(ISC)² CISSP – Certified Information Systems Security Professional - (ISC)² Certification Training Training | CBT Nuggets

(ISC)² CISSP Online Certification Training


Keith Barker

Ben Finkel


(ISC)² CISSP Online Certification Training

In this intermediate (ISC)² skills training, Keith Barker and Ben Finkel cover the CISSP methodology objectives in the CISSP exam, which is the one required exam to earn the CISSP certification.

The CISSP is one of the most valued certifications available to IT security professionals — and employers. There’s a reason for that. CISSP not only validates that you have the skills necessary to design, implement, and maintain your organization’s cybersecurity programs. The CISSP also validates that you have the experience, too. (ISC)² maintains a stringent qualification regime for all its certifications, which includes required documented work experience and a sponsorship. For the CISSP, you’ll need to show a minimum of five (5) years cumulative paid work experience in two or more of the eight domains of the CISSP CBK.

After finishing this CISSP Certification training, you'll have a broad understanding of the eight domains of the CISSP CBK, be ready to take on the CISSP exam, and be in a good position to move into more senior-level security roles.

For anyone who leads an IT team, this (ISC)² training can be used for CISSP exam prep, onboarding new security professionals, individual or team training plans, or as a (ISC)² reference resource.

CISSP Certification Training: What You Need to Know

This CISSP training maps to the CISSP methodology exam objectives and covers topics such as:

  • Confidentiality, integrity, and availability (CIA)
  • Cryptography, such as symmetric, asymmetric, Public Key Infrastructure (PKI), and digital signatures
  • Asset classification, data classification, and data security controls
  • Network security, such as Network Access Control (NAC) devices and endpoint security
  • Identity and Access Management (IAM) and authorization, such as RBAC, MAC, and DAC
  • Vulnerability assessments, penetration testing, disaster recovery (DR), and business continuity (BC)
  • Logging and monitoring, such as intrusion detection (IDS), intrusion prevention (IPS), and SIEM
  • Backup storage strategies and recovery site strategies
  • Software Development Life Cycle (SDLC), including change management

Who Should Take CISSP Certification Training?

This CISSP certification training is considered professional-level (ISC)² training, which means it was designed for security professionals. This CISSP methodology skills course is designed for security professionals with at least five years of experience with security policies and management.

New or aspiring security professionals. If you’re a security professional who is new to the field, you’re probably starting to become aware of just how broad and deep the pool of potential knowledge is in this career field. You’ll need expertise in risk management and asset security, architecture and engineering, communication and network security, and much more. Considering the experience requirements for the CISSP, you may not be able to get certified now, but that doesn’t mean you won’t learn a lot from this training.

Experienced security professionals. If you’re a security professional with several years under your belt and you want to prove your mastery of the career field, you should be seriously planning to earn the Certified Information Systems Security Professional (CISSP) certification. This training covers the length and breadth of the certifying exam’s topics -- penetration testing, cryptography, network security and vulnerability assessment. Learn the details of expert digital security and prepare for your CISSP exam.

Skills You'll Learn in this Course

  • Information Security: Security and Risk Management

    Intermediate1 hr 19 mins15 videos
  • Information Security: Asset Security

    Intermediate 38 mins7 videos
  • Information Security: Security Architecture and Engineering

    Intermediate1 hr 32 mins17 videos
  • Information Security: Communication and Network Security

    Intermediate 40 mins6 videos
  • Information Security: Identity and Access Management (IAM)

    Intermediate 52 mins9 videos
  • Information Security: Security Assessment and Testing

    Intermediate 31 mins6 videos
  • Information Security: Security Operations

    Intermediate2 hrs 14 mins27 videos
  • Information Security: Software Development Security

    Intermediate 53 mins8 videos
  • More on our blog

    More on our YouTube channel

    4 Most Difficult IT Security Certifications

    Asher McClennahan from CBT Nuggets’ Learning Content team answers a frequently asked question: of all the cybersecurity certification exams that are out there, what are the hardest? Subjectivity aside, these are the four IT security certification exams we know people struggle with the most.