Certified Information Systems Security Professional (CISSP) 2021

Cybrary
Course

CISSP is the basis of advanced information assurance knowledge for information security professionals. Often referred to as the "gold standard" of security certifications, being CISSP certified is one of the most important distinctions an information security professional can have on their resume.

Time
15 hours 43 minutes
Difficulty
Advanced
CEU/CPE
16
4.8
Share
NEED TO TRAIN YOUR TEAM? LEARN MORE
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

This Course is part of a Career Path: Become a Cyber Security Engineer
Course Content
Module 1: Course Overview and Instructor Introduction
Welcome and Introduction
10m
The CISSP Mindset: Part 1
10m
The CISSP Mindset: Part 2
10m
Module 2: Information Security Governance and Risk Management

2.1Domain 1 Overview and Principles of Information Security

9m

2.2Understanding GRC (Governance, Risk, and Compliance)

7m

2.3Liability

6m

2.4Information Security Frameworks: ISO 27001

5m

2.5Information Security Frameworks: GDPR

6m

2.6Information Security Frameworks: NIST CSF

6m

2.7Information Security Frameworks: CMMI

4m

2.8 Information Security Program

5m

2.9Security Policies

16m

2.10Standards, Procedures, Guidelines, and Baselines

6m

2.11Information Security Controls

9m

2.12Roles and Responsibilities

9m

2.13Information Security Risk Management

7m

2.14Risk Management Lifecycle

2m

2.15Risk Management Lifecycle: Risk Identification

9m

2.16Risk Management Lifecycle: Risk Assessment

11m

2.17Risk Management Lifecycle: Risk Response and Mitigation

9m

2.18Risk Management Lifecycle: Risk Monitoring and Reporting

7m

2.19Risk Review

5m

2.20Legal Considerations

7m

2.21Intellectual Property

7m

2.22Additional Legal Considerations

12m

2.23Knowledge Transfer

5m

2.24Domain 1 Review: Information Security and Risk Management

2m
Module 3: Asset Security

3.1Domain 2 Overview and Classification Strategies

9m

3.2States of Data

8m

3.3Threats to Data Protection

5m

3.4Data Security in the Cloud

7m

3.5Other Data Protection Techniques

6m

3.6Secure Data Disposal

6m
Module 4: Security Architecture and Engineering: Part 1 - Cryptography

4.1Domain 3 Overview and Cryptography Introduction

4m

4.2Cryptography Through History

14m

4.3Cryptography Basics

4m

4.4Initialization Vectors

9m

4.5Algorithms and Keys

6m

4.6Symmetric Cryptography

11m

4.7Asymmetric Cryptography

7m

4.8Authenticity

6m

4.9Integrity and Non-Repudiation

13m

4.10Common Asymmetric Algorithms

10m

4.11Symmetric vs. Asymmetric Review

4m

4.12Hybrid Cryptography

9m

4.13Public Key Infrastructure

17m

4.14MACs (Message Authentication Codes)

6m

4.15How It All Fits Together

7m

4.16IPSec

9m

4.17IPSec Sub-Protocols

10m

4.18Email Cryptosystems

6m

4.19Attacks on Cryptography

7m

4.20Cryptography Review

4m
Module 5: Security Architecture and Engineering: Part 2 - Security Architecture and Design

5.1Domain 3 Continued Overview and Security Models: Part 1 - Introduction

5m

5.2Security Models: Part 2 - State Machine Model

4m

5.3Security Models: Part 3 - Bell-LaPadula Model

9m

5.4Security Models: Part 4 - Biba Integrity Model

7m

5.5Security Models: Part 5 - Clark-Wilson and Brewer-Nash

11m

5.6System Architecture

5m

5.7Hardware Architecture

5m

5.8Software: Operating Systems Architecture

7m

5.9Programs, Processes, and Threads

5m

5.10Software: Application Architecture

9m

5.11Certification and Accreditation: Part 1 - The “Orange Book” (TCSEC)

