Discover Classes. Earn Rewards.

Certified Info Systems Security Professional CISSP

Master the eight CISSP domains and gain the skills and knowledge needed to thrive in the information system security field with this premier certification course from Computer Training Source, Inc.

  • All levels
  • 18 and older
  • $3,995
  • Online Classroom
  • 40 hours over 10 sessions

Start Dates (2)

  • $3,995
  • 40 hours over 10 sessions
6 seats left
Show all 10 sessions
  • Tue, Apr 23 at 6:00pm - 10:00pm
  • Thu, Apr 25 at 6:00pm - 10:00pm
  • Tue, Apr 30 at 6:00pm - 10:00pm
  • Thu, May 02 at 6:00pm - 10:00pm
  • Tue, May 07 at 6:00pm - 10:00pm
  • Thu, May 09 at 6:00pm - 10:00pm
  • Tue, May 14 at 6:00pm - 10:00pm
  • Thu, May 16 at 6:00pm - 10:00pm
  • Tue, May 21 at 6:00pm - 10:00pm
  • Thu, May 23 at 6:00pm - 10:00pm
6 seats left
Show all 10 sessions
  • Tue, Aug 06 at 6:00pm - 10:00pm
  • Thu, Aug 08 at 6:00pm - 10:00pm
  • Tue, Aug 13 at 6:00pm - 10:00pm
  • Thu, Aug 15 at 6:00pm - 10:00pm
  • Tue, Aug 20 at 6:00pm - 10:00pm
  • Thu, Aug 22 at 6:00pm - 10:00pm
  • Tue, Aug 27 at 6:00pm - 10:00pm
  • Thu, Aug 29 at 6:00pm - 10:00pm
  • Tue, Sep 03 at 6:00pm - 10:00pm
  • Thu, Sep 05 at 6:00pm - 10:00pm
Showing 12 of 2

Class Description


What you'll learn in this cissp training:

CISSP is the premier certification for today's information system security professional. It is a premier certification from the international Information System Security Certification Consortium, Inc (ISC) 2 ®. The skill and knowledge you gain in this course will help you master the eight CISSP domains and ensure your credibility and success within the information system security field.

Course Content

Lesson 1: Security and Risk Management

  • Topic A: Security Governance Principles
  • Topic B: Compliance
  • Topic C: Professional Ethics
  • Topic D: Security Documentation
  • Topic E: Risk Management
  • Topic F: Threat Modeling
  • Topic G: Business Continuity Plan Fundamentals
  • Topic H: Acquisition Strategy and Practice
  • Topic I: Personnel Security Policies
  • Topic J: Security Awareness and Training

Lesson 2: Asset Security

  • Topic A: Asset Classification
  • Topic B: Privacy Protection
  • Topic C: Asset Retention
  • Topic D: Data Security Controls
  • Topic E: Secure Data Handling

Lesson 3: Security Engineering

  • Topic A: Security in the Engineering Lifecycle
  • Topic B: System Component Security
  • Topic C: Security Models
  • Topic D: Controls and Countermeasures in Enterprise Security
  • Topic E: Information System Security Capabilities
  • Topic F: Design and Architecture Vulnerability Mitigation
  • Topic G: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
  • Topic H: Cryptography Concepts
  • Topic I: Cryptography Techniques
  • Topic J: Site and Facility Design for Physical Security
  • Topic K: Physical Security Implementation in Sites and Facilities

Lesson 4: Communications and Network Security

  • Topic A: Network Protocol Security
  • Topic B: Network Components Security
  • Topic C: Communication Channel Security
  • Topic D: Network Attack Mitigation

Lesson 5: Identity and Access Management

  • Topic A: Physical and Logical Access Control
  • Topic B: Identification, Authentication, and Authorization
  • Topic C: Identity as a Service
  • Topic D: Authorization Mechanisms
  • Topic E: Access Control Attack Mitigation

Lesson 6: Security Assessment and Testing

  • Topic A: System Security Control Testing
  • Topic B: Software Security Control Testing
  • Topic C: Security Process Data Collection
  • Topic D: Audits

Lesson 7: Security Operations

  • Topic A: Security Operations Concepts
  • Topic B: Physical Security
  • Topic C: Personnel Security
  • Topic D: Logging and Monitoring
  • Topic E: Preventative Measures
  • Topic F: Resource Provisioning and Protection
  • Topic G: Patch and Vulnerability Management
  • Topic H: Change Management
  • Topic I: Incident Response
  • Topic J: Investigations
  • Topic K: Disaster Recovery Planning
  • Topic L: Disaster Recovery Strategies
  • Topic M: Disaster Recovery Implementation

Lesson 8: Software Development Security

  • Topic A: Security Principles in the System Lifecycle
  • Topic B: Security Principles in the Software Development Lifecycle
  • Topic C: Database Security in Software Development
  • Topic D: Security Controls in the Development Environment
  • Topic E: Software Security Effectiveness Assessment

Remote Learning

This course is available for "remote" learning and will be available to anyone with access to an internet device with a microphone (this includes most models of computers, tablets). Classes will take place with a "Live" instructor at the date/times listed below.

Upon registration, the instructor will send along additional information about how to log-on and participate in the class.

Refund Policy

  • In order to receive a refund less 5% cancellation fee for a one- or two-day class, you must notify us at least 5 business days in advance of the first class date of your intention to cancel.
  • To reschedule a class, notify us at least 5 business days in advance of the first class date.

In the event that an instructor or the school needs to cancel at the last minute, students will receive a refund.

In any event where a customer wants to cancel their enrollment and is eligible for a full refund, a 5% processing fee will be deducted from the refund amount.

Reviews of Classes at Computer Training Source, Inc. (21)

Benefits of Booking Through CourseHorse

  • Booking is safe. When you book with us your details are protected by a secure connection.
  • Lowest price guaranteed. Classes on CourseHorse are never marked up.
  • This class will earn you 39950 points. Points give you money off your next class!

Questions & Answers (0)

Get quick answers from CourseHorse and past students.

Similar Classes

Computer Training Source, Inc.

Since 1991 Computer Training Source, Inc. has offered computer software training classes for business and individuals. We have multiple convenient training centers in Chicago Illinois.

Training can be held at our training centers or at your location. We offer regularly scheduled classes as well as private...

Read more about Computer Training Source, Inc.

CourseHorse Approved

This school has been carefully vetted by CourseHorse and is a verified Online educator.

Computer Training Source, Inc.

Give This Course as a Gift Card

  • Thousands of classes
  • No expiration
  • Unique and memorable gifts for any occasion
  • Personalized
  • Explore a passion, gain a new skill, discover a new hobby, engage in a memorable experience
  • Instant delivery
  • Lock in a price with the Inflation Buster Gift Card Price Adjuster™

Buy a Gift Card

Book this Class as a Group Event

Booking this class for a group? Find great private group events

Or see all Professional Group Events

Explore group events and team building activities ranging from cooking, art, escape rooms, trivia, and more.

CourseHorse Gift Cards

  • Creative & unique gift for any occasion
  • Thousands of classes & experiences
  • No expiration date
  • Instant e-delivery (or choose a date)
  • Add a personalized message
  • Lock in a price with the Inflation Buster Gift Card Price Adjuster™
Buy a Gift Card
gift card with the CourseHorse logo gift card with the CourseHorse logo