The CISSP® Exam Prep Course prepares test-takers for the Certified Information Systems Security Professional exam, as administered by the International Information System Security Certification Consortium (ISC)2. The CISSP® certification is recognized worldwide and adheres to the strict standards of ISO/IEC 17024. As security breaches outpace the available pool of security experts, the need for information security professionals with proper certifications will continue to grow. Among other titles, obtaining the CISSP® certification prepares one for a position as a Security Analyst, Chief Information Security Officer, or as a Security Architect.
This course contains two 120-question practice exams, which cover The International Information System Security Certification Consortium's eight domains.
Price: $995.00


    Quantity:
    This CISSP® Exam Prep Course, offered by our accredited school partners, prepares test-takers for the Certified Information Systems Security Professional exam, as administered by the International Information System Security Certification Consortium (ISC)2. The CISSP® certification is recognized worldwide and adheres to the strict standards of ISO/IEC 17024. As security breaches outpace the available pool of security experts, the need for information security professionals with proper certifications will continue to grow. Among other titles, obtaining the CISSP® certification prepares one for a position as a Security Analyst, Chief Information Security Officer, or as a Security Architect.

    This course contains two 120-question practice exams, which cover The International Information System Security Certification Consortium's eight domains:

    Asset Security
    Communications and Network Security
    Identity and Access Management
    Security and Risk Management
    Security Assessment and Testing
    Security Engineering
    Security Operations
    Software Development Security
    Learning Outcomes

    Discuss the foundational concepts of information security, such as the CIA triad
    Know the different information security frameworks
    Explain information security training and education
    Discuss the information life cycle
    Explain how information and data are classified
    Learn about data and information privacy
    Understand system and computer architecture
    Explain and compare symmetric and asymmetric cryptography
    Learn about physical security risks and mitigation
    Compare different types of networks
    Contrast the OSI model with the TCP/IP Model
    Identify and differentiate among network, routing, and data link protocols
    Describe the functions of common networking devices and how wireless networks work
    Evaluate different identification methods and technologies
    Assess and test various security controls
    Describe business continuity and disaster recovery plans
    Understand the role of security operations
    Identify trusted recovery techniques
    Relate the steps required in effective incident management
    Discuss the role of auditing, monitoring, and detection in information security
    Learn the steps of a digital forensics investigation
    Explain the software development life cycle
    Discuss the role of databases in information security
    Recognize several software-based and network attacks

    Enroll through one of our accredited university or college partners today!
    Learning Outcomes:
    Discuss the foundational concepts of information security, such as the CIA triad
    Know the different information security frameworks
    Explain information security training and education
    Discuss the information life cycle
    Explain how information and data are classified
    Learn about data and information privacy
    Understand system and computer architecture
    Explain and compare symmetric and asymmetric cryptography
    Learn about physical security risks and mitigation
    Compare different types of networks
    Contrast the OSI model with the TCP/IP Model
    Identify and differentiate among network, routing, and data link protocols
    Describe the functions of common networking devices and how wireless networks work
    Evaluate different identification methods and technologies
    Assess and test various security controls
    Describe business continuity and disaster recovery plans
    Understand the role of security operations
    Identify trusted recovery techniques
    Relate the steps required in effective incident management
    Discuss the role of auditing, monitoring, and detection in information security
    Learn the steps of a digital forensics investigation
    Explain the software development life cycle
    Discuss the role of databases in information security
    Recognize several software-based and network attacks
    All required reference materials are provided with this program. Technical requirements:

    Internet Connection
    • Broadband or High-Speed (DSL, Cable, Wireless)
    Hardware Requirements
    • Processor - 2GHz Processor or Higher
    • Memory - 1 GB RAM Minimum Recommended

    Software Requirements
    • Operating Systems - Windows 7, 8 or 10; Mac OS x 10 or higher
    • Microsoft Office 2007, 2010 or 2013 or a Word Processing application to save and open Microsoft Office formats (.doc, .docx, .xls, .xlsx, .ppt, .pptx)
    • Internet Browsers - Google Chrome is highly recommended
    • Cookies MUST be enabled
    • Pop-ups MUST be allowed (Pop-up Blocker disabled)
    • Adobe PDF Reader
    This class is an independent-study course. Students will have all the resources needed to successfully complete the course within the online material. A student helpdesk is available for technical support during the course enrollment.

    Product Type:
    Course
    Course Type:
    Professional Enrichment
    Level:
    Beginner
    Language:
    English
    Hours:
    70
    Duration:
    6 months
    Avg Completion:
    3 Months

      Get the support you need, when you need it

        • Our admissions advisors will help you identify career paths, accredited colleges, and funding solutions
        • Customer & Technical Support is available throughout your course experience via Live Chat, Phone, Email, and Text
        • Office hours are Monday through Friday, 8-5pm CT

      Stay on track to reach your completion goal

        • Scheduling and Time Management assistance tailored just for you
        • Active reminder notifications about important deadlines in your class
        • Join giveaway raffles for achieving course milestones

      Become Job-Ready: Career Training Programs ONLY

        • Take advantage of real-world experience outside of the classroom with an employer-based externship program
        • Work with a career counselor to schedule your certification exam (if applicable)
        • Complete an employer-ready resume with a career coach
        • Participate in live mock interviews and job guidance sessions

      Certified Information Security Systems Professional (CISSP) Exam Prep FAQs

      How do I request more information about a course?

      What is the difference between online courses and classroom courses?

      I'm not sure if I will be able to successfully take on online course, what should I do?

      Do I need a degree or high school diploma to take an online course?

      What do I need to take an online course?

      What format will my online course be in?

      Do I have to be local to take a course?

      Do you offer or accept any financial assistance options?

      What does the course duration mean?

      What does a Certification Voucher Included mean?

      When will I start my course?

      What type of support will I receive during my course?

      Who do I contact if I cannot access my course?

      When will I receive my course materials?

      Who do I contact if I need an extension?

      What do I receive when I complete my course?

      Will I receive any job search assistance or externship opportunity after I finish my course?