Certified Information Systems Security Professional (CISSP) - ITU Online Old Site

Certified Information Systems Security Professional (CISSP)

CISSP is the perfect credential for those with advanced technical and managerial skills, experience, and credibility to design, implement, and manage an information security program that can protect organizations from sophisticated attacks.

Included In This Course

Included In This Course

Total Hours
19 Hrs 33 Min
Certified Information Systems Security Professional (CISSP)
47 On-demand Videos
Closed Caption

Closed Captions

Course Topics
8  Topics
Prep Questions
254 Prep Questions
Certified Information Systems Security Professional (CISSP)

Certificate of Completion

Course Description

About Our online CISSP Course

Wish to prepare for your (ISC)² certification exam without the need of sacrificing quality? ITU’s Online Self-Paced Training gives you the autonomy and assurance to advance on your own agenda. Whether at home, work or while traveling; anytime, anywhere – it promises convenience along with high standards!

As you journey through the learning process, experienced ITU instructors remain at your disposal with recorded video content. Designed to keep security knowledge information locked-in and drive comprehension, course activities are inspired by real-world scenarios and industry cybersecurity topics. Unlock your full potential now with on-demand access to our cybersecurity professionals subject matter experts!

About CISSP Certification

Are you incredibly serious about information technology security? If that’s the case, then Certified Information Systems Security Professional (CISSP) is your answer! This widely recognized certification provides technical and managerial knowledge to help you design, engineer, manage and enhance the security of any organization as a experienced cybersecurity managers. Aligned with its 2021 version from (ISC)2 this course promises to provide a fully integrated learning experience like no other.

If you’re looking for a comprehensive credential to not only verify your profound technical and hands-on cybersecurity program expertise but also to give yourself the credibility of design cybersecurity policies, engineering, executing and governing an overall cybersecurity program that will keep organizations safe from rapidly evolving attacks while ensuring Business Continuity – then look no further than the vendor-neutral CISSP certification.

Backed by (ISC)², the globally recognized, not-for-profit organization dedicated to advancing the information security field and cybersecurity jobs, the CISSP was the first credential in the field of information security to meet the stringent requirements of ISO/IEC Standard 17024.

Not only is the CISSP an objective measure of excellence, but also a globally recognized standard of achievement.

How do I become a CISPP

The only way to acquire your CISSP certification is by passing the computer-based test (CBT) offered at Pearson VUE Testing centers with a score of 700. Getting certified has never been easier with testing centers all over the world.

Who should take the CISPP

If you are ambitious, aspiring to advance in the field of Information Security and possess an impressive CV, then this CISSP training is tailored to your needs. To be eligible for a CISSP certificate from ISC2 requires at least 5 years of full-time professional experience within 2 or more domains of the CBK 2021. However, if that’s not possible don’t worry! You will still receive an associate title from ISC2 until such time as proof can be submitted demonstrating five years’ worth relevant work experience – after which ,you’ll walk away with the prestigious CISSP certification!

Key Term Knowledge Base: Key Terms Related to CISSP Certification

The CISSP certification is essential for IT professionals specializing in security. It covers a comprehensive range of cybersecurity topics, and understanding these key terms is crucial for anyone preparing for the CISSP exam or working in information security.

