Certified Information Systems Security Professional (Online Self-Paced)
CISSP Online Self-Paced Training
Official ISC2 Online Self-Paced CISSP Training is a groundbreaking way to prep for certification that uses artificial intelligence to customize your learning journey. It pinpoints areas that require additional focus and guides you through your exam prep in a way that’s truly personalized.
Study smarter, not harder, with these key advantages:
- Personalized instruction – Content, pace and difficulty adapt to your individual knowledge, learning speed and confidence level.
- Enhanced engagement – Immediate feedback and dynamic content enable you to learn at an appropriate level.
- Time savings – Training time is optimized by focusing on areas that require the most review.
- Improved learning outcomes – The platform identifies areas requiring further review and provides targeted support to maximize your understanding of the content.
Certified Information Systems Security Professional (CISSP) training leverages the power of artificial intelligence, guiding students through a self-paced learning experience adapted to their unique needs. It covers the knowledge and skills for designing, developing, and managing the overall security posture of an organization.
Choose from these flexible learning options:
90-Day Access — Save 40% for a Limited Time!
Includes 90-day access to course content and Education Guarantee.
90-Day Access + Exam Bundle
Includes 90-day access to course content, an exam voucher and Education Guarantee.
180-Day Access + Exam Bundle
Includes 180-day access to course content, an exam voucher and Education Guarantee.
Exam Peace of Mind Protection
Get an extra confidence boost for exam day with Exam Peace of Mind Protection. If you need to sit a second time, you’re covered.
What’s included with each option:
- Self-paced online adaptive learning journey
- Data-driven analytics dashboard for real-time feedback on learner progress
- Robust search functionality to narrow topics
- Pre- and post-course assessments
- Knowledge checks and end-of-domain quizzes
- Digital eTextbook
- Interactive content
- Domain-by-domain study sheets with key points
- Email content support
- Online interactive flash cards
- Glossary of Terms
- 24/7/365 chat technical support
Education Guarantee: Learners who don’t pass the exam on their first attempt may access the same training again at no cost within one year from the end of the initial training. The education guarantee covers the cost of the second course.
Who Can Enroll?
CISSP training is for those seeking a comprehensive review to pursue CISSP certification. It is ideal for mid-level career security professionals with at least five years of experience in two or more of the domains listed below.
FAQs
What Is Covered?
- Domain 1: Security and Risk Management
- Domain 2: Asset Security
- Domain 3: Security Architecture and Engineering
- Domain 4: Communication and Network Security
- Domain 5: Identity and Access Management
- Domain 6: Security Assessment and Testing
- Domain 7: Security Operations
- Domain 8: Software Development Security
What Will You Learn?
- Apply the fundamental concepts and methods related to the fields of information technology and security.
- Align the overall organizational operational goals with security functions and implementations.
- Determine how to protect assets of the organization as they go through their life cycle.
- Leverage the concepts, principles, structures, and standards used to design, implement, monitor, and secure operating systems, equipment, networks, applications, and those controls used to enforce various levels of confidentiality, integrity, and availability.
- Apply the security design principles to select appropriate mitigations for vulnerabilities present in common information system types and architectures.
- Explain the importance of cryptography and the security services it can provide in today's digital and information age.
- Evaluate the physical security elements relative to information security needs.
- Evaluate the elements that comprise communication and network security relative to information security needs.
- Leverage the concepts and architecture that define the associated technology and implementation systems and protocols at Open Systems Interconnection (OSI) model layers 1–7 to meet information security needs.
- Determine the appropriate access control models to meet business security requirements.
- Apply the physical and logical access controls to meet information security needs.
- Differentiate between primary methods for designing and validating test and audit strategies that support information security requirements.
- Apply the appropriate security controls and countermeasures to optimize an organization's operational function and capacity.
- Assess the information systems risks to an organization's operational endeavors.
- Determine the appropriate controls to mitigate specific threats and vulnerabilities.
- Apply the information systems security concepts to mitigate the risk of software and systems vulnerabilities throughout the systems' life cycles.
Languages Offered
At this time, content is only available in English.
Cancellation Policy
Refunds for any ISC2 courses will not be provided.
Requisites
Learners must meet these requisites to earn their certificate:
- Complete and pass each domain with a score of 70% or higher (includes all knowledge checks and the end-of-domain assessment).
- Complete the Learner Acknowledgement, verifying you are enrolled and authorized to take the final assessment.
- Complete and pass the final assessment with a score of 70% or higher.
- Complete the course evaluation survey.
Validity
Certificates are valid for three years from the date issued.
Certificate Use
A certificate of completion is awarded to learners who meet the requisites, successfully finish their final assessment. Although a certificate can be used to prepare for professional certification, the certificate of completion does not demonstrate competency, establish expertise, or imply licensing or accreditation in a field.
Earned CPEs for Certificate Holders
Official ISC2 online training qualifies for Continuing Professional Education (CPE) credits. See the ISC2 CPE Handbook and ISC2 CPE Opportunities for details.
Technology Requirements
The following are system requirements needed to enhance your overall learning experience. A stable and continuous internet connection is required. In order to record your completion of the online learning courses, please ensure you are connected to the internet at all times while taking the course.
Hardware Specifications
- Processor 2 GHz +
- RAM 4 GB +
- Monitor minimum resolution (1024 x 768)
- Video card
- Keyboard and mouse or other assistive technology
Computer Peripherals
- Speakers/headphones (noise-cancelling headset is recommended)
- Microphone
- Camera (recommended)
Supported Operating Systems
- Macintosh OS X 10.10 to present
- Windows 10 to present
Supported Browsers
- Google Chrome
- Microsoft Edge
- Mozilla Firefox
Application Software
- Adobe Reader: https://get.adobe.com/reader/