• Trending iconTrending

(ISC)² Certified Information Systems Security Professional (CISSP) Online Training

Taught by
UPDATED: July 14, 2021
Intermediate
Practice Exams Icon Practice exams

This CISSP training course maps to the (ISC)² Certified Information Systems Security Professional (CISSP) methodology exam objectives and prepares learners to design, implement, and maintain your organization's cybersecurity programs. After finishing this CISSP certification training, you'll have a broad understanding of the eight domains of the CISSP CBK, be ready to take on the CISSP exam, and be in a good position to move into more senior-level security roles.

Start a free week

Watch the first video free

Subscription options

$59.00

Access all premium content with a free week!

  • quizzes
    Quizzes
  • practice-exams
    CyberVista® IT practice exams
  • coaching
    Coaching
  • learner-management
    IT learner community
Start a free week

What you'll learn

  • Confidentiality, integrity, and availability (CIA)
  • Cryptography, such as symmetric, asymmetric, Public Key Infrastructure (PKI), and digital signatures
  • Asset classification, data classification, and data security controls
  • Network security, such as Network Access Control (NAC) devices and endpoint security
  • Identity and Access Management (IAM) and authorization, such as RBAC, MAC, and DAC
  • Vulnerability assessments, penetration testing, disaster recovery (DR), and business continuity (BC)
  • Logging and monitoring, such as intrusion detection (IDS), intrusion prevention (IPS), and SIEM
  • Backup storage strategies and recovery site strategies
  • Software Development Life Cycle (SDLC), including change management

FAQs

What will you learn in this information systems security management training?

This training teaches the skills and knowledge that are necessary to plan and manage an effective information systems security posture for an entire organization. This course covers broad managerial topics and deep technical familiarity with a wide range of organizational topics and IT/IS domains, including risk management, security architecture, development security and much more.

Who should take this information systems security professional course?

Although this course is accessible enough for pretty much anyone at any point in their career, it's not ideal for anyone and everyone. You should take this IS security management course if you're interested in managerial and operations planning for entire organizational domains, less so if you're positioning yourself as a technical expert.

Is this training in information systems security management associated with any certifications?

Yes, all the information you learn on this course about information systems security management and designing, engineering and managing the overall security posture of an organization is associated directly with the CISSP certification from (ISC)². The course follows the same learning objectives for the CISSP exam, so you'll be prepared for the job and the exam.

What certification should you consider after taking this course in information systems security design?

After you finish this course in information systems management and design, you should consider earning the Certified Information Systems Security Professional cert from (ISC)². The CISSP is a globally recognized information security management certification that demonstrates competency in eight different domains of enterprise IT/IS risk management and operations security.

Why should you take this information systems security management training?

You should take this course because there are hardly any other security management courses that take you through all eight domains of IT/IS risk management: security and risk management; asset security; security architecture and engineering; communication and network security; identity and access management; security assessment and testing; security operations; and software development security.

Who is this for?

This CISSP certification training is considered professional-level (ISC)² training, which means it was designed for security professionals. This CISSP methodology skills course is designed for security professionals with at least five years of experience with security policies and management.

target-audience-face-5target-audience-face-8target-audience-face-3

What our learners say

  • I didn't ever think I'd have the position I have now.

    Jenna B. | Service Operations Manager
  • You constantly have to invest in training for your people.

    Rick N. | CEO
  • It feels like the best and the brightest people are training with you — and they are just hanging out with you and showing you the ropes.

    John McCann | IT manager and CBT Nuggets learner
Study plan

Download the free CISSP study plan to complete this course in about 13 hours.

Download study plan

Related Topics

Get CBT Nuggets IT training news and resources

I have read and understood the privacy policy and am able to consent to it.

© 2025 CBT Nuggets. All rights reserved.Terms | Privacy Policy | Accessibility | Sitemap | 2850 Crescent Avenue, Eugene, OR 97408 | 541-284-5522