Skip to content
CBT Nuggets

(ISC)² CISSP – Certified Information Systems Security Professional - 2021

This CISSP training course maps to the CISSP methodology exam objectives and prepares learners to design, implement, and maintain your organization's cybersecurity programs. After finishing this CISSP certification training, you'll have a broad understanding of the eight domains of the CISSP CBK, be ready to take on the CISSP exam, and be in a good position to move into more senior-level security roles.

Updated July 2021

114Videos
1Practice Exam
114 videos1 exam

Who This Course Is For

This CISSP certification training is considered professional-level (ISC)² training, which means it was designed for security professionals. This CISSP methodology skills course is designed for security professionals with at least five years of experience with security policies and management.

Course Curriculum

This course contains multiple skills covering 114 video lessons.

Detailed skill-by-skill breakdown coming soon.

For IT leaders

What IT leaders need to know before assigning this course

Security leaders often need senior practitioners who can connect governance, architecture, operations, and software security into one defensible program. This CISSP training is built for teams that need broad, management-level security coverage across the eight CISSP CBK domains so they can support policy decisions, strengthen controls, and prepare for certification without piecing together multiple point courses.

For an IT Director or Training Manager, this course fits experienced security staff best: security professionals with roughly five years of experience in security policy and management, including analysts, engineers, architects, and IT managers moving into wider security responsibility. Because the material spans risk management, compliance, security engineering, IAM, testing, and SDLC concepts, it is better suited for planned enablement than quick onboarding.

Teams assign this training when they want a shared security vocabulary, stronger alignment between technical controls and business requirements, and a structured path toward CISSP exam readiness. CBT Nuggets supports rollout with Practice Exams for certification prep, Playlists for staged team learning, and Team Reporting so leaders can track progress across assigned learners.

Team Impact

How this training helps your team succeed

Security programs break down when teams treat policy, architecture, identity, and testing as separate efforts. This training helps experienced practitioners connect those responsibilities into one operating model grounded in common CISSP domains.

In practical terms, teams use this training to:

  • Improve risk and compliance discussions by grounding decisions in governance, security policy, asset classification, and standards such as the ISO/IEC 27000 series.
  • Reduce outage and incident impact by reinforcing business continuity planning, disaster recovery, investigations, and evidence-handling concepts.
  • Strengthen technical control design with coverage of cryptography, secure design principles, network access control, and identity and access management.
  • Support secure change delivery by tying security assessment, testing, threat modeling, and SDLC practices back to organizational security requirements.

For organizations building internal security leadership, that means fewer gaps between teams, better audit readiness, and less reliance on outside specialists for foundational security planning.

After completion

Knowledge & ability your team will gain

Knowledge

  • The scope and purpose of the eight CISSP CBK domains and how they support enterprise security programs
  • Core security governance concepts, including risk management, compliance, security policies, and the CIA triad
  • Security architecture and engineering topics such as secure design principles and cryptography
  • Identity and access management, network and communications security, and access control concepts
  • Security assessment, testing, investigations, evidence handling, and related operational practices
  • Software development lifecycle and threat-modeling concepts as they relate to secure systems

Ability

  • Contribute to the design, implementation, and maintenance of organizational cybersecurity programs
  • Evaluate security controls against business requirements for confidentiality, integrity, and availability
  • Support risk assessments, business continuity discussions, and disaster recovery planning efforts
  • Apply concepts for asset classification, policy development, and compliance-oriented security processes
  • Participate more effectively in security architecture, IAM, and secure network design conversations
  • Prepare in a structured way for the CISSP exam and for broader senior-level security responsibilities

Pre-course assessment

Is this the right course for your team?

Use this quick check to see whether your team is ready for this training, or whether a foundational or advanced title is a better fit.

  1. Question 1Prerequisite

    Which three properties make up the CIA triad that serves as the foundation of information security?

  2. Question 2Advanced

    Which risk treatment option involves transferring the financial consequences of a risk to a third party, such as through insurance or outsourcing agreements?

  3. Question 3Advanced

    After applying security controls to a system, some level of risk remains. What term describes this remaining risk that an organization must explicitly accept or further treat?

  4. Question 4Advanced

    After applying security controls to a system, which term describes the remaining risk that the organization must explicitly accept, transfer, or mitigate further?

  5. Question 5Prerequisite

    Which three properties form the CIA triad that serves as the foundation of information security?

  6. Question 6Prerequisite

    Which three properties make up the CIA triad that forms the foundation of information security?

  7. Question 7Advanced

    An organization suffers an average of 3 successful phishing attacks per year. Each incident results in an average loss of $40,000. What is the Annualized Loss Expectancy (ALE)?

  8. Question 8Prerequisite

    Which three properties form the CIA triad that serves as the foundation of information security?

  9. Question 9Prerequisite

    Which three properties form the CIA triad that serves as the foundational model for information security?

  10. Question 10Advanced

    An organization determines that the cost to mitigate a vulnerability exceeds the value of the asset it protects. Which risk treatment option is most appropriate in this scenario?

We store your answers pseudonymously to calibrate question difficulty. No email or account required. Privacy policy.

0 of 10 answered

This course is included with every subscription

Get your team access to all 700+ courses, virtual labs, and practice exams.

Most Popular

Team

$749per seat / year

5+ learner seats

Get Started

Enterprise

Customannual contracts

Any size

Contact Enterprise Sales
Calculate the ROI of training your team

Need access for just one person? See individual options

Trusted by 23,000+ organizations

Ready to upskill your team?

Talk to our sales team to find the right plan for your organization.