.
  • •Understand the security and safety ramifications of various facilities, systems and infrastructure characteristics.

Domain 8: Software Development Security

Learning Objectives:

  • •Recognize the many software elements that can put information systems security at risk.
  • •Identify and illustrate major causes of security weaknesses in source code.
  • •Illustrate major causes of security weaknesses in database and data warehouse systems.
  • •Explain the applicability of the Open Web Application Security Project (OWASP) framework to various web architectures.
  • •Contrast the ways that different software development methodologies, frameworks and guidelines contribute to information systems security.
  • •Explain the implementation of security controls for software development ecosystems.
  • •Choose an appropriate mix of security testing, assessment, controls and management methods for different systems and applications environments.

Exam Guarantee:

ISC2 wants its candidates to successfully pass their certification exam and achieve their goal of earning an ISC2 credential.  Included with our training course is our Education Guarantee.  If you do not pass the exam after taking our training course, you can take the self-paced course again at no cost to you (within one year of taking the initial course).  The Education Guarantee covers the cost of the second course only. You will have to pay the full price for your second attempt of the exam.

Technology Requirements:

The following are system requirements needed to enhance your overall learning experience.

A stable and continuous internet connection is required. In order to record your completion of the online learning courses, please ensure you are connected to the internet at all times while taking the course.

Hardware Specifications

  • • Processor 2 GHz +
  • • RAM 4 GB +
  • • Monitor minimum resolution (1024 x 768)
  • • Video Card
  • • Keyboard and Mouse or other assistive technology.

Computer Peripherals

  • • Speakers/Headphones – (Noise-cancelling headset is recommended)
  • • Microphone
  • • Camera

Supported Operating Systems

  • • Macintosh OS X 10.10 to present
  • • Windows 10 to present

Supported Browsers

  • • Google Chrome
  • • Microsoft Edge
  • • Mozilla Firefox

Application Software

Requirements for Completion:

To receive a verification of completion and earn continuing professional education (CPE) credits, learners must:

  • • Complete your tailored learning journey.
  • • Complete an experience evaluation.

Verification of Completion:

An electronic Verification of Completion will be issued once you have completed the experience by meeting all the requirements. We recommend that you download and retain the verification of completion.    

To download a PDF version of the certificate, goto the "Awards" tab of ISC2 Learn (top menu), select the course and then "Generate Certificate".

CPE Credits:

40 CPE Credits

CPE Reporting:

CPE credits for ISC2 credentials must be self-reported by members and associates through the ISC2 CPE Portal accessible via www.isc2.org using your member login credentials.

CPE credits earned for this course may be eligible for continuing professional education credits for non-ISC2 certifications. Please visit the continuing education requirements established by the credentialing organization for eligibility.

For specific questions related to your CPE credits or the CPE portal please contact member support - membersupport@isc2.org.

ACE Credit:

The Official ISC2 CBK Training Seminar for the CISSP has earned ACE CREDIT. Students who complete the course can apply for two hours of lower division credit at participating universities and colleges. Find out more at ACE.

Cancellation Policy:

Refunds for any ISC2 courses will not be provided.

Access Period:

Access to course content: 90 or 180 day products available for purchase.

Price:

Pricing available at checkout.

Have Questions About Purchasing?

Interested in purchasing this course on behalf of someone, or want to learn about team discounts?

Please contact your regional office:

ISC2 Americas Regional Office

Email: training@isc2.org 

Phone: +1-866-331-ISC2 (4722) ext. 2

ISC2 EMEA Regional Office

Email: info-emea@isc2.org 

Phone: +44 (0)203.960.7800

ISC2 APAC Regional Office

Email: isc2asia@isc2.org 

Phone: +852-5803-5662