4m

5.12Certification and Accreditation: Part 2 - Common Criteria

10m
Module 6: Communications and Network Security

6.1Domain 4 Overview and The OSI Reference Model

13m

6.2The OSI Model: Part 1 - Physical Layer

4m

6.3The OSI Model: Part 2 - Data Link Layer

12m

6.4Network Devices at Layers 1, 2, and 3

16m

6.5The OSI Model: Part 3 - Network Layer

8m

6.6The OSI Model: Part 4 - Transport Layer

7m

6.7The OSI Model: Part 5 - Session Layer

2m

6.8The OSI Model: Part 6 - Presentation Layer

2m

6.9The OSI Model: Part 7 - Application Layer

5m

6.10TCP Model and OSI Review

2m

6.11Security Zones and Firewalls

6m

6.12Firewalls and the OSI Model

10m

6.13Network Address Translation and Port Address Translation

13m

6.14Firewall Best Practices

7m

6.15WAN Technology: Part 1

5m

6.16WAN Technology: Part 2

7m

6.17Remote Access Protocols

6m

6.18Tunneling Protocols

6m

6.19Wireless Networking: Part 1

8m

6.20Wireless Networking: Part 2

9m
Module 7: Identity and Access Management

7.1Domain 5 Overview

5m

7.2Identity Management

4m

7.3Authentication: Part 1

8m

7.4Authentication: Part 2

7m

7.5Authentication: Part 3

10m

7.6Kerberos and Single Sign-On

5m

7.7The Kerberos Carnival

15m

7.8Federated Trusts

16m

7.9Authorization

3m

7.10Access Control Models

8m

7.11Auditing

2m

7.12Data Emanation Security

4m

7.13Identity and Access Management Review

1m
Module 8: Security Assessment and Testing

8.1Domain 6 Overview and Audits

7m

8.2Vulnerability Assessment: Part 1

2m

8.3Vulnerability Assessment: Part 2

8m

8.4Penetration Testing: Part 1

6m

8.5Penetration Testing: Part 2

4m

8.6Log Reviews

5m

8.7Intrusion Detection and Prevention

6m

8.8Analysis Engines

5m

8.9Other Detective Tools

5m
Module 9: Security Operations

9.1Domain 7 Overview and Incident Response

8m

9.2Forensic Investigation

4m

9.3Forensic Investigation Process: Part 1

2m

9.4Forensic Investigation Process: Part 2

9m

9.5Redundancy and Fault Management

6m

9.6Redundancy

7m

9.7RAID

7m

9.8Redundancy For Servers and Services

5m

9.9Redundant Power

3m

9.10Redundancy for Data

9m

9.11Redundancy for Staff

3m

9.12Business Continuity and DRP

4m

9.13Disaster Recovery

10m

9.14NIST 800-34 Rev 1

9m

9.15ISC2 Four BCP Processes

14m
Module 10: Software Development Security

10.1Domain 8 Overview and Hardening the System

4m

10.2Threat Modeling

9m

10.3Secure Design

5m

10.4Software Development Methodologies

6m

10.5Software Development Lifecycle

6m

10.6OWASP

7m

10.7Object Oriented Programming

7m

10.8Cohesion and Coupling

5m

10.9Relational Databases

10m

10.10Threats to Databases and Solutions

10m

10.11Course Conclusion

4m

LEARN MORE. ACHIEVE MORE.

Follow A Path

Deciphering the essentials to enter a new career is hard, so we did it for you!

Focus on building your skills and take this course in a guided Career Path.

Course Description

Certified Information Systems Security Professional (CISSP) verifies one has mastery of a multitude of information security and cybersecurity topics--something that's necessary for information security management and leadership (a job that many CISSP holders fulfill). Our online CISSP training covers topics ranging from operations security, telecommunications, network and internet security, identity and access management systems and methodology, and business continuity planning.

Generally, learning CISSP skills can be a bit daunting, but our online video training is broken down into modules that are self-paced, so you're able to go over a topic again if you desire more clarity. For example, if you are finding identity and access management and security operations fairly straightforward, but are struggling with security and risk management and software development security, you can adjust your studies accordingly.

When you decide to conclude your training, you will be equipped with the information needed to pass the official CISSP exam and begin your life as an information assurance leader. Be ready, you will have to study hard, but your opportunity is here.

While we know that the CISSP is an important distinction for information security professionals to hold, we also understand that the time, effort, and money that is often involved with this type of training can be overwhelming. This is what makes Cybrary different and allows us to help you make your career goals a reality.

Are Cybrary courses flexible and convenient?

Our CISSP online training can be completed anywhere and at any time. Whether you want to work on the lessons at home in the evenings or tackle a few modules each weekend at your local coffee shop, Cybrary makes it possible for you to complete these information security courses outside of the traditional classroom and at your own pace. Plus, we offer these cybersecurity courses online, so the financial burden of in-classroom courses is one less thing you have to worry about.

If you are looking for a flexible option to help you master numerous topics surrounding information assurance and cybersecurity and prepares you for the CISSP exam, the self-paced CISSP training course from Cybrary is for you.

Why take CISSP training?

Obtaining a Certified Information Systems Security Professional (CISSP) certification is the best way to show employers what you know. CISSP is considered a leading certification designed by International Information Systems Security Certification Consortium (ISC2), an organization that defines IT security standards worldwide. ISC2 maintains a Common Body of Knowledge (CBK), including skills, concepts, and best practices for cybersecurity.

The ISC2 is a globally recognized organization that garners respect from companies around the world. Having a certification from ISC2 immediately identifies you as an information security professional who takes learning and amassing knowledge seriously.

When you are a professional CISSP, it immediately proves that you have those skills and expertise that may not be obvious by simply glancing over your resume. Hiring managers and recruiters look for the CISSP credential as they narrow down their candidate lists for information security roles.