TermDefinition
CISSPCertified Information Systems Security Professional, a globally recognized certification in information security.
Information SecurityThe practice of protecting information by mitigating information risks and vulnerabilities.
CybersecurityThe protection of internet-connected systems, including hardware, software, and data, from cyberattacks.
Risk ManagementThe process of identifying, assessing, and controlling threats to an organization’s capital and earnings.
Access ControlThe selective restriction of access to a place or other resource.
CryptographyThe practice and study of techniques for secure communication in the presence of third parties.
Security ArchitectureThe design and implementation of security systems and related architecture.
Network SecurityThe practices and policies designed to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.
Security OperationsThe activities related to maintaining the integrity, confidentiality, and availability of information and the systems that store, process, and transmit that information.
Disaster RecoveryStrategies and processes for quickly reestablishing access to applications, data, and IT resources after an outage.
Business ContinuityThe planning and preparation to ensure that a company can continue to operate in case of serious incidents or disasters.
Security AssessmentThe process of determining how effectively an entity being assessed meets specific security criteria.
Vulnerability ManagementThe process of identifying, evaluating, treating, and reporting on security vulnerabilities in systems and the software that runs on them.
Incident ResponseThe approach taken by an organization to prepare for, detect, contain, and recover from a data breach.
GovernanceThe framework of rules and practices by which an organization ensures accountability, fairness, and transparency in its relationship with stakeholders.
ComplianceAdhering to a rule, such as a policy, standard, specification, or law.
Physical SecurityThe protection of personnel, hardware, software, networks, and data from physical actions and events that could cause serious loss or damage.
Security AwarenessThe knowledge and attitude members of an organization possess regarding the protection of the physical and, especially, information assets.
Penetration TestingA method of evaluating the security of a computer system or network by simulating an attack from malicious outsiders.
Cloud SecurityThe set of policies, controls, procedures, and technologies that work together to protect cloud-based systems, data, and infrastructure.

Understanding these terms is vital for professionals aiming to excel in the field of information security and for those pursuing the CISSP certification.

Frequently Asked Questions About Certified Information Systems Security Professional (CISSP)

What is CISSP certification, and why is it important?

CISSP stands for Certified Information Systems Security Professional. It is a globally recognized certification for information security professionals. CISSP certification demonstrates expertise in designing, implementing, and managing a security program. It is important for individuals who want to advance their careers in cybersecurity.

What are the prerequisites for CISSP certification?

To be eligible for the CISSP certification exam, you need to have a minimum of five years of cumulative, paid work experience in two or more of the eight domains of the CISSP Common Body of Knowledge (CBK). However, there are alternative pathways for those who do not meet this requirement.

How do I prepare for the CISSP exam?

You can prepare for the CISSP exam through self-study, attending training courses, or using study materials like books and online resources. Many training providers offer CISSP preparation courses like the one you mentioned. Make sure to dedicate enough time to study each of the CISSP domains thoroughly.

What are the domains covered in the CISSP exam?

The CISSP exam covers eight domains: Security and Risk Management, Asset Security, Security Architecture and Engineering, Communication and Network Security, Identity and Access Management (IAM), Security Assessment and Testing, Security Operations, and Software Development Security. Each domain has specific knowledge areas you need to understand.

What is the passing score for the CISSP exam?

The CISSP exam uses a scaled scoring system, with a passing score typically set at 700 out of 1000 points. The final score is not a percentage of correct answers but is determined by a complex scoring algorithm based on the difficulty of the questions. You will receive your score immediately upon completing the exam.

Proudly Display
Your Achievement

Upon completion of your training, you’ll receive a personalized certificate of completion to help validate to others your new skills.
Example Certificate

Course Outline

CISSP : Certified Information Systems Security Professional Course Content

Module 1: Security and Risk Management

  •    Intro

  •    Security and Risk Management pt.1

  •    Security and Risk Management pt.2

  •    Security and Risk Management pt.3

  •    Security and Risk Management Summary

  •    Security and Risk Management Test Prep pt.1

  •    Security and Risk Management Test Prep pt.2

  •    Security and Risk Management Test Prep pt.3

  •    Security and Risk Management Test Prep pt.4

Module 2: Asset Security

  •    Asset Secutity pt.1

  •    Asset Security pt.2

  •    Asset Security Summary

  •    Asset Security Test Prep

Module 3: Security Architecture and Engineering

  •    Security Architecture and Engineering pt.1

  •    Security Architecture and Engineering pt.2

  •    Security Architecture and Engineering pt.3

  •    Security Architecture and Engineering Summary

  •    Security Architecture and Engineering Test Prep pt.1

  •    Security Architecture and Engineering Test Prep pt.2

  •    Security Architecture and Engineering Test Prep pt.3

Module 4: Communication and Network Security

  •    Communication and Network Security pt.1

  •    Communication and Network Security pt.2

  •    Communication and Network Security Summary

  •    Communication and Network Security Test Prep

Module 5: Identity and Access Management (IAM)

  •    Identity and Access Management (IAM)

