• Home
  • Course Catalog
  • Contact Us
    Best seller

    Certified Information Systems Security Professional

    1 Students Enrolled
    1 Students Enrolled

    Additional information

    Hours: 250
    Duration: 12 months

    Language: English

    Data sheet

    Certification included

    To request more information, you can contact us via online chat, our website contact form, or toll free at 1-855-201-6910.

    Online courses are accessible 24/7/365 and self-paced, allowing you to progress at your own pace on your own schedule. They can be taken from anywhere in the world from the comfort of your own home. Classroom courses have a set schedule of the days and times the courses will be held, and you must attend during those specific times.

    Find out if online learning is right for you by contacting our team of registration advisers. Our team is available to answer any of your questions about taking an online course before you commit to enrolling. We will walk you through what to expect to ensure you are making the right decision. You can contact a registration adviser today via online chat, our website contact form, or toll free at 1-855-201-6910.

    No, you are not required to have a diploma or higher education degree to enroll in an online course. However, some occupations may require minimum educational thresholds for employment or certification. For more information on your desired career requirements, please contact us via online chat, our website contact form, or toll free at 1-855-201-6910.

    To take an online course, you will need to have access to an internet connection and an internet ready device such as a laptop, PC, or tablet. For course specific requirements, please visit the course page or contact a registration adviser today.

    Our courses are developed with multiple formats including text, audio, video, and interactivity. Our courses also include multiple resources and tools which can include flashcards, games, activities, and more.

    No, you can take the online courses from anywhere in the world.

    We participate in several financial assistance options including third party funding, both military and non-military. To request more information on the financial assistance options available and check your eligibility, contact us via online chat, our website contact form, or toll free at 1-855-201-6910.

    Duration is the amount of time you will receive access to your course. Durations vary by course and range between 1 month and 12 months. If you complete your course before your duration ends you will continue to have access to your course until the duration period ends.

    Many of our career training programs include certification vouchers. This means that at the successful completion of your course, at no additional charge, you will receive an exam voucher for the corresponding industry certification. This voucher will allow you to register and sit for the appropriate certification exam to obtain your industry credential.

    Our online courses are open enrollment, so you can start immediately. If you are using any third-party funding to cover your course tuition, your start date may be a future date determined by your funding program.

    Once enrolled, you will be assigned a client adviser who will provide you with customer and technical support. Your client adviser will supply you with your course access information, any needed materials, and be available to answer any questions you have during your training experience. They will regularly check-in with you to monitor your progress and assist you with staying on track. You will also be assigned to a course mentor who will provide curriculum support throughout your training. Your mentor is available to answer any questions you have on your course curriculum, will monitor your progress and understanding of the curriculum, and may give assignments or quizzes.

    If you experience any trouble accessing your course including technical issues or lost login credentials, please contact your client adviser at helpdesk@worldeducation.net.

    We strive to provide a fully online experience for students however some of our training courses include physical materials or equipment. Courses that have materials shipped directly to students will be shipped within 7 business days of registration. Some training courses have material for different sections and these courses may require multiple shipments as you completed stages of your course.

    Our goal for students is to successfully complete their training course and achieve their career goals. We understand that extenuating circumstances can interfere with your ability to complete your course in the duration given. Because of this we have free or low-cost extensions available for our courses upon request. To discuss or request an extension please contact your client adviser at helpdesk@worldeducation.net.

    Upon successful completion of your course and fulfillment of any outstanding financial obligations, you will receive your certificate of completion. Certificates are provided to you within 30 days of completion. Your certificate will validate the training course you completed with a stamp of completion.

    Students that successfully complete our career training programs are assigned a career development adviser who will coordinate placement at a local externship or hands on opportunity. These opportunities are optional and may vary based on availability and occupation. Your career development adviser will also provide job search services such as: resume building, mock interviews, job opportunity resources, and more. Our professional enrichment courses do not come with a career adviser or career services.

    Program Description

    This assessment-rich Certified Information Systems Security Professional (CISSP) program is ideal for IT professionals interested in IS security. Throughout the course, you’ll be provided the knowledge and skills necessary to manage cybersecurity with command over ISC² Common Body of Knowledge. During this course: • You’ll study the eight domains required for proficiency in IS security. • You’ll learn using six different scenarios based on real-world cybersecurity problems. • All the scenarios are self-paced and include interactive games, expert videos, assessments, quizzes, real-world problems, and focused instruction. After successful completion of this program, you will be able to: • Understand control systems and their methodology • Comprehend security models architecture • Develop business continuity and disaster recovery plans • Understand critical aspects of security practices and management • Analyze key concepts of telecommunications and network security • Understand the role of monitoring, auditing, and detection in IS • Apply the practical steps for a digital forensics’ investigation • Understand the software development life cycle • Comprehend the role of databases in information security • Identify various software-based and network attacks Get certified! After completing this course, you’ll be prepared to take the CISSP exam. The certification exam fee is already included in the tuition fee of the course!

