We may earn an affiliate commission when you visit our partners.
Course image

CISSP is the gold standard for security certifications. It covers the breadth of information security’s deep technical and managerial concepts. Learning to effectively design, engineer, and manage the overall security posture of an organization. This course covers Domain 1 - Security and Risk Management. This domain is one of the most important domains in the CISSP exam. It lays the foundation, covering security concepts that all the other domains build upon. Understanding exactly what security means and the core concepts around assessing and managing the wide array of risks we face is fundamental to every domain in the CISSP. Domain 2 - Asset Security. An asset is anything we value. When we have highly valued assets, such as sensitive data, securing those assets throughout their lifecycle is paramount. We will learn about data standards, classification, regulations, retention, and controls to protect organizational value. Domain 3 - Security Engineering. Engineering is about understanding and designing systems that work. Security is a fundamental part of any well-designed system. This domain will help you understand the engineering lifecycle and various models and security components required in data structures and physical facilities. We also learn how cryptography fits in to information security. Domain 4 - Communication and Network Security. Information is not just stored; it is also transmitted and must be secured in transit. Understanding networking models, protocols, hardware components, and possible attack vectors is vital to information security. It is one of the most important domains on the CISSP exam. Domain 5 - Identity and Access Management. Controlling who can access valuable resources can lead to proper confidentiality, integrity, and availability. A CISSP must understand mechanisms and techniques to verify a subject’s authenticity before authorizing access. They must be able to assure that only proper interactions have occurred and mitigate potential attacks. Domain 6 - Security Assessment and Testing. Understanding the effectiveness of your security measures is vital. As you collect and review logs, verify software development security, and undergo security audits and certification you can have some assurance and insight into your security status and needs. Domain 7- Security Operations. From incident response that involves investigation of evidence to facility access management and disaster recovery planning, testing, and implementation, this domain requires putting security principles and concepts into practice. Domain 8 - Security in the Software Development Life Cycle. Many of the most publicized security issues have stemmed from flaws in the software code. While a CISSP does not have to be a software developer, they must understand and be able to communicate software development security needs. In this domain you will learn important terminology and concepts of software development.

Enroll now

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Teaches CISSP certification preparation through eight different domains of information security, suitable for beginners and intermediate learners
Taught by instructors with extensive experience in information security and CISSP certification, which can be valuable to learners
Designed to provide a strong foundation in information security and risk management concepts, beneficial for those new to the field
Covers the latest industry standards and regulations for data protection and security, ensuring learners are up-to-date
Provides practical examples and case studies to help learners understand the application of information security concepts in real-world scenarios
Requires learners to come in with some foundational knowledge in information security, which could be a barrier for complete beginners

Save this course

Save CISSP - The Complete Exam Guide to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in CISSP - The Complete Exam Guide with these activities:
Review networking concepts
Refresh your knowledge of networking concepts to enhance your understanding of Domain 4.
Browse courses on Networking
Show steps
  • Review your notes from previous networking courses.
  • Read articles or watch videos on networking basics.
Read the study guide
Supplement classroom time with this recommended text that covers everything you need to know for the CISSP exam.
Show steps
  • Read each of the chapters.
  • Take notes.
  • Do review questions.
Volunteer at a cybersecurity organization
Gain practical experience and network with professionals in the cybersecurity field.
Browse courses on Cybersecurity
Show steps
  • Find volunteer opportunities at local cybersecurity organizations.
  • Inquire about opportunities that align with your interests.
Show all three activities

