(0)
1-855-732-3348
+
Learn About Our CCSK X CCSP Training Week

Official ISC2 Self-Paced Training for the CISSP

CISSP Logo

The Official ISC2 CISSP Self-Paced is an interactive online, on demand comprehensive review of information systems security concepts and industry best practices, covering the eight domains of the CISSP Common Body of Knowledge (CBK).

Register Now

About the Course+ Show

Often referred to as the ‘gold standard’, the Certified Information Systems Security Professional (CISSP) is the most globally recognized certification in the information security sector. CISSP validates an information security professional’s deep technical and managerial knowledge and experience to effectively design, engineer, and manage the overall security posture of an organization.

 

Students will gain knowledge in information security that will increase their ability to successfully implement and manage security programs in any organization or government entity. The goal of this content is to provide students with the core knowledge necessary to be successful security professionals. This training course will help candidates review and refresh their information security knowledge in pursuit of the CISSP exam.


What's Included+ Show

This is an interactive online self-paced course offering the learner the flexibility to work through the content and activities at their own pace over a 180-day period. The estimated time to complete the course is 40 hours. 

 

With the purchase of Official ISC2CISSP Self-Paced Training, each learner will receive the following: 

 

180 Days Access to Official ISC2 Course Content: 

 

  • Official ISC2 Student Training Guide (electronic format)
  • 15+ Hours of Multimedia Content
  •  9 Applied Scenario Activities
  •  71 Content-Specific Activities
  •  End-of-Chapter Quizzes with Answer Feedback
  •  180-Question Post-Course Assessment with Answer Feedback
  •  Interactive Online Flashcards
  •  Glossary
  •  24 x 7 x 365 Chat Technical Support
  •  Instructor Email Support
  • CISSP Study Group
  • Official ISC2 Certificate of Completion
  • Course Completion Badge

 

The Intrinsec Added Advantage  

  • ISC2 CISSP Certified Cloud Security Professional Official Study Guide, Hard Copy 
  • ISC22CISSP Certified Cloud Security Professional Official Practice Tests, Hard Copy 
  • Pearson VUE Exam Support 
  • ISC2 Preferred Partner CPE Submission Program 
  • Post Class Instructor Email Support

*Official ISC2 CISSP exam voucher is NOT included.

You will have the option to purchase an Official CISSP Certification Exam Voucher once you are at the checkout page.  The exam voucher cost is $749 for 1 attempt and is valid for one year from the purchase date.  

 

Education Guarantee 

**Education Guarantee: If you do not pass the CISSP exam on your first attempt after taking our training course, you can take this self-paced training course again at no cost to you (within one year from the end of the training seminar). The Education Guarantee covers the cost of the second self-paced training course. You will have to pay the full price for your second attempt at the exam.


Course Syllabus+ Show

This interactive online self-paced training provides a comprehensive review of information systems security concepts and industry best practices, covering the following eight domains of the CISSP Common Body of Knowledge (CBK): 

 

  • Domain 1 | Security and Risk Management
  • Domain 2 | Asset Security
  • Domain 3 | Security Architecture and Engineering
  • Domain 4 | Communication and Network Security
  • Domain 5 | Identity and Access Management (IAM)
  • Domain 6 | Security Assessment Testing
  • Domain 7 | Security Operations
  • Domain 8 | Software Development Security

Common Questions+ Show

How this Course Works 

This is an interactive online self-paced course offering the learner the flexibility to work through the content and activities at their own pace over a 180-day period. The estimated time to complete the course is 40 hours. 

 

Content will be taught using a series of lecture-based videos, audio presentations, interactive exercises, readings, and assessments. In addition to viewing audio and video lectures, learners will be asked to work through and complete activities. 

 

Materials 

All materials are included in the course. 

 

Access to course content 

180 days 

 

Language

Course content is offered in English. 

 

Course Type 

Self-Paced – Online go-at-your-own-pace training with interactive study materials, no instructor, and available 24/7 

 

Learner Support 

(ISC)2 Authorized instructors are available via email to help learners with content-related questions as they work through the course. Learners will receive responses to inquiries within 48 hours. Additional details are provided in the course. 

 

Requirements for Completion 

In order to complete the course, receive a certificate of completion, and earn (ISC)2 continuing professional education (CPE) credits learners must: 

  • Complete all learning activities within the course. 
  • Complete a course evaluation. 
  • Score 70% or higher on the end-of-chapter quizzes and final assessment. 

