Information Systems Security Architecture Professional (Online Self-Paced)
ISSAP Online Self-Paced Training
Newly enhanced Official ISC2 Online Self-Paced ISSAP Training now aligns to the exam outline for a structured path that makes learning more intuitive. Learners progress through the course domain by domain with content that’s organized to cut confusion and be easy-to-follow.
Information Systems Security Architecture Professional (ISSAP) training guides students through a self-paced learning experience. It covers the advanced skills and knowledge that security architects use for developing, designing, and analyzing security solutions and providing risk-based guidance to meet organizational goals.
Exam Peace of Mind Protection
Get an extra confidence boost for exam day with Exam Peace of Mind Protection. If you need to sit a second time, you’re covered.
What’s included with each option:
- Online learning at your own pace
- Digital eTextbook
- Pre- and post-course assessments
- Knowledge checks and end-of-domain quizzes
- Key takeaway resources for each domain
- Glossary of Terms
- Email content support
- 24/7/365 chat technical support
Education Guarantee: Learners who don’t pass the exam on their first attempt may access the same training again at no cost within one year from the end of the initial training. The education guarantee covers the cost of the second course.
Who Can Enroll?
ISSAP training is for those seeking a comprehensive review to pursue ISSAP certification. It is ideal for professionals with at least seven years of work experience in two or more of the domains listed below.
FAQs
What Is Covered?
- Domain 1: Architect for Governance, Compliance, and Risk Management
- Domain 2: Security Architecture Modeling
- Domain 3: Infrastructure Security Architecture
- Domain 4: Identity and Access Management (IAM) Architecture
- Domain 5: Architect for Application Security
- Domain 6: Security Operations Architecture
What Will You Learn?
- Create an information security architecture that meets the requirements of governance, risk management, and compliance.
- Evaluate the security architecture models and frameworks.
- Develop an infrastructure security program.
- Produce an identity and access management architecture.
- Integrate security principles into applications development.
- Design a security operations architecture.
Languages Offered
At this time, content is only available in English.
Cancellation Policy
Refunds for any ISC2 courses will not be provided.
Requisites
Learners must meet these requisites to earn their certificate:
- Complete and pass each domain with a score of 70% or higher (includes all knowledge checks and the end-of-domain assessment).
- Complete the Learner Acknowledgement, verifying you are enrolled and authorized to take the final assessment.
- Complete and pass the final assessment with a score of 70% or higher.
- Complete the course evaluation survey.
Validity
Certificates are valid for three years from the date issued.
Certificate Use
A certificate of completion is awarded to learners who meet the requisites, successfully finish their final assessment. Although a certificate can be used to prepare for professional certification, the certificate of completion does not demonstrate competency, establish expertise, or imply licensing or accreditation in a field.
Earned CPEs for Certificate Holders
Official ISC2 online training qualifies for Continuing Professional Education (CPE) credits. See the ISC2 CPE Handbook and ISC2 CPE Opportunities for details.
Technology Requirements
The following are system requirements needed to enhance your overall learning experience. A stable and continuous internet connection is required. In order to record your completion of the online learning courses, please ensure you are connected to the internet at all times while taking the course.
Hardware Specifications
- Processor 2 GHz +
- RAM 4 GB +
- Monitor minimum resolution (1024 x 768)
- Video card
- Keyboard and mouse or other assistive technology
Computer Peripherals
- Speakers/headphones (noise-cancelling headset is recommended)
- Microphone
- Camera (recommended)
Supported Operating Systems
- Macintosh OS X 10.10 to present
- Windows 10 to present
Supported Browsers
- Google Chrome
- Microsoft Edge
- Mozilla Firefox
Application Software
- Adobe Reader: https://get.adobe.com/reader/