IT and Software Development

Certified Information Systems Security Pro (CISSP) Prep Course and Exam

100 Hours
3 Months
Beginner
English

This CISSP® Exam Prep Course, offered by our accredited school partners, prepares test-takers for the Certified Information Systems Security Professional exam, as administered by the International Information System Security Certification Consortium (ISC)2. The CISSP® certification is recognized worldwide and adheres to the strict standards of ISO/IEC 17024. As security breaches outpace the available pool of security experts, the need for information security professionals with proper certifications will continue to grow. Among other titles, obtaining the CISSP® certification prepares one for a position as a Security Analyst, Chief Information Security Officer, or as a Security Architect. This course includes an assessment of their readiness to take ISC2’s CISSP® Exam. It contains two 120-question practice exams, which cover The International Information System Security Certification Consortium’s eight domains:
Security and Risk Management
Asset Security
Security Engineering
Communications and Network Security
Identity and Access Management
Security Assessment and Testing
Security Operations
Software Development Security

This program includes:
Certified Information Systems Security Pro (CISSP) Prep Course
CISSP Certification Practice Exam
CISSP Certification Exam Voucher

Clourse outline:
Lesson 1: Foundational concepts of information security, such as the CIA triad
Lesson 1: Information security frameworks and security training
Lesson 1: The information life cycle
Lesson 1: How information and data are classified
Lesson 2: Data and information privacy
Lesson 3: System and computer architecture
Lesson 4: Symmetric and asymmetric cryptography
Lesson 5: Physical security risks and mitigation
Lesson 6: Types of networks
Lesson 7: The OSI model and the TCP/IP Model
Lesson 8: Network, routing, and data link protocols
Lesson 9: The functions of common networking devices and how wireless networks work
Lesson 10: Identification methods and technologies
Lesson 11: Assess and test security controls
Lesson 12: Business continuity and disaster recovery plans
Lesson 13: The role of security operations
Lesson 14: Trusted recovery techniques
Lesson 15: The steps required in effective incident management
Lesson 16: The role of auditing, monitoring, and detection in information security
Lesson 17: The steps of a digital forensics investigation
Lesson 18: The software development life cycle
Lesson 19: The role of databases in information security
Lesson 20: Software-based and network attacks

Enroll through one of our accredited university or college partners today!

Asset Security
Communications and Network Security
Identity and Access Management
Security and Risk Management
Security Assessment and Testing
Security Engineering
Security Operations
Software Development Security

• Discuss the foundational concepts of information security, such as the CIA triad
• Know the different information security frameworks
• Explain information security training and education
• Discuss the information life cycle
• Explain how information and data are classified
• Learn about data and information privacy
• Understand system and computer architecture
• Explain and compare symmetric and asymmetric cryptography
• Learn about physical security risks and mitigation
• Compare different types of networks
• Contrast the OSI model with the TCP/IP Model
• Identify and differentiate among network, routing, and data link protocols
• Describe the functions of common networking devices and how wireless networks work
• Evaluate different identification methods and technologies
• Assess and test various security controls
• Describe business continuity and disaster recovery plans
• Understand the role of security operations
• Identify trusted recovery techniques
• Relate the steps required in effective incident management
• Discuss the role of auditing, monitoring, and detection in information security
• Learn the steps of a digital forensics investigation
• Explain the software development life cycle
• Discuss the role of databases in information security
• Recognize several software-based and network attacks

All required reference materials are provided with this program. Technical requirements:

Internet Connection
• Broadband or High-Speed (DSL, Cable, Wireless)
Hardware Requirements
• Processor – 2GHz Processor or Higher
• Memory – 1 GB RAM Minimum Recommended

Software Requirements
• Operating Systems – Windows 7, 8 or 10; Mac OS x 10 or higher
• Microsoft Office 2007, 2010 or 2013 or a Word Processing application to save and open Microsoft Office formats (.doc, .docx, .xls, .xlsx, .ppt, .pptx)
• Internet Browsers – Google Chrome is highly recommended
• Cookies MUST be enabled
• Pop-ups MUST be allowed (Pop-up Blocker disabled)
• Adobe PDF Reader

This program includes CISSP Certification Practice Exams and a voucher for the CISSP Certification!
The CISSP certification is the ideal credential for those with proven deep technical and managerial competence, skills, experience, and credibility to design, engineer, implement, and manage their overall information security program to protect organizations from growing sophisticated attacks.
The CISSP is ideal for those working in positions such as, but not limited to:
Security Consultant
Security Manager
IT Director/Manager
Security Auditor
Security Architect
Security Analyst
Security Systems Engineer
Chief Information Security Officer
Director of Security
Network Architect
*For full certification, candidates must have a minimum of five years previous experience working in cyber security. Candidates who do not meet the work requirements will be given Associate level status until the requirements have been satisfied.

