Skip to content
Play overlay
Preview this course

CISSP (Certified Information Systems Security Professional)

Self-paced videos, Lifetime access, Study material, Certification prep, Technical support, Course Completion Certificate


Uplatz

Summary

Price
£14 inc VAT
Study method
Online, On Demand What's this?
Duration
51.5 hours · Self-paced
Qualification
No formal qualification
Certificates
  • Certificate of completion - Free
  • Reed courses certificate of completion - Free

19 students purchased this course

Add to basket or enquire

Overview

Uplatz provides this comprehensive course on CISSP - Certified Information Systems Security Professional. It is a self-paced course consisting of video lectures. You will be awarded Course Completion Certificate at the end of the course.

The CISSP is an information security certification for security analysts. It was created by the International Information Systems Security Certification Consortium (ISC). The certification was created to ensure professionals in computer security have standardized knowledge of the field. Earning a Certified Information Systems Security Professional certificate can help you have a successful career as a computer security professional.

The Certified Information Systems Security Professional (CISSP) exam is a six-hour exam consisting of 250 questions that certifies security professionals in ten different areas, of access control systems and methodology, business continuity planning and disaster recovery planning, physical security, operations, security, management practices, telecommunications and networking security. Other areas important to the CISSP certification are cryptography, security architecture application and systems development, law, investigation, and ethics.

To become certified as a CISSP, you will need at least five years of full-time, paid work as a security analyst in two or more of the eight domains covered in the CISSP, such as cryptography and software development security There are experience wavers available for those with college degrees and additional credentials if these are approved by the (ISC). You also can become an Associate of the (ISC) and earn the CISSP when you meet your experience requirement. The next step is to prepare for and pass the exam. You will need to have a score a minimum of 700 out of 1000 points to pass the exam.

After passing the exam, you will need to have an endorsement in subscribing to the (ISC) Code of Ethics and you will have to have endorsement from another (ISC) professional who can verify your professional experience requirements such as length of employment, professional reputation, and continuing education as a security analyst. Obtaining a professional endorsement from a current member is the reason it important to belong to professional organizations and to participate in professional seminars and events. These are useful career moves that are useful for networking with potential endorsers of your CISSP application.

A CISSP certification requires an annual maintenance fee of $85 at the end of each certification year, and you must take the test every three years to remain a member in good standing with the certification. You must earn at least a minimum of 20 Continuing Professional Education (CPE) credits each year within the three-year certification cycle. You can re-certify by completing 40 annual CPEs and paying the annual maintenance fee. These classes can be taken at a university or through online courses dedicated to security issues.

The following domains are covered in CISSP certification exam -

  1. Security and Risk Management
  2. Asset Security
  3. Security Architecture and Engineering
  4. Communication and Network Security
  5. Identity and Access Management
  6. Security Assessment and Testing
  7. Security Operations
  8. Software Development Security

If you're building a career in information security the Certified Information Systems Security Professional (CISSP) is the must-have qualification to help you progress. It is a globally recognized standard that demonstrates your competence as an IT professional.

This course will prepare you with the knowledge and skills to complete the CISSP exam, which will get you Certified Information Systems Security Professional status. professional. Covering topics including cloud computing, mobile security, application development security, and risk management, you will gain the knowledge to best manage information security issues back in your organization.

Certified Information Systems Security Professional (CISSP) is an independent information security certification governed by the International Information Systems Security Certification Consortium, commonly known as (ISC)². The CISSP is considered the global standard that proves an individual's proficiency in several security disciplines. The certification is not just for the assessment of one’s solid knowledge about information security, it is also a standard of achievement that is acknowledged worldwide.

