Add to basket or enquire
This series covers everything you need to know about becoming a Certified Information Systems Security Professional. Students will learn about security and risk management, asset security, security engineering, communication and network security, identity and access management, security assessment and testing, security operations, and software development security.
Series Taught By: Shon Harris, David R. Miller and Ken Mayer
The Certified Information Systems Security Professional (CISSP) demonstrates a globally recognized standard of competence which covers critical topics in security today, including cloud computing, mobile security, application development security, risk management and more. The CISSP draws from a comprehensive, up-to-date, global common body of knowledge that ensures security leaders have a deep knowledge and understanding of new threats, technologies, regulations, standards, and practices.
Certification Exam Details:
Certified Information Systems Security Professional
Does this training qualify for college credits?
Yes! This course series, as an elective title, does qualify for 1-3 college credits to be applied towards a degree program offered at American Business and Technology University. Learn More
Available CEUs for Course Series Completion: 37
Students can earn up to 37 CEUs for fully completing this course series. This information will be displayed on the certificate of completion. Learn More
Learn on-demand from top instructors who are industry subject matter experts. Our highly certified expert instructors possess a superior understanding of the subject matter in their fields and have the ability to convey this knowledge in an effective, engaging, and professional manner to a wide audience.
Certificate of Completion
Upon completion of a series of courses you can earn a certificate of completion from Learning247. Certificates of Completion will display your full name, course completed, as well as the date of completion. Students have the ability to print this out or save it digitally to showcase your accomplishment.
Many of the in-depth theories and processes discussed in our courses can be learned most efficiently through the detailed PowerPoint slides presented. These visuals are accompanied by an instructor voice-over to provide our students with a clear, efficient, and complete presentation of concepts.
The immersive demonstrations in our training are a way for the instructor to present how to perform a task on-screen in front of the student. This feature gives the student the power to see tasks performed by a professional in the intended environment as many times as they would like, without purchasing expensive software.
Once a course is completed, test your knowledge by taking our course review quiz! Students have the ability to retake any review quizzes as many times as they wish to ensure they understand the material or to improve upon their scores.
Upon full completion of a training series, students can take a Series Final Exam, these exams are designed to test the students knowledge on all material trained within a series of courses. Students have the ability to retake any final exam as many times as they wish to ensure they understand the material or to improve upon their score.
With our universal course player, you can learn from your computer, tablet as well as mobile devices. Keep up with your training on the go!
Each course comes with a printable workbook that makes it easy to take notes as you learn. They also include a review quiz answer key, complete with answer explanations.
- Course 01 - Information Security and Risk Management 3hr 22m
- Course 02 - Access Control 5hr 9m
- Course 03 - Cryptography 5hr 8m
- Course 04 - Physical Security 1hr 29m
- Course 05 - Security Architecture and Design 2hr 40m
- Course 06 - Law, Investigation and Ethics 1hr
- Course 07 - Telecommunications and Networking 6hr 53m
- Course 08 - Business Continuity 2hr 38m
- Course 09 - Application Security 3hr 23m
- Course 10 - Operations Security
Career Path: The CISSP is ideal for those working in positions such as, but not limited to, Security Consultant, Security Analyst, Security Manager, IT Director/Manager, Security Auditor, Security Architect, Security Systems Engineer, Chief Information Security Officer, Director of Security, and Network Architect.
Questions and answers
Currently there are no Q&As for this course. Be the first to ask a question.
Currently there are no reviews for this course. Be the first to leave a review.