Education Guarantee  

We want our candidates to successfully pass their certification exam and achieve their goal of earning an (ISC)² credential.  Included with this course is the (ISC)2 Education Guarantee.  If you do not pass the exam after completing our training seminar, you can take a second self-paced training seminar at no cost to you (within one year from the end of the initial seminar).  The Education Guarantee covers the cost of the second course only. You will have to pay the full price for your second attempt at the exam. Initial exam results letter required.  

 

Technology Requirements 

The following are system requirements needed to enhance your overall learning experience. 

A stable and continuous internet connection is required. In order to record your completion of the online learning courses, please ensure you are connected to the internet at all times while taking the course. 

 

Hardware Specifications 

  • Processor 2 GHz + 
  • RAM 4 GB + 
  • Monitor minimum resolution (1024 x 768) 
  • Video Card 
  • Keyboard and Mouse or other assistive technology

Computer Peripherals 

  • Speakers/Headphones – (Noise-cancelling headset is recommended) 
  • Microphone 
  • Camera 

Supported Operating Systems 

  • Macintosh OS X 10.10 to present 
  • Windows 10 to present 

Supported Browsers 

  • Google Chrome 
  • Microsoft Edge 
  • Mozilla Firefox 

Application Software 

Adobe Readers: https://get.adobe.com/reader/ 

 

Certificate of Completion 

An electronic Certificate of Completion will be provided once you have completed the course by meeting all the requirements. We recommend that you download and retain the certificate of completion as proof of credits earned. 

To download a PDF version of the certificate, go to the “Awards” tab of (ISC)2Learn (top menu), select the course, and then “Generate Certificate”. 

 

CPE Credits 

CPE credits earned for this course may be eligible for continuing professional education credits for non-(ISC)² certifications. Please visit the continuing education requirements established by the credentialing organization for eligibility. 

For specific questions related to your CPE credits or the CPE portal please contact member support – at membersupport@isc2.org. 

 

Purchasing 

If you want to purchase this course on behalf of someone else or are interested in quantity discounts, please contact us: 

Email: info@intrinsecsecurity.com  or call Phone: +1-855-732-3348   

 

Cancellation Policy 

Refunds for any (ISC)2 self-paced courses will not be provided. 

 

Have more questions? Read our Frequently Asked Questions page or simply send your questions to us directly via our Contact Us page or our Live Chat and we will be more than happy to assist with any and all questions!


Who Should Attend+ Show

This course is designed for information security professionals with deep technical and managerial knowledge and experience to effectively design, engineer, and manage the overall security posture of an organization. 

 

Prior to taking this course, the learner should have experience, skills, or knowledge obtained while serving one of the following roles: 

 

  • Chief Information Officer
  • Chief Information Security Officer
  • Chief Technology Officer
  • Compliance Manager/ Officer
  • Director of Security
  • Information Architect
  • Information Manager / Information Risk Manager or Consultant
  • IT Specialist/Director/Manager
  • Network/System Administrator
  • Security Administrator
  • Security Architect / Security Analyst
  • Security Consultant
  • Security Manager
  • Security Systems Engineer/ Security Engineer

Learning Objectives+ Show

At the end of this course, learners will be able to: 

 

  • Apply fundamental concepts and methods related to the fields of information technology and security.
  • Align overall organizational operational goals with security functions and implementations.
  • Determine how to protect the assets of the organization as they go through their lifecycle.
  • Leverage the concepts, principles, structures, and standards used to design, implement, monitor, and secure operating systems, equipment, networks, applications, and those controls used to enforce various levels of confidentiality, integrity, and availability.
  • Apply security design principles to select appropriate mitigations for vulnerabilities present in common information system types and architectures.
  • Explain the importance of cryptography and the security services it can provide in today’s digital and information age.
  • Evaluate physical security elements relative to information security needs.
  • Evaluate the elements that comprise communication and network security relative to information security needs.
  • Leverage the concepts and architecture that define the associated technology and implementation systems and protocols at Open Systems Interconnection (OSI) model layers 1–7 to meet information security needs.
  • Determine appropriate access control models to meet business security requirements.
  • Apply physical and logical access controls to meet information security needs.
  • Differentiate between primary methods for designing and validating test and audit strategies that support information security requirements.
  • Apply appropriate security controls and countermeasures to optimize an organization’s operational function and capacity.
  • Assess information systems risks to an organization’s operational endeavors.
  • Determine appropriate controls to mitigate specific threats and vulnerabilities.
  • Apply information systems security concepts to mitigate the risk of software and systems vulnerabilities throughout the systems’ lifecycles.

Register for this course

US flag$940.00

Upgrade your Skills. Secure your Potential.

Our experts provide hands-on and on-demand training that helps IT and data security professionals meet today's cyber security challenges and prepares you for a successful future.

Training Schedule Contact Us