Certified Information Systems Security Professional (CISSP)

A new course is coming soon. The current course retires on 9/25/24.

In today's online world, information security has become a critical part of virtually every organization—no matter the industry. The demand for information security professionals is expected to surge, as the forces of "good" and "bad" continue to battle for control and use of online information. You can join the side for "good" when you earn your Certified Information Systems Security Professional (CISSP) certification. Earning...

SHARE
6 Months / 150 Course Hrs
Open Enrollment
Offered in partnership with your preferred school

George Mason University

Change School
Learning method

for additional information

Course code: GES367

What you will learn

  • Learn how to handle security and risk management
  • Understand asset security
  • Know how to implement security engineering
  • Realize best practices for communications and network security
  • Master identity and access management

How you will benefit

  • Become prepared to work as a Certified Information Systems Security Professional (CISSP)
  • Gain hands-on experience in the information/cyber security industry
  • Begin a career in information security or broaden your skills if you're already working
  • Become more efficient on the job and better able to identify risks

How the course is taught

  • Self-paced, online course
  • 6 Months to complete
  • Open enrollment, begin anytime
  • 150 course hours
  1. Security and Risk Management
    1. Security Governance
    2. Security Policies
    3. Confidentiality
    4. Business Continuity
    5. Legal and Regulatory
    6. Professional Ethic
    7. Risk Management
  2. Asset Security
    1. Information Classification
    2. Handling Requirements
    3. Ownership
    4. Data Security Controls
    5. Protect Privacy
    6. Retention
  3. Security Engineering
    1. Security Models
    2. Security Designs
    3. Engineering Processes
    4. Vulnerabilities
    5. Cryptography
    6. Embedded Devices
    7. Site Design and Security
  4. Communication and Network Security
    1. Network Architecture Design
    2. Network Components
    3. Communication Channels
    4. Network Attacks
  5. Identity and Access Management
    1. Physical and Logical Assets Control
    2. Identification and Authentication
    3. Third-Party Identity Services
    4. Identity as a Service
    5. Provisioning Lifecycle
    6. Authorization Mechanisms
  6. Security Assessment and Testing
    1. Assessment and Test Strategies
    2. Test Outputs
    3. Security Control Testing
    4. Security Process Data
    5. Security Architectures
  7. Security Operations
    1. Foundational Security Operations Concepts
    2. Logging, Monitoring and Investigating Activities
    3. Provisioning of Resources
    4. Management Processes
    5. Physical Security
    6. Preventative Measures
    7. Business Continuity
  8. Software Development Security
    1. Security in the Software Development Lifecycle
    2. Development Environment Security Controls
    3. Software Security Effectiveness
    4. Software Security Impact

Jeff Rees

Jeff Rees has over 25 years of experience in the IT industry. Jeff's expertise covers a wide range of technical skills in the field of immersive technology, such as virtual reality, augmented reality, spatial computing, and holograms. He manages, creates, and delivers high-quality augmented and virtual reality technology experiences that enhance knowledge retention and engagement for learners. Jeff capitalizes on his multifaceted technical knowledge with his passion for implementing immersive solutions, which has given him a proven track record of producing one-of-a-kind solutions for clients. Jeff has previously served as a senior vice president of operations, chief technology officer, and technical director for diverse technology companies. Jeff has also taught numerous computer courses during his career. Jeff holds a bachelor's degree from DeVry University in Computer Sciences with an emphasis in Simulation Design.

Prerequisites:

This is an advanced level course. You should have a base knowledge or certification in SSCP. If you wish to take the course without the foundational topics of SSCP, then you'll be expected to supplement the course materials with outside resources.

Certification Requirements:

For certification through (ISC)2, an individual must have a minimum of five-years of paid, full-time work experience in two of the eight domains of CISSP. A one-year experience waiver can be used in place of a four-year college degree or equivalent through an (ISC)2 approved list.

Once a person passes the (ISC)2 vendor exam, an endorsement is also required. This endorsement form must be signed by two (ISC)2 professionals who are active members and can verify your professional experience.

Requirements:

Hardware Requirements:

  • This course can be taken on either a PC or Mac.
  • Mac users are encouraged to have access to a Windows environment on their device.

Software Requirements:

  • PC: Windows 8 or later.
  • Mac: macOS 10.6 or later.
  • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
  • Adobe Acrobat Reader.
  • Software must be installed and fully operational before the course begins.

Other:

  • Email capabilities and access to a personal email account.