When you pass the CISSP exam and become certified, it shows that you have:

  • Comprehension of the controls and technology that increases an organization's overall security
  • Proficiency in vital security areas that range from asset and software development security and communication network security to software development security and security assessment and testing
  • Technical security skills as well as managerial proficiency, an eagerness to take part in the creation and implementation of policies and procedures for enterprise-level cybersecurity

After attending a CISSP exam prep program and successfully passing the certification exam, students join an elite group of CISSP security professionals worldwide. Organizations, large and small, continue to improve their IT security teams by hiring employees who have the education they desire, including the most important: a CISSP certification.

In fact, there are more than 301,000 current open jobs in cybersecurity in the U.S., almost twice the amount of CISSP certified candidates. The job market is wide open for CISSPs worldwide. Even the Department of Defense is seeking qualified CISSP certified candidates to hire.

Whether you are skilled at creating and implementing cybersecurity policies or you're a cryptography aficionado who loves to study the latest in encryption practices, a CISSP certification will broaden your employment horizons. When you get certified, you will be in demand by thousands of employers all over the world.

What is involved in this CISSP course?

This CISSP exam prep course from Cybrary will educate you on a variety of topics that all information assurance IT professionals should master. Some of the topics that will be covered in the various lessons include access control systems and methodology, business continuity planning, network and internet security, identity and access management, security operations, security assessment and testing, and communication and network security. The course covers all eight domains that are included on the CISSP exam. So, you can rest assured that by completing the course, you will be prepared to take and pass the certification exam and earn your CISSP credential.

How do I know if this is the best CISSP training for me?

Not only is the CISSP certification one of the most important elements you can add to your resume, but it is also one of the highest-paying certifications for information security professionals. So, if you are looking to advance your career and increase your earning potential, our CISSP exam preparation is something you should strongly consider.

The skills taught in this course are particularly important if you are interested in working in areas such as network security, security operations, security and risk management, identity and access management, security engineering, or software development security.

What makes Cybrary's CISSP training course unique?

What makes Cybrary unique is that we offer completely online security courses. Maybe you have a full-time job where you are putting in long hours, which makes it difficult for you to take traditional classes to earn your CISSP. If you want CISSP training that you can complete at your own pace, on your own schedule, then Cybrary is a fantastic option for you.

How long does it take to complete Cybrary's CISSP online course?

It will take you approximately 16 hours to complete the CISSP training from Cybrary. However, it is important to remember that you have the ability to determine when you want to put in the hours for training. Want to dedicate an entire weekend to complete all the lessons? Or would you rather spend a few hours each week going through the modules? Whether you want to complete the training in a few days, weeks, or months, the decision is up to you.

How difficult is this CISSP course?

The CISSP training from Cybrary has an advanced level of difficulty. The modules are challenging and intense, but just remember that you have the freedom to review topics as many times as necessary to ensure that you fully comprehend the details involved in each lesson and that you are prepared to pass the CISSP exam.

If you have already been working in the information security field, and you have experience with some of the CISSP exam domains, you will likely find the course easier than someone who doesn't. It's still important to take the course because it will give you an idea of what to expect on the CISSP exam and enhance your knowledge where it's lacking.

How many CEU/CPE credits are earned with the CISSP training course?

If you are taking our Certified Information Systems Security Professional online training to earn professional credits, successful completion of these lessons can qualify you to receive 16 CEU/CPE credits.

Earning professional credits demonstrates that you are committed to the continued learning of information security and security operations.

What is the exam like for the CISSP certification?

Once you have completed all of the lessons, the final step in earning your CISSP certification is to take the exam. If you feel like you need a little extra preparation, Cybrary offers a virtual practice lab where you can gain hands-on experience in dealing with security issues.

The actual CISSP certification exam is a three-hour adaptive test, which consists of up to 150 questions. In order to successfully earn the official CISSP certification, you must earn at least 700/1000, and certifications are valid for three years.

What changes were made to the CISSP certification exam?

The CISSP certification domains were restructured on May 1, 2021. As a result, a few modifications were made to the CISSP exam to account for this change. These changes include a slight domain refresh and a re-evaluation of the weights of those domains on the exam.

If you are ready to advance your career as an information assurance professional and you are prepared to embark on the journey of cybersecurity courses that you can complete at your own pace, contact Cybrary for more information on our CISSP exam preparation training.

CEU / CPE: 16

If you enjoy this course, be sure to check out the CompTIA CASP certification course!

About the CISSP Exam

In order to earn the official CISSP certification, you must take one required exam. Test-takers must pass the multiple-choice CISSP exam (three hours, up to 150 questions, in an adaptive exam) with a scaled score of 700 points or greater out of 1000 possible points, and you must achieve a passing score in all eight domains.

The eight CISSP domains are:

  1. Security and Risk Management
  2. Asset Security
  3. Security Architecture and Engineering
  4. Communication and Network Security
  5. Identity and Access Management
  6. Security Assessment and Testing
  7. Security Operations
  8. Software Development Security

Certifications are valid for three years. Re-establishing your certification status requires certain guidelines to be followed, requiring Continuing Professional Education (CPE) credits. For more information on maintaining your CISSP certification, visit (ISC)2's website.