Certified Information Systems Security Professional (CISSP) - ITU Online

Certified Information Systems Security Professional (CISSP)

CISSP is the perfect credential for those with advanced technical and managerial skills, experience, and credibility to design, implement, and manage an information security program that can protect organizations from sophisticated attacks.

Included In This Course

19 Hrs 37 Min
47 On-demand Videos
Closed Captions

Closed Captions

Course Topics
8  Topics
Question & Answers
254 Prep Questions
Certificate of Completion

Certificate of Completion

About Our online CISSP Course

Wish to prepare for your (ISC)² certification exam without the need of sacrificing quality? ITU’s Online Self-Paced Training gives you the autonomy and assurance to advance on your own agenda. Whether at home, work or while traveling; anytime, anywhere – it promises convenience along with high standards!

As you journey through the learning process, experienced ITU instructors remain at your disposal with recorded video content. Designed to keep security knowledge information locked-in and drive comprehension, course activities are inspired by real-world scenarios and industry cybersecurity topics. Unlock your full potential now with on-demand access to our cybersecurity professionals subject matter experts!

About CISSP Certification

Are you incredibly serious about information technology security? If that’s the case, then Certified Information Systems Security Professional (CISSP) is your answer! This widely recognized certification provides technical and managerial knowledge to help you design, engineer, manage and enhance the security of any organization as a experienced cybersecurity managers. Aligned with its 2021 version from (ISC)2 this course promises to provide a fully integrated learning experience like no other.

If you’re looking for a comprehensive credential to not only verify your profound technical and hands-on cybersecurity program expertise but also to give yourself the credibility of design cybersecurity policies, engineering, executing and governing an overall cybersecurity program that will keep organizations safe from rapidly evolving attacks while ensuring Business Continuity – then look no further than the vendor-neutral CISSP certification.

Backed by (ISC)², the globally recognized, not-for-profit organization dedicated to advancing the information security field and cybersecurity jobs, the CISSP was the first credential in the field of information security to meet the stringent requirements of ISO/IEC Standard 17024.

Not only is the CISSP an objective measure of excellence, but also a globally recognized standard of achievement.

How do I become a CISPP

The only way to acquire your CISSP certification is by passing the computer-based test (CBT) offered at Pearson VUE Testing centers with a score of 700. Getting certified has never been easier with testing centers all over the world.

Who should take the CISPP

If you are ambitious, aspiring to advance in the field of Information Security and possess an impressive CV, then this CISSP training is tailored to your needs. To be eligible for a CISSP certificate from ISC2 requires at least 5 years of full-time professional experience within 2 or more domains of the CBK 2021. However, if that’s not possible don’t worry! You will still receive an associate title from ISC2 until such time as proof can be submitted demonstrating five years’ worth relevant work experience – after which ,you’ll walk away with the prestigious CISSP certification!

Key Term Knowledge Base: Key Terms Related to CISSP Certification

The CISSP certification is essential for IT professionals specializing in security. It covers a comprehensive range of cybersecurity topics, and understanding these key terms is crucial for anyone preparing for the CISSP exam or working in information security.

CISSPCertified Information Systems Security Professional, a globally recognized certification in information security.
Information SecurityThe practice of protecting information by mitigating information risks and vulnerabilities.
CybersecurityThe protection of internet-connected systems, including hardware, software, and data, from cyberattacks.
Risk ManagementThe process of identifying, assessing, and controlling threats to an organization’s capital and earnings.
Access ControlThe selective restriction of access to a place or other resource.
CryptographyThe practice and study of techniques for secure communication in the presence of third parties.
Security ArchitectureThe design and implementation of security systems and related architecture.
Network SecurityThe practices and policies designed to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.
Security OperationsThe activities related to maintaining the integrity, confidentiality, and availability of information and the systems that store, process, and transmit that information.
Disaster RecoveryStrategies and processes for quickly reestablishing access to applications, data, and IT resources after an outage.
Business ContinuityThe planning and preparation to ensure that a company can continue to operate in case of serious incidents or disasters.
Security AssessmentThe process of determining how effectively an entity being assessed meets specific security criteria.
Vulnerability ManagementThe process of identifying, evaluating, treating, and reporting on security vulnerabilities in systems and the software that runs on them.
Incident ResponseThe approach taken by an organization to prepare for, detect, contain, and recover from a data breach.
GovernanceThe framework of rules and practices by which an organization ensures accountability, fairness, and transparency in its relationship with stakeholders.
ComplianceAdhering to a rule, such as a policy, standard, specification, or law.
Physical SecurityThe protection of personnel, hardware, software, networks, and data from physical actions and events that could cause serious loss or damage.
Security AwarenessThe knowledge and attitude members of an organization possess regarding the protection of the physical and, especially, information assets.
Penetration TestingA method of evaluating the security of a computer system or network by simulating an attack from malicious outsiders.
Cloud SecurityThe set of policies, controls, procedures, and technologies that work together to protect cloud-based systems, data, and infrastructure.

Understanding these terms is vital for professionals aiming to excel in the field of information security and for those pursuing the CISSP certification.

