Certified Information Systems Security Professional Course
Earn your CISSP certification and join the expanding world of cybersecurity.
Quick Details
Towson University's Certified Information Systems Security Professional (CISSP) certification course is an advanced level course designed to ensure that someone handling computer security
has mastered a standardized body of knowledge. Completion of this course prepares
you to sit for the CISSP certification exam.
Course Format: Self-paced, online
Total Hours: 150 hours
Program Duration: Must be completed in 6 months
Tuition: $2,599
Materials: Tuition includes all instructional materials
This course is WIOA approved and is on the Maryland Eligible Training Provider List (ETPL).
This course is delivered by our education partners at ed2go.
Upcoming Date | Schedule | REGISTER |
---|---|---|
Open enrollment. Begin anytime. | Set your own. Must be completed within six months of registration. | Register |
Ask us about payment plan options.
Connect with usHave questions? We have answers.
Request InformationMore About This Course
Course Overview
The CISSP is considered the world’s leading information security credential. It is held by Information Security Officers and Directors of Security from many of the world’s most recognizable institutions and organizations. It is among the few security certifications to meet the US Department of Defense’s cybersecurity training requirements.
Information security professionals operate in the realm of extreme confidentiality and trust. Earning a certification such as the CISSP signals to employers of this caliber that a prospect is dedicated to their craft and committed to operating at the highest levels.
Our CISSP certification course is divided into eight practical modules that directly correspond to the CISSP exam study guide. You will:
- Be prepared to earn the Certified Information Systems Security Professional (CISSP) exam
- Learn how to handle security and risk management
- Understand asset security
- Know how to implement security engineering
- Realize best practices for communications and network security
- Master identity and access management
Job outlook for Certified Information Systems Security Professionals
- Growth in demand for information security specialists is burgeoning. Cyber Defense Magazine estimates that around 1.8 million new cybersecurity professionals will be needed in just the next few years.
- Long term, the US Bureau of Labor Statistics (BLS) considers cybersecurity one of its fastest-growing career areas. It expects job growth of 32% between now and 2028, a rate over five times the average for all jobs.
- As more and more organizations and individuals entrust highly confidential and valuable data to online systems, pay rates for highly qualified information security professionals continues to rise. According to the BLS, information security specialists earned $99,730 on average in 2019.
Course Outline
Module 1. Security and Risk Management
- Security Governance
- Security Policies
- Confidentiality
- Business Continuity
- Legal and Regulatory
- Professional Ethic
- Risk Management
Module 2. Asset Security
- Information Classification
- Handling Requirements
- Ownership
- Data Security Controls
- Protect Privacy
- Retention
Module 3. Security Engineering
- Security Models
- Security Designs
- Engineering Processes
- Vulnerabilities
- Cryptography
- Embedded Devices
- Site Design and Security
Module 4. Communication and Network Security
- Network Architecture Design
- Network Components
- Communication Channels
- Network Attacks
Module 5. Identity and Access Management
- Physical and Logical Assets Control
- Identification and Authentication
- Third-Party Identity Services
- Identity as a Service
- Provisioning Lifecycle
- Authorization Mechanisms
Module 6. Security Assessment and Testing
- Assessment and Test Strategies
- Test Outputs
- Security Control Testing
- Security Process Data
- Security Architectures
Module 7. Security Operations
- Foundational Security Operations Concepts
- Logging, Monitoring and Investigating Activities
- Provisioning of Resources
- Management Processes
- Physical Security
- Preventative Measures
- Business Continuity
Module 8. Software Development Security
- Security in the Software Development Lifecycle
- Development Environment Security Controls
- Software Security Effectiveness
- Software Security Impact
Prerequisites
To succeed in this course, you must have a strong background in systems security or hold a Systems Security Certified Practitioner (SSCP) certification. To earn your CISSP certification, you must have a minimum of five-years work experience in two of the eight domains of CISSP.
Certification Exam
The cost of the exam is not included with the tuition. Learn more about exam requirements and determine which you are eligible to take.
Instructor Support
Students are supported by both an assigned instructor and assigned advisor throughout the duration of the course. Students receive contact information for both upon enrollment and all communication is handled via email. Students should allow up to two business days for responses.
Technology Requirements
Hardware Requirements
- This course can be taken on either a PC or Mac.
- Webcams are strongly recommended.
Software Requirements
- PC: Windows XP or later.
- Mac: OS X Snow Leopard 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word (not included in enrollment).
- Windows Media Player.
- Adobe Acrobat Reader. Download the Acrobat Reader.
- Software must be installed and fully operational before the course begins.
Other
- Email capabilities and access to a personal email account.
*NOTE: WIOA and other tuition assistance programs are not eligible for course discounts.