Free

Information Systems Security Engineering Professional (ISSEP)

Build upon your CISSP certification by getting the specialized credential of the Information Systems Security Engineering Professional (ISSEP) training. By mastering the five ISSEP domains focused on developing secure systems, you can demonstrate that you have deep subject matter expertise in your field.
5
58
M
Time
intermediate
difficulty
6
ceu/cpe

Course Content

Objectives and Types of System Development

4m

System Development Life Cycle (SDLC)
Objectives and Generic Systems Engineering (SE)

5m

Information Systems Security Engineering (ISSE) Process
Objectives and Introduction to Operations

3m

Domain 5: Secure Operations, Change Management and Disposal
Objectives and Security Planning and Design Overview

2m

Domain 3: Security Planning and Design
Objectives and Introduction to Systems Security Engineering

4m

Domain 1: Systems Security Engineering Foundations
Objectives and Technical Processes

3m

Domain 4: Systems Implementation, Verification and Validation
Introduction to the SDLC

5m

System Development Life Cycle (SDLC)
Comparing SE and ISSE Activities

6m

Information Systems Security Engineering (ISSE) Process
Implementation

3m

Domain 4: Systems Implementation, Verification and Validation
Secure Operations

4m

Domain 5: Secure Operations, Change Management and Disposal
Stakeholder Requirements

4m

Domain 3: Security Planning and Design
Enterprise Risk Management

5m

Domain 2: Risk Management
Fundamentals

8m

Domain 1: Systems Security Engineering Foundations
Discover Information Protection Needs (Discover Needs)

4m

Information Systems Security Engineering (ISSE) Process
Initiation

4m

System Development Life Cycle (SDLC)
Continuous Monitoring

5m

Domain 5: Secure Operations, Change Management and Disposal
Verification

4m

Domain 4: Systems Implementation, Verification and Validation
Course Description

ISSEP training builds on the principles found in CISSP but focuses on the processes used to develop secure systems. This course will provide the student with a solid understanding of the five ISSEP domains along with the key areas of knowledge critical to meeting the rigors of this concentration. While not an exam preparation course, the Cybrary ISSEP course aims to provide a solid starting point for such study.

Target Audience for ISSEP Training

Students who hold the CISSP certification looking to pursue the ISSEP concentration and all others looking to improve their understanding of systems engineering principles related to information and cybersecurity.

Prerequisites for ISSEP Training

Ideally, the student taking this course will have completed the CISSP Certification. If not, equivalent knowledge of CISSP, CASP, and/or CISM materials will support the course goals and learning objectives

ISSEP Training Course Goals

By the end of this course, students should be able to:

  • Understand and describe the components of the ISSEP Domains
  • Describe the Information Systems Security Engineering (ISSE) Process
  • Describe the System Development Life Cycle (SDLC)
  • Describe the key related National Institutes for Standards and Technologies (NIST) standards
  • Create an ISSEP study plan
  • What is the Information Systems Security Engineering Professional Certification?

    The Information System Security Engineering Professional (ISSEP) certification is a vendor-neutral credential that validates an individual's proficiency in designing, creating, and implementing security for information systems, services, and applications. The ISSEP certification is awarded by the Information Security Consortium (ISC2) as a concentration area for the Certified Information System Security Professional (CISSP) credential.

    The ISSEP credential ensures that an individual understands the relationship between systems and security engineering and can identify information security needs, design security architecture, create a security design, and implement system security.

    What Does the ISSEP Training Cover?

    This intermediate-level course covers the ISSEP concentration area of the Certified Information Systems Security Professional program. Students will learn about the five ISSEP domains and the key concepts that pertain to the specific focus of this concentration. In addition to the five domains, the course covers the information systems security engineering process, the system development life cycle (SDLC), and the related National Institutes for Standards and Technologies (NIST) standards. Students should then be able to create an ISSEP study plan that will assist them in preparing for the ISSEP certification exam.

