This training teaches the skills and knowledge that are necessary to plan and manage an effective information systems security posture for an entire organization. This course covers broad managerial topics and deep technical familiarity with a wide range of organizational topics and IT/IS domains, including risk management, security architecture, development security and much more.
Access all premium content with a free week!Start a free week
11 HOURS OF TRAINING
0 VIRTUAL LABS
1 PRACTICE EXAM
Nugget trainer since 2012Read the full bio
What is it like to train with us?
Our learners say it best.
Helps me learn the skills I need when I need themTHOMAS S. | SYSTEMS ENGINEER & CONSULTANT
(ISC)² CISSP – Certified Information Systems Security Professional FAQs: Cost, Training, Value
Although this course is accessible enough for pretty much anyone at any point in their career, it's not ideal for anyone and everyone. You should take this IS security management course if you're interested in managerial and operations planning for entire organizational domains, less so if you're positioning yourself as a technical expert.
Yes, all the information you learn on this course about information systems security management and designing, engineering and managing the overall security posture of an organization is associated directly with the CISSP certification from (ISC)². The course follows the same learning objectives for the CISSP exam, so you'll be prepared for the job and the exam.
After you finish this course in information systems management and design, you should consider earning the Certified Information Systems Security Professional cert from (ISC)². The CISSP is a globally recognized information security management certification that demonstrates competency in eight different domains of enterprise IT/IS risk management and operations security.
You should take this course because there are hardly any other security management courses that take you through all eight domains of IT/IS risk management: security and risk management; asset security; security architecture and engineering; communication and network security; identity and access management; security assessment and testing; security operations; and software development security.