CISSP Certified Information Systems Security Professional 2024
CISSP (Certified Information Systems Security Professional) is a globally recognized certification in the field of information security. The CISSP certification demonstrates a professional's expertise in designing, implementing, and managing a best-in-class cybersecurity program. The CISSP course is designed to help individuals prepare for the CISSP certification exam by providing a comprehensive understanding of the eight domains of information security covered by the exam.
The CISSP course covers topics such as access control, security architecture and engineering, cryptography, and risk management. The course also covers business continuity and disaster recovery planning, legal and regulatory compliance, and security operations, including incident response and recovery.
The CISSP course is ideal for individuals who have a minimum of five years of professional experience in the field of information security and are looking to advance their careers. The course is also suitable for individuals who are new to the field of information security and want to gain a comprehensive understanding of the concepts covered by the CISSP certification.
By completing the CISSP course, individuals will be able to demonstrate their expertise in information security and their ability to design and manage a best-in-class cybersecurity program. The CISSP certification is highly respected in the industry and is recognized by governments and organizations worldwide.
Your Instructor

Stone River eLearning was started in 2012, and since then we've trained over a million students. Our content is timely and up to date with high production value. Above all, our courses are well taught, so you'll learn more easily than the cut rate courses on some other sites.
Course Curriculum
-
StartFive Pillars of Information Security (7:30)
-
StartSecurity Concepts for Organizations (15:15)
-
StartSecurity Governance Principles (17:56)
-
StartSecurity Control Frameworks Foundation (5:06)
-
StartISO and NIST Security Control Frameworks (9:01)
-
StartOther Security Control Frameworks (17:53)
-
StartLegal Systems (9:38)
-
StartUnited States Laws and Regulations (13:19)
-
StartInternational Laws and Regulations (6:59)
-
StartLegal, Regulatory, and Compliance Issues (16:27)
-
StartInvestigation Types (12:02)
-
StartCompliance (21:06)
-
StartSecurity Documentation (17:56)
-
StartPersonnel Policies and Ethics (20:35)
-
StartSecurity Awareness (11:11)
-
StartBusiness Continuity Concepts (12:54)
-
StartBusiness Impact Analysis (BIA) (12:37)
-
StartBusiness Continuity Process (12:53)
-
StartRisk Management Concepts (17:44)
-
StartThreat and Vulnerability Identification (18:10)
-
StartRisk Analysis (21:32)
-
StartRisk Response-Treatment (6:34)
-
StartControl Implementation (16:13)
-
StartRisk Reporting and Continuous Monitoring (8:17)
-
StartRisk Frameworks (14:30)
-
StartThreat Modeling (19:36)
-
StartSupply Chain Risk Management (13:18)
-
StartAsset Classification (16:54)
-
StartData Classification (13:06)
-
StartInformation and Asset Handling (17:31)
-
StartProvisioning Information and Assets (16:49)
-
StartData Roles (15:12)
-
StartData Lifecycle Phases (18:17)
-
StartAsset Retention (11:03)
-
StartData States (12:56)
-
StartScoping and Tailoring (7:20)
-
StartStandards Selection (14:51)
-
StartData Protection Methods (9:51)