    The ISSEP training course is ideal for any students who have already earned the CISSP certification and want to improve their understanding of cybersecurity's engineering side. This may include professionals in the following roles:

    • Information assurance officers • Information assurance systems engineers • Information assurance analysts • Senior security analysts • Senior systems engineers

    While there are no hard and fast prerequisites for this course, it's recommended that students who enroll have already earned their CISSP certification. If they haven't, then an equivalent working knowledge of CISSP, CompTIA Advanced Security Practitioner (CASP), or Certified Information Security Manager (CISM) skills will be helpful.

    Upon finishing this course, students will complete 5 hours and 58 minutes of clock time, earn 6 CEUs/CPEs, and will receive a Certificate of Completion.

    Is the CISSP-ISSEP Certification Worth It?

    Earning ISC2's Certified Information System Security Professional certification is an accomplishment that comes with many benefits. When a concentration area like ISSEP is added, it opens the door to even more advantages and opportunities. Concentration areas add depth and mastery beyond the CISSP, providing those professionals who hold them with a leg up on specific roles that command better salaries, increased responsibilities, and more career satisfaction.

    Here are some reasons that the CISSP-ISSEP certification is worth it:

    • Distinguished skillset. Having specialized skills demonstrates a deeper and broader understanding of the common body of knowledge in the cybersecurity industry. • Career advancement opportunities. Credentials in concentration areas demonstrate a higher, more specialized level of expertise that raises credibility, visibility, and opens more doors for career advancement. • Higher salaries. IT professionals who hold certifications are typically paid higher salaries than their uncertified counterparts. • Global recognition. Certifications from ISC2 are globally recognized and held in high regard all over the world.

    What Jobs Does the CISSP-ISSEP Certification Prepare You For?

    There are various job roles that the CISSP-ISSEP prepares candidates for, including the Information System Security Engineer. While job titles may vary depending on the company, some of the common CISSP-ISSEP jobs are: • Cybersecurity Analyst • Cybersecurity Engineer • Cybersecurity Threat Detection Specialist • Security Architect • Security Engineer • Cybersecurity Program Director

    What Salary Does the ISSEP Certification Earn?

    In the U.S., the average salary for IT professionals with the CISSP-ISSEP certification is $148,433, according to Payscale.com. The exact salary that can be expected depends on the specific organization, its size, a candidate's experience, and other factors. How is it Best to Learn ISSEP?

    Our Information System Security Engineering Professional (ISSEP) training course is the ideal starting point for students who want to learn about this CISSP concentration area. While it's not meant to be a certification exam preparation course, it will give students a solid foundation of the five domains included in the exam.

    Cybrary is a leading provider of online technology training courses, and we are happy to help students expand their IT knowledge to better their careers. All the courses in our extensive library are online, self-paced, and taught by subject matter experts. This makes Cybrary practical and convenient for students. To learn more about ISSEP, enroll for this training by clicking the Register button at the top right of this screen.

    This course is part of a Career Path:
    No items found.

    Instructed by

    Instructor
    Brad Rhodes

    I am Brad Rhodes, Cybrary Instructor! I work for zvelo, the best URL content classification company in the business helping to make work safer for everyone. I am also a traditional (drilling) Soldier in the Army National Guard, where I get to delve into all things Cyber and have an impact on the United States. I am also privileged to teach part-time at Regis University at the Masters-level in their Cybersecurity and Information Assurance program.

    I have traveled world with Military from United States, to Europe, to the Middle East and Far East. It has been amazing to experience and learn from so many different cultures and peoples. One thing I have found universal in my travels is that people the world over want to learn, grow, and have an opportunity to find their purpose. I hope that I have contributed to that in some small way. My career and life to this point has been a wild and fulfilling ride and I hope it continues to be!

    In my Army National Guard role, I am privileged to lead one the premiere cyber exercises in world with many of the most talented professionals I have ever worked alongside. From an education/experience perspective, the best part for me the constant change in technology, implementations, and threat actor capabilities! There is always something to do and new things to learn!

    One of the primary reasons I signed on with Cybrary was the creativity allowed for instructors. I was building the content for course, not regurgitating someone else’s slide deck. That meant that I could put my knowledge into the material and get to the heart of what students need. So, what exactly to students need? They need engaging, interesting, and bite-sized content that provides them ability grasp complex material to achieve future success. Students also the ability to study at their own pace with resources and references at the ready. The most important thing that Cybrary delivers is fresh content from practitioners in the field right now and I am honored to be counted among them.

