(ISC)² CISSP – Certified Information Systems Security Professional - 2021
This CISSP training course maps to the CISSP methodology exam objectives and prepares learners to design, implement, and maintain your organization's cybersecurity programs. After finishing this CISSP certification training, you'll have a broad understanding of the eight domains of the CISSP CBK, be ready to take on the CISSP exam, and be in a good position to move into more senior-level security roles.
This CISSP certification training is considered professional-level (ISC)² training, which means it was designed for security professionals. This CISSP methodology skills course is designed for security professionals with at least five years of experience with security policies and management.
Course Curriculum
This course contains multiple skills covering 114 video lessons.
What IT leaders need to know before assigning this course
Security leaders often need senior practitioners who can connect governance, architecture, operations, and software security into one defensible program. This CISSP training is built for teams that need broad, management-level security coverage across the eight CISSP CBK domains so they can support policy decisions, strengthen controls, and prepare for certification without piecing together multiple point courses.
For an IT Director or Training Manager, this course fits experienced security staff best: security professionals with roughly five years of experience in security policy and management, including analysts, engineers, architects, and IT managers moving into wider security responsibility. Because the material spans risk management, compliance, security engineering, IAM, testing, and SDLC concepts, it is better suited for planned enablement than quick onboarding.
Teams assign this training when they want a shared security vocabulary, stronger alignment between technical controls and business requirements, and a structured path toward CISSP exam readiness. CBT Nuggets supports rollout with Practice Exams for certification prep, Playlists for staged team learning, and Team Reporting so leaders can track progress across assigned learners.
Team Impact
How this training helps your team succeed
Security programs break down when teams treat policy, architecture, identity, and testing as separate efforts. This training helps experienced practitioners connect those responsibilities into one operating model grounded in common CISSP domains.
In practical terms, teams use this training to:
Improve risk and compliance discussions by grounding decisions in governance, security policy, asset classification, and standards such as the ISO/IEC 27000 series.
Reduce outage and incident impact by reinforcing business continuity planning, disaster recovery, investigations, and evidence-handling concepts.
Strengthen technical control design with coverage of cryptography, secure design principles, network access control, and identity and access management.
Support secure change delivery by tying security assessment, testing, threat modeling, and SDLC practices back to organizational security requirements.
For organizations building internal security leadership, that means fewer gaps between teams, better audit readiness, and less reliance on outside specialists for foundational security planning.
After completion
Knowledge & ability your team will gain
Knowledge
The scope and purpose of the eight CISSP CBK domains and how they support enterprise security programs
Core security governance concepts, including risk management, compliance, security policies, and the CIA triad
Security architecture and engineering topics such as secure design principles and cryptography
Identity and access management, network and communications security, and access control concepts
Security assessment, testing, investigations, evidence handling, and related operational practices
Software development lifecycle and threat-modeling concepts as they relate to secure systems
Ability
Contribute to the design, implementation, and maintenance of organizational cybersecurity programs
Evaluate security controls against business requirements for confidentiality, integrity, and availability
Support risk assessments, business continuity discussions, and disaster recovery planning efforts
Apply concepts for asset classification, policy development, and compliance-oriented security processes
Participate more effectively in security architecture, IAM, and secure network design conversations
Prepare in a structured way for the CISSP exam and for broader senior-level security responsibilities
Pre-course assessment
Is this the right course for your team?
Use this quick check to see whether your team is ready for this training, or whether a foundational or advanced title is a better fit.
Question 1Prerequisite
Which three properties make up the CIA triad that serves as the foundation of information security?
Question 2Advanced
Which risk treatment option involves transferring the financial consequences of a risk to a third party, such as through insurance or outsourcing agreements?
Question 3Advanced
After applying security controls to a system, some level of risk remains. What term describes this remaining risk that an organization must explicitly accept or further treat?
Question 4Advanced
After applying security controls to a system, which term describes the remaining risk that the organization must explicitly accept, transfer, or mitigate further?
Question 5Prerequisite
Which three properties form the CIA triad that serves as the foundation of information security?
Question 6Prerequisite
Which three properties make up the CIA triad that forms the foundation of information security?
Question 7Advanced
An organization suffers an average of 3 successful phishing attacks per year. Each incident results in an average loss of $40,000. What is the Annualized Loss Expectancy (ALE)?
Question 8Prerequisite
Which three properties form the CIA triad that serves as the foundation of information security?
Question 9Prerequisite
Which three properties form the CIA triad that serves as the foundational model for information security?
Question 10Advanced
An organization determines that the cost to mitigate a vulnerability exceeds the value of the asset it protects. Which risk treatment option is most appropriate in this scenario?
We store your answers pseudonymously to calibrate question difficulty. No email or account required. Privacy policy.
0 of 10 answered
This course is included with every subscription
Get your team access to all 700+ courses, virtual labs, and practice exams.