(0)
1-855-732-3348
+
Learn About Our CCSK X CCSP Training Week

Official (ISC)² Self-Paced Training for the CISSP | ISSAP

The Official (ISC)² Self-Paced Training for the CISSP | ISSAP is an interactive online, comprehensive review of information systems security concepts and industry best practices, covering the six domains of the CISSP | ISSAP Common Body of Knowledge (CBK).

Register Now

About the Course+ Show

The CISSP | ISSAP Concentration is specific to information security architecture. Earning this certification demonstrates your knowledge in developing, designing, and analyzing security solutions.

 

Students will learn the technical aspects of security architecture, including identity and access management, infrastructure and application security, governance and compliance, security operations, and security architecture modeling.


What's Included+ Show

This is an interactive online self-paced course offering the learner the flexibility to work through the content and activities at their own pace over a 180-day period. The estimated time to complete the course is 40 hours.

 

Content will be taught using a series of lecture-based videos, audio presentations, interactive exercises, readings, and assessments. In addition to viewing audio and video lectures, learners will be asked to work through and complete activities:

 

180 Days Access to Official (ISC)²  course content        

 

  • Approximately 14 hours of multimedia learning resources (videos, narrated power points, scenarios, etc.)
  • 15 Applied Scenarios demonstrating real-world application of concepts taught in the course
  • 40 Content Specific Activities
  • End of Chapter Quizzes and Answers
  • Online Interactive Flash Cards
  • Post-Course Assessment Questions
  • Instructor Email Support
  • 24x7x365 Chat Technical Support
  • ISSAP Study Group
  • Official (ISC)2 Certificate of Completion
  • Course Completion Badge
  • Education Guarantee (see below for details)

The Intrinsec Added Advantage

  • Official (ISC)² Guide to the ISSAP CBK, Hard Copy
  • Pearson VUE Exam Support
  • (ISC)² Preferred Partner CPE Submission Program

Pearson VUE ISSAP Certification Exam Voucher can be added at registration checkout.  The exam voucher cost is $599 for 1 attempt and is valid for one year from purchase.

 

**Education Guarantee: If you do not pass the ISSAP exam on your first attempt after taking our training course, you can take this self-paced training course again at no cost to you (within one year from the end of the training seminar). The Education Guarantee covers the cost of the second self-paced training course. You will have to pay the full price for your second attempt at the exam.


Course Syllabus+ Show

This interactive online self-Paced course provides a deep understanding of the broad spectrum of topics included in the CBK and addresses new threats, technologies, regulations, standards, and practices. This self-paced training covers the following six domains of the CISSP | ISSAP CBK:

 

  • Domain 1 | Architect for Governance, Compliance, and Risk Management
  • Domain 2 | Security Architecture Modeling
  • Domain 3 | Infrastructure Security Architecture
  • Domain 4 | Identity and Access Management (IAM) Architecture
  • Domain 5 | Architect for Application Security
  • Domain 6 | Security Operations Architecture

Common Questions+ Show

How this Course Works 

This is an interactive online self-paced course offering the learner the flexibility to work through the content and activities at their own pace over a 180-day period. The estimated time to complete the course is 40 hours.

Content will be taught using a series of lecture-based videos, audio presentations, interactive exercises, readings, and assessments. In addition to viewing audio and video lectures, learners will be asked to work through and complete activities.

 

Materials 

All materials are included in the course.

 

Access to course content 

180 days

 

Language

Course content is offered in English.

 

Course Type 

Self-Paced – Online go-at-your-own-pace training with interactive study materials, no instructor, and available 24/7

 

Learner Support 

(ISC)2 Authorized instructors are available via email to help learners with content-related questions as they work through the course. Learners will receive responses to inquiries within 48 hours. Additional details are provided in the course.

 

Requirements for Completion 

In order to complete the course, receive a certificate of completion, and earn (ISC)2 continuing professional education (CPE) credits learners must:

  • Complete all learning activities within the course.
  • Complete a course evaluation.
  • Score 70% or higher on the end-of-chapter quizzes and final assessment.

Education Guarantee  

We want our candidates to successfully pass their certification exam and achieve their goal of earning an (ISC)² credential.  Included with this course is the (ISC)2 Education Guarantee.  If you do not pass the exam after completing our training seminar, you can take a second self-paced training seminar at no cost to you (within one year from the end of the initial seminar).  The Education Guarantee covers the cost of the second course only. You will have to pay the full price for your second attempt at the exam. Initial exam results letter required.

 

Technology Requirements

The following are system requirements needed to enhance your overall learning experience.

A stable and continuous internet connection is required. In order to record your completion of the online learning courses, please ensure you are connected to the internet at all times while taking the course.

 

Hardware Specifications 

  • Processor 2 GHz +
  • RAM 4 GB +
  • Monitor minimum resolution (1024 x 768)
  • Video Card
  • Keyboard and Mouse or other assistive technology.

Computer Peripherals 

  • Speakers/Headphones – (Noise-cancelling headset is recommended)
  • Microphone
  • Camera

Supported Operating Systems 

  • Macintosh OS X 10.10 to present
  • Windows 10 to present

Supported Browsers

  • Google Chrome
  • Microsoft Edge
  • Mozilla Firefox

Application Software 

Adobe Readers: https://get.adobe.com/reader/

 

Certificate of Completion 

An electronic Certificate of Completion will be provided once you have completed the course by meeting all the requirements. We recommend that you download and retain the certificate of completion as proof of credits earned.

To download a PDF version of the certificate, go to the “Awards” tab of (ISC)2Learn (top menu), select the course, and then “Generate Certificate”.

 

CPE Credits 

CPE credits earned for this course may be eligible for continuing professional education credits for non-(ISC)² certifications. Please visit the continuing education requirements established by the credentialing organization for eligibility.

For specific questions related to your CPE credits or the CPE portal please contact member support – at membersupport@isc2.org.

 

Purchasing 

If you want to purchase this course on behalf of someone else or are interested in quantity discounts, please contact us:

Email: info@intrinsecsecurity.com  or call Phone: +1-855-732-3348

 

Cancellation Policy 

Refunds for any (ISC)2 self-paced courses will not be provided.

Have more questions? Read our Frequently Asked Questions page or simply send your questions to us directly via our Contact Us page or our Live Chat and we will be more than happy to assist with any and all questions!


Who Should Attend+ Show

The CISSP | ISSAP is a CISSP who specializes in designing security solutions and providing management with risk-based guidance to meet organizational goals. ISSAPs facilitate the alignment of security solutions within the organizational context (e.g., vision, mission, strategy, policies, requirements, change, and external factors).

 

Prior to taking this course, the learner should have the following experience, skills, or knowledge obtained while serving in the following roles:

 

  • System Architect
  • Chief Technology Officer
  • System and Network Designer
  • Business Analyst
  • Chief Security Officer

Learning Objectives+ Show

At the end of this course, learners will be able to:

 

  • Create an Information Security Architecture that meets the requirements of governance, compliance, and risk management.
  • Evaluate Security architecture models and frameworks
  • Develop an infrastructure security program.
  • Produce an identity and access management architecture.
  • Integrate security principles into application development.
  • Design a security operations architecture.

Register for this course

US flag$2,650.00

Upgrade your Skills. Secure your Potential.

Our experts provide hands-on and on-demand training that helps IT and data security professionals meet today's cyber security challenges and prepares you for a successful future.

Training Schedule Contact Us