  •    Identity and Access Management (IAM) Summary

  •    Identity and Access Management (IAM) Test Prep pt.1

  •    Identity and Access Management (IAM) Test Prep pt.2

  •    Identity and Access Management (IAM) Test Prep pt.3

  •    Identity and Access Management (IAM) Test Prep pt.4

Module 6: Security Assessment and Testing

  •    Security Assessment and Testing

  •    Security Assessment and Testing Summary

  •    Security Assessment and Testing Test Prep

Module 7: Security Operations

  •    Security Operations pt.1

  •    Security Operations pt.2

  •    Security Operations pt.3

  •    Security Operations pt.4

  •    Security Operations Summary

  •    Security Operations Test Prep

Module 8: Software Development Security

  •    Software Development Security pt.1

  •    Software Development Security pt.2

  •    Software Development Security pt.3

  •    Software Development Security pt.4

  •    Software Development Security pt.5

  •    Software Development Security Summary

  •    Software Development Security Test Prep

  •    Outro

Add a review
Currently, we are not accepting new reviews
4.8
Based on 83 reviews
1-5 of 83 reviews
  1. AM

    Mary Beth helped me. She was wonderful.

  2. NM
  3. AA
  4. K
  5. BO

Your Training Instructor

Alan Grayson

Alan Grayson

Instructor

Alan Grayson has been teaching bootcamps for 20 years and has a 905 average pass rate from those students he has taught. Alan has attended The USAF Academy, University of Southern California, and has certifications in CompTIA CTT+, CASP+, CySA+, PenTest+, Security+, Network+, A+ as well as Cloud+. Alan also holds the CISSP Certification and is an official ISC2 Instructor for CISSP, SSCP, CSSLP, and CCSP.

Certified Information Systems Security Professional (CISSP)
 

Subscribe To All-Access
Lock In $14.99 / Month Forever

Start this course for free with our 10-day trial of the all-access subscription providing access to over 2,600 hours of training.

$49.00 $14.99 Monthly
OR

$49.00

Certified Information Systems Security Professional (CISSP)

CISSP
Certified Information Systems Security Professional (CISSP)
Additional Options to Access This Training
This training is also part of our extensive training library containing over 225 courses, 12,000+ videos and over 19,000 practice test questions.

Monthly All-Access Subscription
7 Days Free - $39.00 / month

A great option at an affordable monthly price.

Annual All-Access Subscription
$229 / year

A discounted price when paying for your All Access library on an annual basis.

Lifetime All-Access Library
$379 One time payment

Exceptional Value. Pay once, never have to buy IT training again.

Related Courses

$49.00

Gain the knowledge and skills required to protect networks and devices with CompTIA Security+ SY0-601 Certification Training.

This online training program for CompTIA Security Plus Certification will teach you a foundational understanding of computer and network security. Our online course will equip you with the knowledge necessary to craft a comprehensive threat analysis and more importantly secure your network from cybersecurity attacks. In addition, you’ll uncover how create secure network designs of devices, media outlets, penetration testing, and networks. Our online course covers all objectives needed to pass your CompTIA Security+ SY0-601 exam and acquire your certification.

Add To Cart

$49.00

Be a skilled penetration tester with CompTIA PenTest+ PT0-001! Get certified today and enhance your job prospects in the field of cybersecurity.

In this comprehensive IT course, you’ll acquire in-depth knowledge and practical skills in penetration testing, also known as pentesting, which are crucial for obtaining your pentest certification. The curriculum is designed to cover a wide range of topics, including client engagement, documentation procedures, and both passive and active reconnaissance techniques. You’ll gain expertise in system hacking across various platforms like Windows, Linux, and mobile devices. The course also includes modules on physical security testing and social engineering tactics to assess the resilience of your organization’s human element. 

Add To Cart

$49.00

Learn how to investigate cybercrimes with ITU Online’s CHFI Course – Computer Hacking Forensics Investigator (ECC 312-49). Enroll now!

This CHFI course will cover the security discipline of computer forensics from a vendor-neutral perspective and work towards preparing students to become Forensic Investigators in Computer Hacking.

Add To Cart