Relevancy – With annual reviews and enhancements, this program guarantees accurate and relevant curriculum that meets employer requirements for the knowledge and skills demanded to successfully enter the workforce.
Career Readiness – Our Career Kit is designed to provide students with the practical tools they’ll need to help find a job once they have completed training and earned their certification. With our Career Kit, students are sure to impress! Using our practical templates and prompts, students can present their BEST self to future employers.
Curriculum Format – We believe career training should be engaging and fun, not exhausting, and boring. To achieve this, we have developed our program with a mix of formats including reading material, video lectures, procedure videos, interactive activities and games, knowledge check ins, and section assessments. By incorporating a balanced mixture of interactivity, engagement, and comprehension testing, this program ensures a well-rounded experience for students that will not only fully prepare them to enter the workforce but also provide a fun, entertaining way to learn. With real-life procedure videos, students are provided a combination of comprehensive instructions, visual and auditory demonstrations, and hands-on practice exercises.

6 Reasons to Complete Your Training With Us

Flexibility
With our programs, you can learn and study at your own pace with access 24/7/365 for the duration of your program. This means you can learn on your own terms and work around your own schedule.

Support
Our online training comes with access to real, live support personnel that will help you through every step from our admissions adviser who will assist you with selecting the right training for you, to our student adviser who will be there with you during your entire training journey.

Relevancy
We have tailored our programs to provide comprehensive training in the technical and soft skills employers are looking for. With direct input and feedback from industry leaders and hiring managers, our program aligns with exactly what you need to successfully enter the workforce.

Certification
Our career training not only gives you the knowledge you need but preparation for the certification exams relevant to your desired career path. If you are pursuing an exciting new career in a field with a national certification, our program will both prepare you to sit for the exam but will often include a voucher for the exam cost.

Simulations and Case Studies
Our training programs have been developed with real learners and professionals in mind, so our programs incorporate real-world case studies and virtual simulations that will provide examples and interactions with real-life situations you may encounter during your career. These allow you to learn by experience with circumstances similar to what will be your daily responsibilities on the job.

Engaging and Interactive
Our training curriculum was developed with you in mind, looking at modern day learners and their needs. Our curriculum contains a mix of formats including reading, listening, watching, and interacting that will immerse you into a fun and engaging learning experience you will not only enjoy but not want to end.

Program Description



This CISSP® Exam Prep Course, offered by our accredited school partners, prepares test-takers for the Certified Information Systems Security Professional exam, as administered by the International Information System Security Certification Consortium (ISC)2. The CISSP® certification is recognized worldwide and adheres to the strict standards of ISO/IEC 17024. As security breaches outpace the available pool of security experts, the need for information security professionals with proper certifications will continue to grow. Among other titles, obtaining the CISSP® certification prepares one for a position as a Security Analyst, Chief Information Security Officer, or as a Security Architect. This course includes an assessment of their readiness to take ISC2’s CISSP® Exam. It contains two 120-question practice exams, which cover The International Information System Security Certification Consortium’s eight domains:
Security and Risk Management
Asset Security
Security Engineering
Communications and Network Security
Identity and Access Management
Security Assessment and Testing
Security Operations
Software Development Security

This program includes:
Certified Information Systems Security Pro (CISSP) Prep Course
CISSP Certification Practice Exam
CISSP Certification Exam Voucher

Clourse outline:
Lesson 1: Foundational concepts of information security, such as the CIA triad
Lesson 1: Information security frameworks and security training
Lesson 1: The information life cycle
Lesson 1: How information and data are classified
Lesson 2: Data and information privacy
Lesson 3: System and computer architecture
Lesson 4: Symmetric and asymmetric cryptography
Lesson 5: Physical security risks and mitigation
Lesson 6: Types of networks
Lesson 7: The OSI model and the TCP/IP Model
Lesson 8: Network, routing, and data link protocols
Lesson 9: The functions of common networking devices and how wireless networks work
Lesson 10: Identification methods and technologies
Lesson 11: Assess and test security controls
Lesson 12: Business continuity and disaster recovery plans
Lesson 13: The role of security operations
Lesson 14: Trusted recovery techniques
Lesson 15: The steps required in effective incident management
Lesson 16: The role of auditing, monitoring, and detection in information security
Lesson 17: The steps of a digital forensics investigation
Lesson 18: The software development life cycle
Lesson 19: The role of databases in information security
Lesson 20: Software-based and network attacks

Enroll through one of our accredited university or college partners today!