Certificates

Certificate of completion

Digital certificate - Included

Course Completion Certificate by Uplatz

Reed courses certificate of completion

Digital certificate - Included

Will be downloadable when all lectures have been completed

Curriculum

2
sections
73
lectures
51h 29m
total
    • 1: BASICS OF CYBERSECURITY 1:10:41
    • 2: CISSP CERTIFICATION GUIDE Preview 33:09
    • 3: CISSP CERTIFICATION DOMAINS 2:19:49
    • 4: CISSP EXAM PREPARATION GUIDE 31:24
    • 5: CISSP PREPARATION TECHNIQUES 1:04:33
    • 6: RISK ANALYSIS 54:10
    • 7: GOALS OF RISK ANALYSIS 39:20
    • 8: CYBERSECURITY GOALS 22:03
    • 9: TYPES OF CYBER ATTACKS 15:55
    • 10: TYPES OF CYBER ATTACKERS 53:17
    • 11: CYBERSECURITY ARCHIVAL STORAGE 54:48
    • 12: CYBERSECURITY VPNs 54:05
    • 13: CYBERSECURITY STANDARDS 56:36
    • 14: CYBERSECURITY CHALLENGES 1:02:04
    • 15: DIFFERENT MAIL SERIVICE PROVIDERS 1:11:01
    • 16: DOMAIN 1 - SECURITY AND RISK MANAGEMENT DOMAIN - PART 1 59:12
    • 17: DOMAIN 1 - SECURITY AND RISK MANAGEMENT DOMAIN - PART 2 23:11
    • 18: DOMAIN 1 - SECURITY AND RISK MANAGEMENT DOMAIN - PART 3 34:06
    • 19: DOMAIN 1 - SECURITY AND RISK MANAGEMENT DOMAIN - PART 4 27:34
    • 20: DOMAIN 2 - ASSET SECURITY DOMAIN - PART 1 38:12
    • 21: DOMAIN 2 - ASSET SECURITY DOMAIN - PART 2 1:14:36
    • 22: DOMAIN 3 - SECURITY ARCHITECTURE AND ENGINEERING DOMAIN - PART 1 43:22
    • 23: DOMAIN 3 - SECURITY ARCHITECTURE AND ENGINEERING DOMAIN - PART 2 26:11
    • 24: DOMAIN 3 - SECURITY ARCHITECTURE AND ENGINEERING DOMAIN - PART 3 34:55
    • 25: DOMAIN 3 - SECURITY ARCHITECTURE AND ENGINEERING DOMAIN - PART 4 22:25
    • 26: DOMAIN 3 - SECURITY ARCHITECTURE AND ENGINEERING DOMAIN - PART 5 26:43
    • 27: DOMAIN 3 - SECURITY ARCHITECTURE AND ENGINEERING DOMAIN - PART 6 12:34
    • 28: DOMAIN 3 - SECURITY ARCHITECTURE AND ENGINEERING DOMAIN - PART 7 1:11:38
    • 29: DOMAIN 3 - SECURITY ARCHITECTURE AND ENGINEERING DOMAIN - PART 8 35:10
    • 30: DOMAIN 3 - SECURITY ARCHITECTURE AND ENGINEERING DOMAIN - PART 9 26:36
    • 31: DOMAIN 3 - SECURITY ARCHITECTURE AND ENGINEERING DOMAIN - PART 10 33:36
    • 32: DOMAIN 3 - SECURITY ARCHITECTURE AND ENGINEERING DOMAIN - PART 11 1:19:31
    • 33: DOMAIN 4 - COMMUNICATION AND NETWORK SECURITY DOMAIN - PART 1 18:16
    • 34: DOMAIN 4 - COMMUNICATION AND NETWORK SECURITY DOMAIN - PART 2 38:59
    • 35: DOMAIN 4 - COMMUNICATION AND NETWORK SECURITY DOMAIN - PART 3 28:43
    • 36: DOMAIN 4 - COMMUNICATION AND NETWORK SECURITY DOMAIN - PART 4 29:53
    • 37: DOMAIN 4 - COMMUNICATION AND NETWORK SECURITY DOMAIN - PART 5 1:37:35
    • 38: DOMAIN 5 - IDENTITY AND ACCESS MANAGEMENT DOMAIN 40:53
    • 39: DOMAIN 6 - SECURITY ASSESSMENT AND TESTING DOMAIN - PART 1 10:37
    • 40: DOMAIN 6 - SECURITY ASSESSMENT AND TESTING DOMAIN - PART 2 33:24
    • 41: DOMAIN 6 - SECURITY ASSESSMENT AND TESTING DOMAIN - PART 3 19:24
    • 42: DOMAIN 6 - SECURITY ASSESSMENT AND TESTING DOMAIN - PART 4 1:32:31
    • 43: DOMAIN 7 - SECURITY OPERATIONS DOMAIN - PART 1 43:36
    • 44: DOMAIN 7 - SECURITY OPERATIONS DOMAIN - PART 2 31:49
    • 45: DOMAIN 7 - SECURITY OPERATIONS DOMAIN - PART 3 25:44
    • 46: DOMAIN 7 - SECURITY OPERATIONS DOMAIN - PART 4 45:53
    • 47: DOMAIN 7 - SECURITY OPERATIONS DOMAIN - PART 5 31:31
    • 48: DOMAIN 7 - SECURITY OPERATIONS DOMAIN - PART 6 10:36
    • 49: DOMAIN 7 - SECURITY OPERATIONS DOMAIN - PART 7 54:01
    • 50: DOMAIN 7 - SECURITY OPERATIONS DOMAIN - PART 8 2:12:29
    • 51: DOMAIN 8 - SOFTWARE DEVELOPMENT SECURITY DOMAIN - PART 1 53:05
    • 52: DOMAIN 8 - SOFTWARE DEVELOPMENT SECURITY DOMAIN - PART 2 29:19
    • 53: DOMAIN 8 - SOFTWARE DEVELOPMENT SECURITY DOMAIN - PART 3 24:16
    • 54: DOMAIN 8 - SOFTWARE DEVELOPMENT SECURITY DOMAIN - PART 4 18:00
    • 55: DOMAIN 1 QUIZ - PART 1 Preview 38:51
    • 56: DOMAIN 1 QUIZ - PART 2 50:33
    • 57: DOMAIN 2 QUIZ - PART 1 26:33
    • 58: DOMAIN 2 QUIZ - PART 2 18:08
    • 59: DOMAIN 2 QUIZ - PART 3 31:06
    • 60: DOMAIN 3 QUIZ - PART 1 33:42
    • 61: DOMAIN 3 QUIZ - PART 2 27:47
    • 62: DOMAIN 4 QUIZ 55:37
    • 63: DOMAIN 5 QUIZ - PART 1 59:43
    • 64: DOMAIN 5 QUIZ - PART 2 56:52
    • 65: DOMAIN 5 QUIZ - PART 3 52:50
    • 66: DOMAIN 6 QUIZ - PART 1 47:36
    • 67: DOMAIN 6 QUIZ - PART 2 39:16
    • 68: DOMAIN 6 QUIZ - PART 3 09:49
    • 69: DOMAIN 7 QUIZ - PART 1 34:37
    • 70: DOMAIN 7 QUIZ - PART 2 24:53
    • 71: DOMAIN 8 QUIZ - PART 1 16:43
    • 72: DOMAIN 8 QUIZ - PART 2 25:30
    • 73: DOMAIN 8 QUIZ - PART 3 35:12

Course media

Description

This training provides an extensive review of information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK):

The domains covered as part of the CISSP training are:

  • Security and Risk Management (Security, Risk, Compliance, Law, Regulations, and Business Continuity)
  • Asset Security (Protecting Security of Assets)
  • Security Architecture and Engineering (Engineering and Management of Security)
  • Communication and Network Security (Designing and Protecting Network Security)
  • Identity and Access Management (IAM) (Controlling Access and Managing Identity)
  • Security Assessment and Testing (Designing, Performing, and Analyzing Security Testing)
  • Security Operations (Foundational Concepts, Investigations, Incident Management, and Disaster Recovery)
  • Software Development Security (Understanding, Applying, and Enforcing Software Security)

Course Objectives

  • You'll increase your expertise as leading information security systems professional, as defined by globally recognized CISSP certification
  • You'll develop the expertise to manage a best-practice information security system, aligned to globally accepted standards, that ensures your organization's information assets are protected
  • Be confident with emerging threats, technologies, regulations, standards, and industry best practices, and how to stay informed
  • Be familiar with industry accepted terminology and practices used by information security professionals

Why CISSP?

In an ever-evolving field, IT professionals frequently find themselves plagued by the latest and greatest cyber security threats. To keep up with the changing tides, many professionals choose to pursue the Certified Information Security Professional, or CISSP, certification. Uplatz's cyber security training course on CISSP will help you accelerate your career by preparing you for the CISSP certification.

  • To expand your knowledge in security concepts and practices.
  • To show a dedication to the security discipline.
  • To meet a growing demands for security professionals, and to work in a thriving field.
  • To join a professional organization and to link up with like-minded individuals
  • It is the credential for professionals who develop policies and procedures in information security.
  • The CISSP certification confirms that you are capable of developing the information security policies, standards, and procedures, managing information security policies, standards and procedures
  • This certification is a measure of your capabilities.

Who is this course for?

Everyone

Requirements

Passion to learn and succeed!

Career path

  • Security Consultant
  • Security Director/Manager
  • IT Director/Manager
  • Security System Engineer
  • Security Auditor
  • IT Security Architect
  • Cyber Security Analyst
  • Chief Information Security Officer
  • Network Architect
  • Information Security Consultant/Manager
  • Identity and Access Management
  • Active Directory Expert
  • Advanced Cyber Security Architect/Engineer
  • Security Operations Advisor - CISM/CISSP
  • Cyber Expert

Questions and answers

Currently there are no Q&As for this course. Be the first to ask a question.

Reviews

2.6
Course rating
60%
Service
60%
Content
40%
Value

FAQs

Study method describes the format in which the course will be delivered. At Reed Courses, courses are delivered in a number of ways, including online courses, where the course content can be accessed online remotely, and classroom courses, where courses are delivered in person at a classroom venue.

CPD stands for Continuing Professional Development. If you work in certain professions or for certain companies, your employer may require you to complete a number of CPD hours or points, per year. You can find a range of CPD courses on Reed Courses, many of which can be completed online.

A regulated qualification is delivered by a learning institution which is regulated by a government body. In England, the government body which regulates courses is Ofqual. Ofqual regulated qualifications sit on the Regulated Qualifications Framework (RQF), which can help students understand how different qualifications in different fields compare to each other. The framework also helps students to understand what qualifications they need to progress towards a higher learning goal, such as a university degree or equivalent higher education award.

An endorsed course is a skills based course which has been checked over and approved by an independent awarding body. Endorsed courses are not regulated so do not result in a qualification - however, the student can usually purchase a certificate showing the awarding body's logo if they wish. Certain awarding bodies - such as Quality Licence Scheme and TQUK - have developed endorsement schemes as a way to help students select the best skills based courses for them.