Certified Information Systems Security Professional (CISSP)

Home/Programs/Workforce Development & Community Education/Certified Information Systems Security Professional (CISSP)

Securing information storage and processing systems against intrusion, theft, and damage is among the most important challenges facing organizations today. From user and customer data to trade secrets and even digital funds, security professionals are among the most sought-after and valuable employees in any enterprise. This 100% online course will teach you the foundations of information system security and prepare you to become a Certified Information Systems Security Professional (CISSP).

Enroll Now

FAQs

Information security professionals operate in the realm of extreme confidentiality and trust. Earning a certification such as the CISSP signals to employers of this caliber that a prospect is dedicated to their craft and committed to operating at the highest levels.

The CISSP is considered the world’s leading information security credential. It is held by Information Security Officers and Directors of Security from many of the world’s most recognizable institutions and organizations. It is among the few security certifications to meet the US Department of Defense’s cybersecurity training requirements.

Course Objectives

  • Be prepared to earn the Certified Information Systems Security Professional (CISSP) exam
  • Learn how to handle security and risk management
  • Understand asset security
  • Know how to implement security engineering
  • Realize best practices for communications and network security
  • Master identity and access management

Prerequisites

To succeed in this course, you must have a strong background in systems security or hold a Systems Security Certified Practitioner (SSCP) certification. To earn your CISSP certification, you must have a minimum of five-years work experience in two of the eight domains of CISSP.

Curriculum

  • Security and Risk Management: Security governance and policies; professional ethic and confidentiality
  • Asset Security: Information classification, ownership; data security controls, privacy, and retention
  • Security Engineering: Security models and designs engineering processes, vulnerabilities and cryptography
  • Communication and Network Security: Network architecture design and components; communication channels
  • Identity and Access Management: Physical and logical assets control; identification, authentication and third-party identity services
  • Security Assessment and Testing: Assessment and test strategies; security control testing, process data, and architectures
  • Security Operations: Foundational security operations concepts; logging, monitoring, and investigating activities
  • Software Development Security: Security in the software development lifecycle; software security effectiveness and impact

Instructor

David Grimes has more than 10 years of management and leadership experience in the private and non-profit sectors. Grimes is passionate about technology and education, having worked as academic dean, student services director, technology coordinator, teacher, consultant, and technology columnist. He holds a Master of Education and a Bachelor of Science from Ohio State University, both in Technology Education.

Registration and Enrollment

This course is 100% online. Start any time.

Enroll Now