Career center

Learners who complete CISSP - The Complete Exam Guide will develop knowledge and skills that may be useful to these careers:
Security Engineer
Security Engineers design, implement, and maintain security systems for organizations. This course can provide a foundation for those interested in this role, covering topics such as security engineering, assessment, and software development security.
Information Security Analyst
Information Security Analysts plan and carry out security measures to protect an organization's computer networks and systems. This course can help individuals develop the skills needed to identify and respond to security threats.
Security Manager
Security Managers plan and carry out security measures to protect an organization's computer networks and systems. This course can be helpful for those looking to advance in this role, covering topics such as security risk management, assessment, and operations.
Security Architect
Security Architects design, implement, and maintain security systems for organizations. By covering security engineering and assessment, this course can help learners develop the knowledge and skills needed to excel in this role.
Chief Information Security Officer
Chief Information Security Officers (CISOs) play a leading role in the development and implementation of information security policies and procedures. Those who enroll in CISSP can further their knowledge of security concepts and models, as well as how to assess and manage risks.
Security Consultant
Security Consultants assess an organization's security needs and make recommendations for improvement. This course can help individuals develop the skills needed to identify and address security vulnerabilities.
Penetration Tester
Penetration Testers identify and exploit vulnerabilities in computer systems and networks to assess their security. This course can provide a foundation for those interested in this role, covering topics such as security assessment, testing, and risk management.
Software Developer
Software Developers design, develop, and maintain software applications. While this course does not teach software development, it can be beneficial for Software Developers interested in specializing in software security.
Security Policy Analyst
Security Policy Analysts develop and implement security policies and procedures for organizations. This course can help individuals develop the skills needed to understand and manage security risks.
Incident Responder
Incident Responders investigate and respond to security incidents. This course can help individuals develop the skills needed to identify and address security threats.
Compliance Analyst
Compliance Analysts ensure that an organization's policies and procedures are in compliance with applicable laws and regulations. This course may be beneficial for those interested in this role, as it covers topics such as security risk management, assessment, and operations.
IT Auditor
IT Auditors assess the effectiveness of an organization's internal controls and provide recommendations for improvement. This course may be helpful for those interested in this role, as it covers topics such as security risk management, assessment, and operations.
Privacy Analyst
Privacy Analysts ensure that an organization's data collection and use practices are in compliance with applicable laws and regulations. This course may be beneficial for those interested in this role, as it covers topics such as asset security, risk management, and security assessment.
Information Assurance Analyst
Information Assurance Analysts assess and evaluate the security of an organization's information systems. This course can provide a foundation for those interested in this role, covering topics such as security assessment, testing, and management.
Security Administrator
Security Administrators implement and maintain security measures for organizations. This course can help individuals develop the skills needed to understand and manage security risks.

Reading list

We've selected 15 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in CISSP - The Complete Exam Guide.
Is the official study guide for the CISSP exam. It covers all of the domains that are tested on the exam, and it valuable resource for anyone who is preparing for the CISSP.
Classic work on security engineering and covers a wide range of topics, including system design, threat modeling, and cryptography. It must-read for anyone who wants to build secure systems.
Comprehensive study guide for the CISSP exam. It covers all of the domains that are tested on the exam, and it includes practice questions and exercises.
This document comprehensive guide to security and privacy controls for federal information systems and organizations. It valuable resource for anyone who is responsible for securing information systems.
Is considered the official study guide for the CISSP exam and is written by experts in the field. It covers all eight domains of the CISSP exam and provides practice questions and simulations that provide a good baseline for what to expect on the exam.
Provides a comprehensive overview of the CISSP exam. It covers all eight domains of the exam and provides practice questions and simulations that provide a good baseline for what to expect on the exam.
Comprehensive study guide for the CISSP exam. It covers all of the domains that are tested on the exam, and it includes practice questions and exercises.
Provides a comprehensive overview of communication and network security. It covers topics such as network protocols, cryptography, and intrusion detection. It good resource for both beginners and experienced practitioners.
Comprehensive study guide for the CISSP exam. It covers all of the domains that are tested on the exam, and it is written in a clear and concise style.
Comprehensive guide to cryptography and network security. It covers all of the key topics that are tested on the CISSP exam, and it valuable resource for anyone who is responsible for designing and implementing secure systems.
Comprehensive guide to malware analysis. It covers all of the key topics that are tested on the CISSP exam, and it valuable resource for anyone who is responsible for detecting and responding to malware attacks.
Comprehensive guide to incident response and computer forensics. It covers all of the key topics that are tested on the CISSP exam, and it valuable resource for anyone who is responsible for responding to and investigating security incidents.
Comprehensive guide to the human element of security. It covers all of the key topics that are tested on the CISSP exam, and it valuable resource for anyone who is responsible for designing and implementing security controls.
Comprehensive guide to social engineering. It covers all of the key topics that are tested on the CISSP exam, and it valuable resource for anyone who is responsible for designing and implementing security controls.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to CISSP - The Complete Exam Guide.
Certified Information Systems Security Professional...
Most relevant
Exam Review and Tips for CISSP®
Most relevant
Software Development Security for CISSP®
Most relevant
CompTIA Cloud+: Security
Most relevant
Risk Management: Use of Access Controls to Protect Assets
Most relevant
CompTIA Cloud+: Security
Most relevant
Security and Risk Management: Principles of Risk for...
Most relevant
Identity and Access Management (IAM) for CISSP®
Most relevant
Security Operations: Operations Management for CISSP®
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser