Certified Information Systems Security Professional (CISSP)

By Ermin

Get ready to take and pass the CISSP certification examination.

17 hours
  • 65 Lessons
  • 11 Course Quizzes
  • 1 Practice Exam

About the course

Welcome to the Certified Information Systems Security Professional (CISSP) certification course. To obtain the CISSP certification, candidates need to pass an exam that consists of mostly multiple-choice questions. The purpose of this course is to prepare you for the certification exam by introducing you to the concepts and terminology you need to know to pass.

This course is designed to provide you with extensive knowledge, learning strategies, and instructor support along the way. In addition to the exam, you must meet a few other requirements in order to become a Certified Information Systems Security Professional. You must demonstrate that you follow the CISSP Code of Ethics, have a minimum of five years full-time paid work experience in the systems security field, and hold an IS or IT degree. With that in mind, before enrolling in this course, be sure that this is the right course for you.

This course is designed for people who want to become certified security professionals and are looking for jobs that require the CISSP certification. The prerequisites for this course are basic knowledge in networking and some knowledge of systems operations. Throughout this course, you will learn about the basics of asset security, cryptography, security and risk management, and various threats and attacks. This is a theoretical course — not a practical one — and we will cover many regulations, laws, policies, standards, and encryption protocols. With the flashcards, interactive diagrams, video lessons, and instructor support included with this course, you are equipped with everything you need to successfully pass the exam and earn your CISSP certification.

  • Chapter 1 5 Lessons Getting Started 19:35

    An Important Note About A Cloud Guru and Linux Academy Courses

    1:19

    Course Introduction

    8:44

    About the Training Architect

    1:44

    Course Prerequisites

    3:16

    How to Get Help

    4:32
  • Chapter 2 10 Lessons Security Governance 1:45:43

    CIA Triad: Confidentiality

    17:14

    CIA Triad: Integrity

    6:10

    CIA Triad: Availability

    6:59

    Identification, Authentication, Authorization, Auditing, and Accounting

    3:23

    Threat Modeling

    9:13

    Security Policies

    8:11

    Risk Management: Part 1

    8:59

    Risk Management: Part 2

    8:54

    Risk Management: Part 3

    6:40

    Security Governance

    30:00 Quiz
  • Chapter 3 3 Lessons Laws, Regulations, and Ethics 33:33

    Laws, Standards and Regulations

    14:19

    Professional Ethics

    4:14

    Laws, Regulations, and Ethics

    15:00 Quiz
  • Chapter 4 4 Lessons Data and Asset Security 38:30

    Classifying Data and Assets

    8:44

    Data Ownership

    7:24

    Storing and Disposing of Data

    7:22

    Data and Asset Security

    15:00 Quiz
  • Chapter 5 7 Lessons Cryptography 1:09:48

    Introduction

    5:13

    Asymmetric and Symmetric Encryption

    3:18

    Ciphers

    3:26

    Public Key Infrastructure (PKI)

    7:00

    Hashing Algorithms

    11:45

    Cryptographic Attacks

    9:06

    Cryptography

    30:00 Quiz
  • Chapter 6 6 Lessons Security Models and Design 1:17:27

    Security Design Principles

    12:24

    Security Models

    4:59

    System Security Requirements

    11:12

    Physical Security: Part 1

    10:46

    Physical Security: Part 2

    8:06

    Security Models and Design

    30:00 Quiz
  • Chapter 7 5 Lessons Threats and Attacks 31:35

    Threats vs. Attacks

    1:23

    Motives

    5:39

    Attack Vectors

    12:09

    Threat Classification

    8:45

    Attack Classification

    3:39
  • Chapter 8 8 Lessons Network Architecture 1:47:00

    OSI vs. TCP/IP

    7:10

    TCP/IP

    7:49

    Wireless Access Point

    13:53

    Wireless Network Attacks

    5:16

    Firewalls

    16:27

    Network Hardware

    7:02

    Network Topologies

    4:23

    Network Architecture

    45:00 Quiz
  • Chapter 9 7 Lessons Network Traffic 1:21:04

    Network Security Mechanisms

    12:02

    Email Security

    11:18

    VPN and Virtualization

    8:01

    Network Address Translation (NAT)

    2:32

    Wide-Area Networks (WANs)

    4:49

    Network Attack Mitigation

    12:22

    Network Traffic

    30:00 Quiz
  • Chapter 10 5 Lessons Identity and Authentication 39:04

    Identification and Authentication: Part 1

    7:45

    Identification and Authentication: Part 2

    3:18

    Identification and Authentication: Part 3

    8:08

    Access Control

    4:53

    Identity and Authentication

    15:00 Quiz
  • Chapter 11 5 Lessons Security Assessments 59:56

    Security Assessments and Audits

    6:42

    Penetration Testing

    17:33

    Vulnerability Assessments

    12:27

    Software Testing

    8:14

    Security Assessments

    15:00 Quiz
  • Chapter 12 4 Lessons Disaster Prevention, Response, and Recovery 43:27

    Security Operations

    19:35

    Responding to Incidents

    3:12

    Log - Monitor - Audit

    5:40

    Disaster Prevention, Response, and Recovery

    15:00 Quiz
  • Chapter 13 5 Lessons Software Development Security Principles 1:12:37

    The Software Development Lifecycle (SDLC)

    6:48

    Data and Information Storage

    19:38

    Malicious Code: Part 1

    9:44

    Malicious Code: Part 2

    6:27

    Software Development Security Principles

    30:00 Quiz
  • Chapter 14 3 Lessons Final Steps 4:15:59

    How to Prepare for the Exam

    13:36

    What's Next After Certification?

    2:23

    Security Processes, Systems and Architecture Practice Exam

    4:00:00 Quiz

What you will need

  • 1. Basic knowledge of networking 2. Basic knowledge of systems operations 3. Basic computer skills

Practice alongside courses in Cloud Playground

What is Cloud Playground? Cloud Playground lets you build skills in real-world AWS, Google Cloud, and Azure environments. Spin up risk-free Sandboxes, Servers and Terminals and follow along with courses, test a new idea or prepare for exams.

Get Started
Who’s going to be learning?
Sign In
Welcome Back!

Psst…this one if you’ve been moved to ACG!