(0)
1-855-732-3348
+
Learn About Our CCSK X CCSP Training Week

Certified Information Systems Security Professional – Self-Paced

Register Now

About the Course+ Show

Often referred to as the ‘gold standard’, the Certified Information Systems Security Professional (CISSP) is the most globally recognized certification in the information security sector. CISSP validates an information security professional’s deep technical and managerial knowledge and experience to effectively design, engineer, and manage the overall security posture of an organization.

 

Students will gain knowledge in information security that will increase their ability to successfully implement and manage security programs in any organization or government entity. The goal of this content is to provide students with the core knowledge necessary to be successful security professionals. This training course will help candidates review and refresh their information security knowledge in pursuit of the CISSP exam.


What's Included+ Show

This is an interactive online self-paced course offering the learner the flexibility to work through the content and activities at their own pace over a 180-day period. The estimated time to complete the course is 40 hours. 

 

With the purchase of Official ISC2CISSP Self-Paced Training, each learner will receive the following: 

 

180 Days Access to Official ISC2 Course Content: 

 

  • Official ISC2 CISSP Student Training Guide (eBook)
  • 180-Day Subscription
  • Applied Scenarios
  • Interactive Content
  • Robust Search Functionality
  • Analytics Dashboard to Track Progress
  • Confidence Sliders for Question Answers
  • Key Takeaways
  • Knowledge Checks
  • Practical Assessment
  • Online Interactive Flash Cards
  • 24x7x 365 Technical Support
  • Course Completion Badge

 

The Intrinsec Added Advantage  

  • ISC2 CISSP Official Study Guide, Hard Copy
  • ISC2 CISSP Official Practice Tests, Hard Copy
  • Pearson VUE Exam Support
  • ISC2 Preferred Partner CPE Submission Program
  • Education Guarantee (see below for details)

*Official ISC2 CISSP exam voucher is NOT included.

You will have the option to purchase an Official CISSP Certification Exam Voucher once you are at the checkout page.  The exam voucher cost is $749 for 1 attempt and is valid for one year from the purchase date.  

 

Education Guarantee 

**Education Guarantee: If you do not pass the CISSP exam on your first attempt after taking our training course, you can take this self-paced training course again at no cost to you (within one year from the end of the training seminar). The Education Guarantee covers the cost of the second self-paced training course. You will have to pay the full price for your second attempt at the exam.


Course Syllabus+ Show

This interactive online self-paced training provides a comprehensive review of information systems security concepts and industry best practices, covering the following eight domains of the CISSP Common Body of Knowledge (CBK): 

 

  • Domain 1 | Security and Risk Management
  • Domain 2 | Asset Security
  • Domain 3 | Security Architecture and Engineering
  • Domain 4 | Communication and Network Security
  • Domain 5 | Identity and Access Management (IAM)
  • Domain 6 | Security Assessment Testing
  • Domain 7 | Security Operations
  • Domain 8 | Software Development Security

Common Questions+ Show

How this Course Works 

This is an interactive online self-paced course offering the learner the flexibility to work through the content and activities at their own pace over a 180-day period. The estimated time to complete the course is 40 hours. 

 

Content will be taught using a series of lecture-based videos, audio presentations, interactive exercises, readings, and assessments. In addition to viewing audio and video lectures, learners will be asked to work through and complete activities. 

 

Materials 

All materials are included in the course. 

 

Access to course content 

180 days 

 

Language

Course content is offered in English. 

 

Course Type 

Self-Paced – Online go-at-your-own-pace training with interactive study materials, no instructor, and available 24/7 

 

Learner Support 

ISC2 Authorized instructors are available via email to help learners with content-related questions as they work through the course. Learners will receive responses to inquiries within 48 hours. Additional details are provided in the course. 

 

Requirements for Completion 

In order to complete the course, receive a certificate of completion, and earn ISC2 continuing professional education (CPE) credits learners must: 

  • Complete all learning activities within the course. 
  • Complete a course evaluation. 
  • Score 70% or higher on the end-of-chapter quizzes and final assessment. 

Education Guarantee  

We want our candidates to successfully pass their certification exam and achieve their goal of earning an (ISC)² credential.  Included with this course is the ISC2 Education Guarantee.  If you do not pass the exam after completing our training seminar, you can take a second self-paced training seminar at no cost to you (within one year from the end of the initial seminar).  The Education Guarantee covers the cost of the second course only. You will have to pay the full price for your second attempt at the exam. Initial exam results letter required.  