Frequently Asked Questions About Certified Information Systems Security Professional (CISSP)

What is CISSP certification, and why is it important?

CISSP stands for Certified Information Systems Security Professional. It is a globally recognized certification for information security professionals. CISSP certification demonstrates expertise in designing, implementing, and managing a security program. It is important for individuals who want to advance their careers in cybersecurity.

What are the prerequisites for CISSP certification?

To be eligible for the CISSP certification exam, you need to have a minimum of five years of cumulative, paid work experience in two or more of the eight domains of the CISSP Common Body of Knowledge (CBK). However, there are alternative pathways for those who do not meet this requirement.

How do I prepare for the CISSP exam?

You can prepare for the CISSP exam through self-study, attending training courses, or using study materials like books and online resources. Many training providers offer CISSP preparation courses like the one you mentioned. Make sure to dedicate enough time to study each of the CISSP domains thoroughly.

What are the domains covered in the CISSP exam?

The CISSP exam covers eight domains: Security and Risk Management, Asset Security, Security Architecture and Engineering, Communication and Network Security, Identity and Access Management (IAM), Security Assessment and Testing, Security Operations, and Software Development Security. Each domain has specific knowledge areas you need to understand.

What is the passing score for the CISSP exam?

The CISSP exam uses a scaled scoring system, with a passing score typically set at 700 out of 1000 points. The final score is not a percentage of correct answers but is determined by a complex scoring algorithm based on the difficulty of the questions. You will receive your score immediately upon completing the exam.

Proudly Display
Your Achievement

Upon completion of your training, you’ll receive a personalized certificate of completion to help validate to others your new skills.
Example Certificate

CISSP : Certified Information Systems Security Professional Course Content

Module 1: Security and Risk Management

  •    Intro
  •    Security and Risk Management pt.1
  •    Security and Risk Management pt.2
  •    Security and Risk Management pt.3
  •    Security and Risk Management Summary
  •    Security and Risk Management Test Prep pt.1
  •    Security and Risk Management Test Prep pt.2
  •    Security and Risk Management Test Prep pt.3
  •    Security and Risk Management Test Prep pt.4

Module 2: Asset Security

  •    Asset Secutity pt.1
  •    Asset Security pt.2
  •    Asset Security Summary
  •    Asset Security Test Prep

Module 3: Security Architecture and Engineering

  •    Security Architecture and Engineering pt.1
  •    Security Architecture and Engineering pt.2
  •    Security Architecture and Engineering pt.3
  •    Security Architecture and Engineering Summary
  •    Security Architecture and Engineering Test Prep pt.1
  •    Security Architecture and Engineering Test Prep pt.2
  •    Security Architecture and Engineering Test Prep pt.3

Module 4: Communication and Network Security

  •    Communication and Network Security pt.1
  •    Communication and Network Security pt.2
  •    Communication and Network Security Summary
  •    Communication and Network Security Test Prep

Module 5: Identity and Access Management (IAM)

  •    Identity and Access Management (IAM)
  •    Identity and Access Management (IAM) Summary
  •    Identity and Access Management (IAM) Test Prep pt.1
  •    Identity and Access Management (IAM) Test Prep pt.2
  •    Identity and Access Management (IAM) Test Prep pt.3
  •    Identity and Access Management (IAM) Test Prep pt.4

Module 6: Security Assessment and Testing

  •    Security Assessment and Testing
  •    Security Assessment and Testing Summary
  •    Security Assessment and Testing Test Prep

Module 7: Security Operations

  •    Security Operations pt.1
  •    Security Operations pt.2
  •    Security Operations pt.3
  •    Security Operations pt.4
  •    Security Operations Summary
  •    Security Operations Test Prep

Module 8: Software Development Security

  •    Software Development Security pt.1
  •    Software Development Security pt.2
  •    Software Development Security pt.3
  •    Software Development Security pt.4
  •    Software Development Security pt.5
  •    Software Development Security Summary
  •    Software Development Security Test Prep
  •    Outro
Add a review
Currently, we are not accepting new reviews
Based on 82 reviews
1-5 of 82 reviews
  1. SJ


  2. AA
  3. K
  4. BO
  5. A

    Smooth delivery and easy access to LMS. Good to see that the LMS offers progress tracking. Would be great if badges were offered on completion of courses to share via Credly to future employers.

Your Training Instructor

Alan Grayson

Alan Grayson


Alan Grayson has been teaching bootcamps for 20 years and has a 905 average pass rate from those students he has taught. Alan has attended The USAF Academy, University of Southern California, and has certifications in CompTIA CTT+, CASP+, CySA+, PenTest+, Security+, Network+, A+ as well as Cloud+. Alan also holds the CISSP Certification and is an official ISC2 Instructor for CISSP, SSCP, CSSLP, and CCSP.


Subscribe To All-Access
Lock In $16.99 / Month Forever

Gain access to this training and all our other courses with our cost-effective monthly subscription. No obligations. Cancel anytime.

$49.99 $16.99 Monthly