Online Certified Information Systems Security Professional Course

Earn your CISSP certification and join the expanding world of cybersecurity.

Quick Details

Towson University's online Certified Information Systems Security Professional (CISSP) certification course is an advanced level course designed to ensure that someone handling computer security has mastered a standardized body of knowledge. Completion of this course prepares you to sit for the CISSP certification exam.

Total Hours: 150

Tuition: $2,599 includes all instructional materials

Location: Online

This course is WIOA approved and is on the Maryland Eligible Training Provider List (ETPL).

This course is delivered by our education partners at ed2go.

Upcoming Date Schedule REGISTER
Open enrollment. Begin anytime. Set your own. Must be completed within six months of registration. Register

We create opportunities for Greater Baltimore’s Workforce. 

Learn More

Have questions? We have answers.

Request Information

More About This Course

The CISSP is considered the world’s leading information security credential. It is held by Information Security Officers and Directors of Security from many of the world’s most recognizable institutions and organizations. It is among the few security certifications to meet the US Department of Defense’s cybersecurity training requirements.

Information security professionals operate in the realm of extreme confidentiality and trust. Earning a certification such as the CISSP signals to employers of this caliber that a prospect is dedicated to their craft and committed to operating at the highest levels.

Our CISSP certification course is divided into eight practical modules that directly correspond to the CISSP exam study guide. You will:

  • Be prepared to earn the Certified Information Systems Security Professional (CISSP) exam
  • Learn how to handle security and risk management
  • Understand asset security
  • Know how to implement security engineering
  • Realize best practices for communications and network security
  • Master identity and access management

Job outlook for Certified Information Systems Security Professionals

  • Growth in demand for information security specialists is burgeoning. Cyber Defense Magazine estimates that around 1.8 million new cybersecurity professionals will be needed in just the next few years.
  • Long term, the US Bureau of Labor Statistics (BLS) considers cybersecurity one of its fastest-growing career areas. It expects job growth of 32% between now and 2028, a rate over five times the average for all jobs.
  • As more and more organizations and individuals entrust highly confidential and valuable data to online systems, pay rates for highly qualified information security professionals continues to rise. According to the BLS, information security specialists earned $99,730 on average in 2019.

Module 1. Security and Risk Management

  • Security Governance
  • Security Policies
  • Confidentiality
  • Business Continuity
  • Legal and Regulatory
  • Professional Ethic
  • Risk Management

Module 2. Asset Security

  • Information Classification
  • Handling Requirements
  • Ownership
  • Data Security Controls
  • Protect Privacy
  • Retention

Module 3. Security Engineering

  • Security Models
  • Security Designs
  • Engineering Processes
  • Vulnerabilities
  • Cryptography
  • Embedded Devices
  • Site Design and Security

Module 4. Communication and Network Security

  • Network Architecture Design
  • Network Components
  • Communication Channels
  • Network Attacks

Module 5. Identity and Access Management

  • Physical and Logical Assets Control
  • Identification and Authentication
  • Third-Party Identity Services
  • Identity as a Service
  • Provisioning Lifecycle
  • Authorization Mechanisms

Module 6. Security Assessment and Testing

  • Assessment and Test Strategies
  • Test Outputs
  • Security Control Testing
  • Security Process Data
  • Security Architectures

Module 7. Security Operations

  • Foundational Security Operations Concepts
  • Logging, Monitoring and Investigating Activities
  • Provisioning of Resources
  • Management Processes
  • Physical Security
  • Preventative Measures
  • Business Continuity

Module 8. Software Development Security

  • Security in the Software Development Lifecycle
  • Development Environment Security Controls
  • Software Security Effectiveness
  • Software Security Impact

Course Outline (PDF)

To succeed in this course, you must have a strong background in systems security or hold a Systems Security Certified Practitioner (SSCP) certification. To earn your CISSP certification, you must have a minimum of five-years work experience in two of the eight domains of CISSP.

The cost of the exam is not included with the tuition. Learn more about exam requirements and determine which you are eligible to take.

Hardware Requirements

  • This course can be taken on either a PC or Mac.
  • Webcams are strongly recommended.

Software Requirements

  • PC: Windows XP or later.
  • Mac: OS X Snow Leopard 10.6 or later.
  • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
  • Microsoft Word (not included in enrollment).
  • Windows Media Player.
  • Adobe Flash Player. Download the Flash Player.
  • Adobe Acrobat Reader. Download the Acrobat Reader.
  • Software must be installed and fully operational before the course begins.

Other

  • Email capabilities and access to a personal email account.

*NOTE: WIOA, G.I. Bill®, and other specialized workforce assistance programs are not eligible for discounts.