 

Technology Requirements 

The following are system requirements needed to enhance your overall learning experience. 

A stable and continuous internet connection is required. In order to record your completion of the online learning courses, please ensure you are connected to the internet at all times while taking the course. 

 

Hardware Specifications 

  • Processor 2 GHz + 
  • RAM 4 GB + 
  • Monitor minimum resolution (1024 x 768) 
  • Video Card 
  • Keyboard and Mouse or other assistive technology

Computer Peripherals 

  • Speakers/Headphones – (Noise-cancelling headset is recommended) 
  • Microphone 
  • Camera 

Supported Operating Systems 

  • Macintosh OS X 10.10 to present 
  • Windows 10 to present 

Supported Browsers 

  • Google Chrome 
  • Microsoft Edge 
  • Mozilla Firefox 

Application Software 

Adobe Readers: https://get.adobe.com/reader/ 

 

Certificate of Completion 

An electronic Certificate of Completion will be provided once you have completed the course by meeting all the requirements. We recommend that you download and retain the certificate of completion as proof of credits earned. 

To download a PDF version of the certificate, go to the “Awards” tab of ISC2 Learn (top menu), select the course, and then “Generate Certificate”. 

 

CPE Credits 

CPE credits earned for this course may be eligible for continuing professional education credits for non- ISC2 certifications. Please visit the continuing education requirements established by the credentialing organization for eligibility. 

For specific questions related to your CPE credits or the CPE portal please contact member support – at membersupport@isc2.org. 

 

Purchasing 

If you want to purchase this course on behalf of someone else or are interested in quantity discounts, please contact us: 

Email: info@intrinsecsecurity.com  or call Phone: +1-855-732-3348   

 

Cancellation Policy 

Refunds for any ISC2 self-paced courses will not be provided. 

 

Have more questions? Read our Frequently Asked Questions page or simply send your questions to us directly via our Contact Us page or our Live Chat and we will be more than happy to assist with any and all questions!


Who Should Attend+ Show

This course is designed for information security professionals with deep technical and managerial knowledge and experience to effectively design, engineer, and manage the overall security posture of an organization. 

 

Prior to taking this course, the learner should have experience, skills, or knowledge obtained while serving one of the following roles: 

 

  • Chief Information Officer
  • Chief Information Security Officer
  • Chief Technology Officer
  • Compliance Manager/ Officer
  • Director of Security
  • Information Architect
  • Information Manager / Information Risk Manager or Consultant
  • IT Specialist/Director/Manager
  • Network/System Administrator
  • Security Administrator
  • Security Architect / Security Analyst
  • Security Consultant
  • Security Manager
  • Security Systems Engineer/ Security Engineer

Learning Objectives+ Show

At the end of this course, learners will be able to: 

 

  • Apply fundamental concepts and methods related to the fields of information technology and security.
  • Align overall organizational operational goals with security functions and implementations.
  • Determine how to protect the assets of the organization as they go through their lifecycle.
  • Leverage the concepts, principles, structures, and standards used to design, implement, monitor, and secure operating systems, equipment, networks, applications, and those controls used to enforce various levels of confidentiality, integrity, and availability.
  • Apply security design principles to select appropriate mitigations for vulnerabilities present in common information system types and architectures.
  • Explain the importance of cryptography and the security services it can provide in today’s digital and information age.
  • Evaluate physical security elements relative to information security needs.
  • Evaluate the elements that comprise communication and network security relative to information security needs.
  • Leverage the concepts and architecture that define the associated technology and implementation systems and protocols at Open Systems Interconnection (OSI) model layers 1–7 to meet information security needs.
  • Determine appropriate access control models to meet business security requirements.
  • Apply physical and logical access controls to meet information security needs.
  • Differentiate between primary methods for designing and validating test and audit strategies that support information security requirements.
  • Apply appropriate security controls and countermeasures to optimize an organization’s operational function and capacity.
  • Assess information systems risks to an organization’s operational endeavors.
  • Determine appropriate controls to mitigate specific threats and vulnerabilities.
  • Apply information systems security concepts to mitigate the risk of software and systems vulnerabilities throughout the systems’ lifecycles.

Register for this course

US flag$940.00

Upgrade your Skills. Secure your Potential.

Our experts provide hands-on and on-demand training that helps IT and data security professionals meet today's cyber security challenges and prepares you for a successful future.

Training Schedule Contact Us