Prepare for CISSP Certification Online

Securing information storage and processing systems against intrusion, theft, and damage are crucial challenges facing organizations today. From user and customer data to trade secrets and even digital funds, security professionals are among the most valuable employees in any enterprise. This 100% online course will teach you the foundations of information system security and prepare you to become a Certified Information Systems Security Professional (CISSP).

Kevin Feeley
BS in Electrical Engineering
HVCC Class of 2005

“Excelsior took all of my credits. I was able to jump right into upper-level courses.”

Job Outlook for Certified Information Systems Security Professionals

Online Certified Information Systems Security Professional (CISSP) Training Course FAQs

Information security professionals operate in the realm of extreme confidentiality and trust. Earning a certification such as the CISSP signals to employers that a prospect is dedicated to their craft and committed to operating at the highest levels.

Information security professionals operate in the realm of extreme confidentiality and trust. Earning a certification such as the CISSP signals to employers that a prospect is dedicated to their craft and committed to operating at the highest levels.

Online Certified Information Systems Security Professional (CISSP) Training Course Objectives

Prerequisites and Requirements

To succeed in this course, you must have a strong background in systems security or hold a Systems Security Certified Practitioner (SSCP) certification. To earn your CISSP certification, you must have a minimum of five year’s work experience in two of the eight domains of CISSP.

Curriculum

  • Security and risk management

    Security governance and policies; professional ethic and confidentiality

  • Asset security

    Information classification, ownership; data security controls, privacy, and retention

  • Security engineering

    Security models and designs; engineering processes; vulnerabilities; cryptography; embedded devices; site design and security

  • Communication and network security

    Network architecture design and components; communication channels

  • Identity and access management

    Physical and logical assets control; identification, authentication, and third-party identity services

  • Security assessment and testing

    Assessment and test strategies; security control testing, process data, and architectures

  • Security operations

    Foundational security operations concepts; logging, monitoring, and investigating activities

  • Software development security

    Security in the software development lifecycle; software security effectiveness and impact

Instructors

David Grimes
David Grimes has more than 10 years of management and leadership experience in the private and nonprofit sectors. Grimes is passionate about technology and education, having worked as academic dean, student services director, technology coordinator, teacher, consultant, and technology columnist. He holds a Master of Education and a Bachelor of Science from Ohio State University, both in technology education.

Request More Information