    Learning Objectives

    Upon successful completion of this program, you will be able to: • Comprehend control systems and methodology • Identify security architecture and models • Recognize business continuity planning and disaster recovery planning • Recognize key aspects of security management and practices • Identify key concepts of telecommunications and networking security • Discuss the role of auditing, monitoring, and detection in information security • Learn the steps of a digital forensics investigation • Explain the software development life cycle • Discuss the role of databases in information security • Recognize several software-based and network attacks

    Courses Included

    • Certified Information Systems Security Professional
    • Certified Information Security Systems Professional (CISSP) Exam Prep
    • CyberSecurity Scenarios


    CISSP Module 1 - Security and Risk Management • Confidentiality, Integrity and Availability • Security Governance • Effective Security Program • Compliance • Global Legal and Regulatory Issues • Manage Personnel Security • Risk Management Concepts • Threat Modeling • Acquisitions Strategy and Practice • Security Education CISSP Module 2 - Asset Security • Data Management • Data Standards • Longevity and Use • Asset Management • Protect Privacy • Ensure Appropriate Retention • Data Security Controls • Standards Selection • Classify Information CISSP Module 3 - Security Engineering • Fundamental Concepts of Security Models • Information Systems Security Evaluation Models • Vulnerabilities of Security Architecture • Vulnerabilities in Mobile Systems • Database Security • The Application and Use of Cryptography • Site and Faculty Design Considerations • Site Planning • Implementation and Operation of Facilities Security CISSP Module 4 - Communications and Network Security • Secure Network Architecture and Design • Implications of Multi-Layer Protocols • Converged Protocols • Wireless Security Issues • Securing Network Components • Secure Communication Channels • Remote Access • Scanning Techniques • Network Attacks CISSP Module 5 - Identity and Access Management • Physical and Logical Access to Assets • Identification and Authentication of People and Devices • Identity Management Implementation • Identity as a Service (IDaaS) • Integrate Third-Party Identity Services • Implement and Management Authorization Mechanisms • Prevent or Mitigate Access Control Attacks • Identity and Access Provisioning Lifecycle CISSP Module 6 - Security Assessment and Testing • Assessment and Test Strategies • Software Development • Log Reviews • Synthetic Transactions • Code Review and Testing • Negative Testing/Misuse Case Testing • Interface Testing • Collect Security Process Data • Internal and Third-Party Audits • SOC Reporting Options CISSP Module 7 - Security Operations • Investigations • Configuration Management • Foundational Security Operations Concepts • Resource Protection • Incident Response • Patch and Vulnerability Management • Change and Configuration Management • The Disaster Recovery Process • Test Plan Review • Access Control CISSP Module 8 - Security in the Software Development Life Cycle • Software Development Security Outline • Environment and Security Controls • Security of the Software Environment • Malware Protection • Maturity Models • Software Protection Mechanisms • Assess the Effectiveness of Software Security • Assess Software Acquisition Security



    While there are no specific prerequisites for this course, it is recommended that students have a comfortable familiarity with computers and the internet, and will benefit if they have some knowledge of IT operations.


    • Official (ISC)2 Guide to the CISSP CBK

    Technical Requirements

    All required reference materials are provided with this program. Technical requirements: Internet Connection • Broadband or High-Speed (DSL, Cable, Wireless) Hardware Requirements • Processor - 2GHz Processor or Higher • Memory - 1 GB RAM Minimum Recommended Software Requirements • Operating Systems - Windows 7, 8 or 10; Mac OS x 10 or higher • Microsoft Office 2007, 2010 or 2013 or a Word Processing application to save and open Microsoft Office formats (.doc, .docx, .xls, .xlsx, .ppt, .pptx) • Internet Browsers - Google Chrome is highly recommended • Cookies MUST be enabled • Pop-ups MUST be allowed (Pop-up Blocker disabled) • Adobe PDF Reader


    This program includes CISSP Certification Practice Exams and a voucher for the CISSP Certification! The vendor-neutral CISSP certification is the ideal credential for those with proven deep technical and managerial competence, skills, experience, and credibility to design, engineer, implement, and manage their overall information security program to protect organizations from growing sophisticated attacks. The CISSP is ideal for those working in positions such as, but not limited to: Security Consultant Security Manager IT Director/Manager Security Auditor Security Architect Security Analyst Security Systems Engineer Chief Information Security Officer Director of Security Network Architect Note: To obtain full CISSP credential candidates must have a minimum of five years previous experience. Candidates unable to meet the previous experience requirement will be given Associate level status and will be required to complete the experience requirements before removing associate status.


    • 100% Online, Self-Paced • Open Enrollment • Admissions and Student Support • Multimedia Rich and Interactive Content • Industry Certification Exam, when applicable • Hands-on Opportunity Upon Completion

    Career Services

    Students that successfully complete our career training are given a full years access to our modern day career services. With our career services, students are provided a multitude of career development tools to help launch their career quickly and successfully. These tools include:

    • Certification Exam Voucher and Registration Assistance (If Applicable)
    • Resume Building Assistance
    • Externship or Shadowing Placement
    • Career Coaching
    • Employer Skills Matching
    • And More!

    We are dedicated to serving our students on their unique career development journey. Whether you are transitioning to a new career, entering the workforce for the first time, or an experienced professional looking to climb the corporate ladder, our career services team can provide you with professional development tools applicable for any stage of your career.

    Write your review

    The following email wasn't used for buying this product