Courses Courses Arts and Design Arts and Design Animation Graphic Arts Photography Web Design Business Business Accounting Administrative Communication Finance Marketing and Sales Operations Project Management Small Business Soft Skills Career Online High School Career Online High School Online High School Diploma Computer Applications Computer Applications AutoCAD Microsoft QuickBooks Windows Computer Programming Computer Programming Programming Classes Construction and Trades Construction and Trades Construction Environmental and Energy Trades Health and Fitness Health and Fitness Alternative Medicine Dental Fitness Medical Veterinary Wellness Hospitality Hospitality Hospitality Service Information Technology Information Technology Cloud Computing Networking Other Security Language Language Languages Legal Legal Legal Studies Math and Science Math and Science Mathematics and Science Teacher Professional Development Teacher Professional Development Child Development Classroom Technology Math and Science Reading and Writing Test Prep Test Prep Exam Prep Writing Writing Writing and Editing Skill Map How It Works How It Works About ed2go Externship Programs Financial Assistance Corporate Training Find a School Military Virtual Career Center


(855) 520-6806

See all results for ""

See All Courses

ed2go Information Technology Security Certified Information Systems Security Professional (CISSP)
Return to Security

Certified Information Systems Security Professional (CISSP)

In today’s online world, information security has become a critical part of virtually every organization—no matter the industry. The demand for information security professionals is expected to surge, as the forces of “good” and “bad” continue to battle for control and use of online information. You can join the side for “good” when you earn your Certified Information Systems Security Professional (CISSP) certification. Earning your CISSP is a must for cyber security professionals who want to get ahead in this important field.

Our Certified Information Systems Security Professional (CISSP) training is an engaging, fully online program that provides in-depth instruction in key areas related to information/cyber security.

6 Months / 150 Course Hrs
Open Enrollment

Offered in Partnership with your Preferred School

George Mason University Why this school? It's been chosen based on your location or if you've visited this school's website.

Financial Assistance Available*

Change School

Learning Method

Instructor-led Self-Paced: Study at your own schedule

Contact Us

Certified Information Systems Security Professional (CISSP)

Learning Method

Instructor-led Self-Paced: Study at your own schedule

Contact Us

Certified Information Systems Security Professional (CISSP) Details + Objective

Course Code: GES367

You Will Learn
  • Learn how to handle security and risk management
  • Understand asset security
  • Know how to implement security engineering
  • Realize best practices for communications and network security
  • Master identity and access management
How the course is taught
  • Self-paced, online course
  • 6 months to complete
  • Open enrollment, begin anytime
  • 150 course hours
How you will benefit
  • Become prepared to work as a Certified Information Systems Security Professional (CISSP)
  • Gain hands-on experience in the information/cyber security industry
  • Begin a career in information security or broaden your skills if you’re already working
  • Become more efficient on the job and better able to identify risks
Certified Information Systems Security Professional (CISSP) Outline
Expand All
Security and Risk Management

Understand security governance, policies, confidentiality, how to handle classified information, handling requirements, ownership, and privacy.

Security Engineering

Discuss security models, security designs, engineering processes, vulnerabilities, cryptography, and embedded devices.

Communication and Network Security

Learn about network architecture design, network components, communication channels, and network attacks.

Identity and Access Management

Cover physical and logical assets control, identification and authentication, identity as a service, provisioning lifecycle, and more.

Security Assessment and Testing

Master assessment and test strategies, test outputs, security testing, security process data, and security architectures.

Security Operations and Software Development

Complete the course by learning about foundational security operations, management processes, handling resources, and software security best practices.

Program Details

I.        Security and Risk Management
                A.    Security Governance
                B.    Security Policies
                C.    Confidentiality
                D.    Business Continuity
                E.    Legal and Regulatory
                F.    Professional Ethic
                G.    Risk Management
II.       Asset Security
                A.    Information Classification
                B.    Handling Requirements
                C.    Ownership
                D.    Data Security Controls
                E.    Protect Privacy
                F.    Retention
III.      Security Engineering
                A.    Security Models
                B.    Security Designs
                C.    Engineering Processes
                D.    Vulnerabilities
                E.    Cryptography
                F.    Embedded Devices
                G.    Site Design and Security
IV.       Communication and Network Security
                A.    Network Architecture Design
                B.    Network Components
                C.    Communication Channels
                D.    Network Attacks
V.        Identity and Access Management
                A.    Physical and Logical Assets Control
                B.    Identification and Authentication
                C.    Third-Party Identity Services
                D.    Identity as a Service
                E.    Provisioning Lifecycle
                F.    Authorization Mechanisms
VI.      Security Assessment and Testing
                A.    Assessment and Test Strategies
                B.    Test Outputs
                C.    Security Control Testing
                D.    Security Process Data
                E.    Security Architectures
VII.      Security Operations
                A.    Foundational Security Operations Concepts
                B.    Logging, Monitoring and Investigating Activities
                C.    Provisioning of Resources
                D.    Management Processes
                E.    Physical Security
                F.    Preventative Measures
                G.    Business Continuity
VIII.    Software Development Security
                A.    Security in the Software Development Lifecycle
                B.    Development Environment Security Controls
                C.    Software Security Effectiveness
                D.    Software Security Impact

View All Sections
Certified Information Systems Security Professional (CISSP) Instructors
David Grimes

David brings over 10 years’ experience in IT, education, instruction, curriculum design, combined with extensive management and leadership experience in the private and non-profit sectors. His passion for technology and education has led David to work as an academic dean, student services director, technology coordinator, teacher, consultant, and technology columnist and blogger. David holds a Master of Education and a Bachelor of Science, both in Technology Education, from Ohio State University in Columbus, Ohio. In addition, he has earned IT industry certifications and has been published in a book on gamification in the classroom.

Prerequisites / Requirements


This is an advanced level program. Students should have a base knowledge or certification in SSCP. If students wish to take the course without the foundational topics of SSCP, the student is expected to supplement course materials with outside resources.

For certification through (ISC)2, an individual must have a minimum of five-years of paid, full-time work experience in two of the eight domains of CISSP. A one-year experience waiver can be used in place of a four-year college degree or equivalent through an (ISC)approved list.

Once a person passes the (ISC)vendor exam, an endorsement is also required. This endorsement form must be signed by two (ISC)professional who are active members and can verify your professional experience.


Hardware Requirements: 

  • This course can be taken on either a PC or Mac device.
  • Mac users are encouraged to have access to a Windows environment on their device.

Software Requirements: 

  • Windows 7 and later operating systems and the latest version of Internet Explorer, Firefox, Chrome, or Safari browsers. (Although Firefox or Chrome is preferred). Software must be installed and fully operational before the course begins.
  • Adobe Flash Player. Click here to download the Flash Player.
  • Adobe Acrobat Reader. Click here to download the Acrobat Reader.
  • Other: Email capabilities and access to a personal email account.

Instructional material requirements: 

  • The instructional materials required for this course are included in enrollment.
Certified Information Systems Security Professional (CISSP) Frequently Asked Questions
Expand All
Can I register for programs if I am an international student?

Yes, since ed2go programs are online, you never have to actually travel to the school. Most schools offer telephone or online registration.

How long does it take to complete a program?
This program is self-paced and open enrollment, so you can start and finish at your own pace. Upon registering, you're given six (6) months to complete this program.
What if I don't have enough time to complete my program within the time frame provided?

The time allotted to complete your program has been calculated based on the number of course hours. If after a concerted effort, you are still unable to complete your program on time, your Student Advisor will help you work out a suitable completion date. Please note that a fee may be charged for an extension.

Do I have to buy additional materials?


Do I have to buy additional materials?


Can I get financial assistance?

ed2go courses are non-credit courses, so they do not qualify for federal aid. In some states, vocational rehab or workforce development boards will pay for qualified students to take our courses. Additionally, some students may qualify for financial assistance when they enroll, if they meet certain requirements.

What happens when I complete the program?
Upon successful completion of the program, you will be awarded a certificate of completion.
Am I guaranteed a job?

ed2go programs will provide you with the skills you need to obtain an entry-level position in most cases. We don’t provide direct job placement services, but our facilitators and career counselors will help you build your resume and are available to give advice on finding your first job. Facilitators will also be available to use as a professional reference upon completion of the program. Potential students should always do research on the job market in their area before registering.

Who will be my instructor?
Each student is paired with a facilitator for one-on-one interaction. The facilitator will be available (via e-mail) to answer any questions you may have and to provide feedback on your performance. All of our facilitators are successful working professionals in the fields in which they teach.
Can I use a Mac?


How can I get more information about this program?

If you have additional questions, please feel free to contact us via LIVE CHAT or by calling us at (855) 598-3856. If you are visiting us during non-business hours, please feel free to send us a question using the Contact Us form.

When can I start the program?

Our programs are all open enrollment. You can register and start the program as soon as you are ready.

Please note: Once the program curriculum is accessed online or through submission of a material shipment confirmation, refunds cannot be issued.

Does this program prepare for a certification?

Yes, this program helps prepare student for the CISSP® - Certified Information Security Professional certification, which is provided through (ISC)2. 

Please note: Individuals wishing to take the CISSP exam are required to have a minimum of 5 years of paid full-time work experience in 2 of the 8 domains of the CISSP CBK, which covers critical topics in security today including risk management, cloud computing, mobile security, application development security, and others. Information about the CISSP credential and exam is available on their website:

Browse All
Talk to an admissions counselor
Got other questions? Get in touch with us via . During non-business hours, please feel free to send us a question using the "Contact Us" button. You can also reach us by phone (855) 520-6806.