• Trending

(ISC)² CISSP Online Certification Training

Taught by
UPDATED: July 14, 2021
Intermediate
Practice exams

This CISSP training course maps to the CISSP methodology exam objectives and prepares learners to design, implement, and maintain your organization's cybersecurity programs. After finishing this CISSP certification training, you'll have a broad understanding of the eight domains of the CISSP CBK, be ready to take on the CISSP exam, and be in a good position to move into more senior-level security roles.

Start a free week

Subscription options

$59.00

Access all premium content with a free week!

  • Quizzes
  • CyberVista® IT practice exams
  • Coaching
  • IT learner community
Start a free week
G2 Logo
4.5 reviews stars

What you'll learn

  • Confidentiality, integrity, and availability (CIA)
  • Cryptography, such as symmetric, asymmetric, Public Key Infrastructure (PKI), and digital signatures
  • Asset classification, data classification, and data security controls
  • Network security, such as Network Access Control (NAC) devices and endpoint security
  • Identity and Access Management (IAM) and authorization, such as RBAC, MAC, and DAC
  • Vulnerability assessments, penetration testing, disaster recovery (DR), and business continuity (BC)
  • Logging and monitoring, such as intrusion detection (IDS), intrusion prevention (IPS), and SIEM
  • Backup storage strategies and recovery site strategies
  • Software Development Life Cycle (SDLC), including change management

FAQs

What will you learn in this information systems security management training?

This training teaches the skills and knowledge that are necessary to plan and manage an effective information systems security posture for an entire organization. This course covers broad managerial topics and deep technical familiarity with a wide range of organizational topics and IT/IS domains, including risk management, security architecture, development security and much more.

Who should take this information systems security professional course?

Although this course is accessible enough for pretty much anyone at any point in their career, it's not ideal for anyone and everyone. You should take this IS security management course if you're interested in managerial and operations planning for entire organizational domains, less so if you're positioning yourself as a technical expert.

Is this training in information systems security management associated with any certifications?

Yes, all the information you learn on this course about information systems security management and designing, engineering and managing the overall security posture of an organization is associated directly with the CISSP certification from (ISC)². The course follows the same learning objectives for the CISSP exam, so you'll be prepared for the job and the exam.

What certification should you consider after taking this course in information systems security design?

After you finish this course in information systems management and design, you should consider earning the Certified Information Systems Security Professional cert from (ISC)². The CISSP is a globally recognized information security management certification that demonstrates competency in eight different domains of enterprise IT/IS risk management and operations security.

Why should you take this information systems security management training?

You should take this course because there are hardly any other security management courses that take you through all eight domains of IT/IS risk management: security and risk management; asset security; security architecture and engineering; communication and network security; identity and access management; security assessment and testing; security operations; and software development security.

Who is this for?

This CISSP certification training is considered professional-level (ISC)² training, which means it was designed for security professionals. This CISSP methodology skills course is designed for security professionals with at least five years of experience with security policies and management.

target-audience-face-1target-audience-face-3target-audience-face-5

What our learners say

  • Awesome, Top notch, I am super excited and thankful for CBT Nuggets. I am starting to get addicted to CBT Nuggets. I hope that there's no cure!!!

    Mike M. | CBTN Learner
  • The more I put into learning, the more skills I’m going to have — and the better I’m going to be technically.

    Knox Hutchinson | CBT Nuggets trainer since 2018
  • Having access to on-demand labs that I could spin up instantly was very helpful. I didn’t have to have a home environment with a bunch of virtual machines spun up. Or worry about destroying things.

    Brian V. | Monitoring Engineer
Study plan

Download the free CISSP study plan to complete this course in about 13 hours.

Download study plan

Related Topics

Get CBT Nuggets IT training news and resources

I have read and understood the privacy policy and am able to consent to it.

© 2024 CBT Nuggets. All rights reserved.Terms | Privacy Policy | Accessibility | Sitemap | 2850 Crescent Avenue, Eugene, OR 97408 | 541-284-5522