This program is ideal for professionals with previous security experience seeking CISSP certification. This program will prepare exam candidates for the Certified Information Systems Security Professional certification exam form ISC2. For full certification, candidates must have a minimum of five years previous experience working in cyber security. Candidates who do not meet the work requirements will be given Associate level status until the requirements have been satisfied.
• Discuss the foundational concepts of information security, such as the CIA triad • Know the different information security frameworks • Explain information security training and education • Discuss the information life cycle • Explain how information and data are classified • Learn about data and information privacy • Understand system and computer architecture • Explain and compare symmetric and asymmetric cryptography • Learn about physical security risks and mitigation • Compare different types of networks • Contrast the OSI model with the TCP/IP Model • Identify and differentiate among network, routing, and data link protocols • Describe the functions of common networking devices and how wireless networks work • Evaluate different identification methods and technologies • Assess and test various security controls • Describe business continuity and disaster recovery plans • Understand the role of security operations • Identify trusted recovery techniques • Relate the steps required in effective incident management • Discuss the role of auditing, monitoring, and detection in information security • Learn the steps of a digital forensics investigation • Explain the software development life cycle • Discuss the role of databases in information security • Recognize several software-based and network attacks
This course provides students with qualified support professionals to guide them through their learning experience. The student support team is available to answer any questions a learner may have including questions on course content, course material, certifications, and registration or enrollment questions. Support advisers also monitor the progress of learners to ensure training retention and program advancement.
Though you are provided a full 6 months access to your program, the average completion time is only 3 months!

FAQ

To request more information, you can contact us via online chat, our website contact form, or toll free at 1-855-201-6910.

Online courses are accessible 24/7/365 and self-paced, allowing you to progress at your own pace on your own schedule. They can be taken from anywhere in the world from the comfort of your own home. Classroom courses have a set schedule of the days and times the courses will be held, and you must attend during those specific times.

Find out if online learning is right for you by contacting our team of registration advisers. Our team is available to answer any of your questions about taking an online course before you commit to enrolling. We will walk you through what to expect to ensure you are making the right decision. You can contact a registration adviser today via online chat, our website contact form, or toll free at 1-855-201-6910.

No, you are not required to have a diploma or higher education degree to enroll in an online course. However, some occupations may require minimum educational thresholds for employment or certification. For more information on your desired career requirements, please contact us via online chat, our website contact form, or toll free at 1-855-201-6910.

To take an online course, you will need to have access to an internet connection and an internet ready device such as a laptop, PC, or tablet. For course specific requirements, please visit the course page or contact a registration adviser today.

Our courses are developed with multiple formats including text, audio, video, and interactivity. Our courses also include multiple resources and tools which can include flashcards, games, activities, and more.

No, you can take the online courses from anywhere in the world.

We participate in several financial assistance options including third party funding, both military and non-military. To request more information on the financial assistance options available and check your eligibility, contact us via online chat, our website contact form, or toll free at 1-855-201-6910.

Duration is the amount of time you will receive access to your course. Durations vary by course and range between 1 month and 12 months. If you complete your course before your duration ends you will continue to have access to your course until the duration period ends.

Many of our career training programs include certification vouchers. This means that at the successful completion of your course, at no additional charge, you will receive an exam voucher for the corresponding industry certification. This voucher will allow you to register and sit for the appropriate certification exam to obtain your industry credential.

Our online courses are open enrollment, so you can start immediately. If you are using any third-party funding to cover your course tuition, your start date may be a future date determined by your funding program.

Once enrolled, you will be assigned a client adviser who will provide you with customer and technical support. Your client adviser will supply you with your course access information, any needed materials, and be available to answer any questions you have during your training experience. They will regularly check-in with you to monitor your progress and assist you with staying on track. You will also be assigned to a course mentor who will provide curriculum support throughout your training. Your mentor is available to answer any questions you have on your course curriculum, will monitor your progress and understanding of the curriculum, and may give assignments or quizzes.

If you experience any trouble accessing your course including technical issues or lost login credentials, please contact your client adviser at helpdesk@worldeducation.net.

Our goal for students is to successfully complete their training course and achieve their career goals. We understand that extenuating circumstances can interfere with your ability to complete your course in the duration given. Because of this we have free or low-cost extensions available for our courses upon request. To discuss or request an extension please contact your client adviser at helpdesk@worldeducation.net.

Upon successful completion of your course and fulfillment of any outstanding financial obligations, you will receive your certificate of completion. Certificates are provided to you within 30 days of completion. Your certificate will validate the training course you completed with a stamp of completion.

Students that successfully complete our career training programs are assigned a career development adviser who will coordinate placement at a local externship or hands on opportunity. These opportunities are optional and may vary based on availability and occupation. Your career development adviser will also provide job search services such as: resume building, mock interviews, job opportunity resources, and more. Our professional enrichment courses do not come with a career adviser or career services.