Instructional Material Requirements:

The instructional materials required for this course are included in enrollment. The following textbooks will be shipped to you approximately 7-10 business days after enrollment:

  • (ISC)² Certified Information Systems Security Professional (CISSP) Official Study Guide

Please note: You will receive a digital book if the physical book is on backorder.

Certification Magazine listed the CISSP as one of the top 75 highest salaried credentials in its annual Salary Survey 75 report. As of December 2022, ZipRecruiter reported the nationwide average salary for CISSP-certified professionals to be $130,185 annually.

You can expect to pay $749 to take the CISSP exam.

In order to qualify for CISSP certification, you must have a minimum of five years of cumulative paid work experience in two or more of the eight domains of the CISSP CBK. Additionally, earning a four-year college degree or regional equivalent or an additional credential from the (ISC)² approved list will satisfy up to one year of experience needed to fulfill CISSP requirements.

The CISSP exam covers 8 different domains, including:

  1. Security and Risk Management
  2. Asset Security
  3. Security Architecture and Engineering
  4. Communication and Network Security
  5. Identity and Access Management (IAM)
  6. Security Assessment and Testing
  7. Security Operations
  8. Software Development Security

Candidates must demonstrate mastery of all eight CISSP domains in order to earn their CISSP certification.

The CISSP, or Certified Information Systems Security Professional, is an in-demand certification that is earned by passing the CISSP exam from (ISC)2. This credential is highly respected worldwide because it proves the certification holder's ability to effectively design, implement and manage best-in-class cybersecurity operations.

There are a large variety of CISSP jobs available globally. Some of these job titles include chief information security officer, security systems administrator, information assurance analyst, IT security engineer, senior IT security consultant, senior information security risk officer, and any other job for professionals who manage or oversee security strategies.

The CISSP is worthwhile for practically any cybersecurity professional. Even IT professionals who don't come into direct contact with traditional cybersecurity implementations and configurations should consider doing the prep work necessary to earn the CISSP. It can open the door to many IT positions and is a necessary certification for those wishing to pursue higher-level security roles in the future.

Yes, this course helps prepare student for the CISSP® - Certified Information Security Professional certification, which is provided through (ISC)².

Please note: Individuals wishing to take the CISSP exam are required to have a minimum of 5 years of paid full-time work experience in 2 of the 8 domains of the CISSP CBK, which covers critical topics in security today including risk management, cloud computing, mobile security, application development security, and others. Information about the CISSP credential and exam is available on their website: https://www.isc2.org/cissp/default.aspx.

This course is open enrollment, so you can register and start the course as soon as you are ready. Access to your course can take 24-48 business hours.

This course is self-paced and open enrollment, so you can start when you want and finish at your own pace. When you register, you'll receive six (6) months to complete the course.

The time allotted for course completion has been calculated based on the number of course hours. However, if you are unable to complete the course, contact the student advising team to see what options you may have available to work out a suitable completion date. Please note that an extension fee may be charged.

Our courses are designed to accommodate various learning preferences. Depending on the course structure, you may get different forms of support. Self-paced courses are designed to be user-friendly and independent, minimizing the need for external support. In courses with instructors, our direct platform support feature includes opportunities for questions, discussions, and remediation, with email and phone support available for select courses. Our student advising team is available to guide you on program requirements and administrative requests, but they do not provide assistance with course content. Our goal is to provide you with the necessary support for success, whether it's through self-paced exploration, direct communication, or guidance from our advising team.

Upon successful completion of the course, you will be awarded a Certificate of Completion.

This course will provide you with the skills you need to obtain an entry-level position in most cases. Potential students should always do research on the job market in their area before registering.

This course is non-credit, so it does not qualify for federal aid, FAFSA and Pell Grant. In some states, vocational rehab or workforce development boards will pay for qualified students to take our courses. Additionally, some students may qualify for financial assistance when they enroll, if they meet certain requirements. Financing is available from select schools. Learn more about financial assistance.

If you have questions that are not answered on our website, representatives are available via LIVE chat. You can also call us at 1-877-221-5151 during regular business hours to have your questions promptly answered. If you are visiting us during non-business hours, please send us a question using the "Contact Us" form.

(ISC)2
(ISC)2 is an international association committed to ensuring the growth and learning of information security professionals. There is much at stake in this fast-paced industry, and it's important to stay up-to-date on all the latest tools and techniques. (ISC)2 is committed to putting you at the forefront of the industry, and as the world's leading organization dedicated to promoting IT and cybersecurity, they have the resources to do just that. When you enroll in a course certified by (ISC)2, you can be confident you're getting the latest information and the most robust and renowned certifications in the industry.