    From an interest perspective, there are two areas of cybersecurity that I find the most fascinating. The first network forensics. I love firing up my Network Security Monitoring (NSM) box and grabbing a punch of traffic to see what is going on. That is especially fun when you observe bots from all over the world scanning your network and then blocking them! The other area that I am passionate about is cyber-kinetic demos. There is nothing quite like drowning some Lego figures to prove that attackers can impact the physical world using cyber capabilities as the medium.

    Provider
    Cybrary Logo
    Certification Body
    ISC2
    Certificate of Completion

    Complete this entire course to earn a Information Systems Security Engineering Professional (ISSEP) Certificate of Completion

    Coming mid-July
    Cybrary Reimagined.
    Level up with structured, role-aligned career paths.
    ALL NEW!
    Cybrary Reimagined.
    Celebrate Cybersecurity Awareness Month with our buy 2, get 1 offer!
    Level up with structured, role-aligned career paths.
    Valid until October 31. Elevate your skills today!
    Start Now

    Heading

    Heading 1

    Heading 2

    Heading 3

    Heading 4

    Heading 5
    Heading 6

    Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.

    Block quote

    Ordered list

    1. Item 1
    2. Item 2
    3. Item 3

    Unordered list

    • Item A
    • Item B
    • Item C

    Text link

    Bold text

    Emphasis

    Superscript

    Subscript

    This is some text inside of a div block.
    Share

    Purpose Statement

    Cybrary Career Paths are comprehensive training programs designed to prepare you for the most in-demand roles in the cybersecurity workforce. Each path follows a Learn, Practice, Prove model and includes different activity types aligned to key topics within the path’s security domain. As you progress through the path, your progress will be measured in real time using Experience Points (XP) that serve as a comprehensive capability score for each topic. Upon completing all of the requirements for a path, you will be rewarded with a shareable digital badge via Credly.
    This is some text inside of a div block.
    This is some text inside of a div block.
    M
    Time
    This is some text inside of a div block.
    difficulty
    This is some text inside of a div block.
    ceu/cpe

    Overview

    Heading 1

    Heading 2

    Heading 3

    Heading 4

    Heading 5
    Heading 6

    Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.

    Block quote

    Ordered list

    1. Item 1
    2. Item 2
    3. Item 3

    Unordered list

    • Item A
    • Item B
    • Item C

    Text link

    Bold text

    Emphasis

    Superscript

    Subscript

    Frequently Asked Questions
    No items found.
    What Will I Learn?
    Foundations
    Focused on the core IT competencies that cybersecurity professionals need to succeed in any career path.
    Defensive Security
    Focused on trying to find the bad guys. Topics such as threat intelligence, threat hunting, network monitoring, incident response. Defensive security is a reactive measure taken once a vulnerability is found through prevention, detection, and response.
    Engineering and Operations
    Focused on building and operating information systems.
    Governance, Risk, and Compliance
    Focused on the core IT competencies that cybersecurity professionals need to succeed in any career path.
    Leadership and Management
    Focused on program design and oversight. Covers project and program management.
    Offensive Security
    Focused on validating security controls by trying to break them (i.e. penetration testing or ethical hacking). Topics such as Kali Linux, metasploit, scanning, and privilege escalation. Offensive security seeks out the problem or vulnerability through ethical hacking and finds a solution to disable the operation.
    Offensive Security
    Focused on the core IT competencies that cybersecurity professionals need to succeed in any career path.
    Path Outline

    Heading 1

    Heading 2

    Heading 3

    Heading 4

    Heading 5
    Heading 6

    Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.

    Block quote

    Ordered list

    1. Item 1
    2. Item 2
    3. Item 3

    Unordered list

    • Item A
    • Item B
    • Item C

    Text link

    Bold text

    Emphasis

    Superscript

    Subscript

    Course Outline

    No items found.
    No items found.
    No items found.

    What Our Learners Are Saying

    Join 3 million+ users, including 96% of Fortune 1000 companies who use our platform to upskill their teams. See what the buzz is about - start learning for free!

    No items found.