Welcome to Certified Information Systems Security Professional (CISSP®): Seventh Edition. With your completion of the prerequisites and necessary years of experience, you are firmly grounded in the knowledge requirements of today's security professional. This course will expand upon your knowledge by addressing the essential elements of the eight domains that comprise a Common Body of Knowledge (CBK®) for information systems security professionals. The course offers a job-related approach to the security process, while providing a framework to prepare for CISSP certification.

Certified Information Systems Security Professional (CISSP)

位教师:Bill Rosenthal
访问权限由 Coursera Learning Team 提供
您将学到什么
You will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.
您将获得的技能
- Identity and Access Management
- Risk Management Framework
- Cybersecurity
- Security Testing
- Security Engineering
- IT Security Architecture
- Data Security
- Asset Protection
- Security Management
- Incident Response
- Application Security
- Threat Modeling
- Infrastructure Security
- Risk Management
- Cloud Security
- Network Monitoring
- Security Controls
- Cryptography
- Network Security
- Information Systems Security
要了解的详细信息

添加到您的领英档案
1 项作业
March 2026
了解顶级公司的员工如何掌握热门技能

该课程共有9个模块
In this course, you will explore a broad range of security concepts and best practices designed to meet the demands of increasingly specialized information systems security. Before you address specific security areas or elements, it is important that you have a plan in place for the overall management of these processes and elements. In this lesson, you will understand what comprises successful security and risk management.
涵盖的内容
16个插件
16个插件•总计460分钟
- Getting Started with This Course•30分钟
- Lesson Introduction•5分钟
- Security Concepts•30分钟
- Security Governance Principles•30分钟
- Compliance•30分钟
- Professional Ethics•30分钟
- Security Documentation•30分钟
- Risk Management•30分钟
- Threat Modeling•30分钟
- Risk Response•30分钟
- Business Continuity Plan Fundamentals•30分钟
- Acquisition Strategy and Practice•30分钟
- Personnel Security Policies•30分钟
- Security Awareness and Training•30分钟
- Mastery Builder: Assessing Security and Risk Management•60分钟
- Lesson Summary•5分钟
In the last lesson, you learned the importance of the CIA triad and risk assessment and management. Because data is such an important asset to an organization, many of these same concepts will need to be applied to it as well. As data needs become more critical and the need to access it even more real time, it has become even more difficult to protect it. Organizations have always needed to protect their physical data assets and now they need to protect their logical data assets as well. Additionally, your users are no longer willing to exclusively work at their desk; they want whenever, wherever access. This means protecting data on more devices in more places than ever before. Companies need to consider all the places they store and transmit data and look for ways to protect it.
涵盖的内容
9个插件
9个插件•总计175分钟
- Lesson Introduction•5分钟
- Asset Classification•20分钟
- Secure Data Handling•20分钟
- Resource Provisioning and Protection•20分钟
- Manage Data Lifecycle•20分钟
- Asset Retention•20分钟
- Data Security Controls•20分钟
- Mastery Builder: Assessing Asset Security•45分钟
- Lesson Summary•5分钟
Now that you understand the relationship between assets, risks, and security, you can start to design cybersecurity for your organization.
涵盖的内容
15个插件
15个插件•总计490分钟
- Lesson Introduction•5分钟
- Security in the Engineering Lifecycle•35分钟
- System Component Security•35分钟
- Security Models•35分钟
- Controls and Countermeasures in Enterprise Security•35分钟
- Information System Security Capabilities•35分钟
- Design and Architecture Vulnerability Mitigation•35分钟
- Vulnerability Mitigation in Emerging Technologies•35分钟
- Cryptography Concepts•35分钟
- Cryptography Techniques•35分钟
- Cryptanalytic Attacks•35分钟
- Site and Facility Design for Physical Security•35分钟
- Physical Security Implementation in Sites and Facilities•35分钟
- Mastery Builder: Assessing Security Engineering•60分钟
- Lesson Summary•5分钟
In the last lesson, you learned about mitigation against vulnerabilities in system components, multiple architectures, and physical security. Many of those topics are pervasive in the CISSP® material, and you will see many of them throughout the course. Topics like defense in depth, cryptography, and network design will present themselves in regards to communication and network security as well. The network is changing, which means additional security measures are necessary. Voice and video are now delivered across the network, where before those were separate networks. Because the network has become such an important part of the business, protecting it has become critical. In this lesson, you will learn about security for your network systems.
涵盖的内容
7个插件
7个插件•总计315分钟
- Lesson Introduction•5分钟
- Network Protocol Security•65分钟
- Network Components Security•65分钟
- Communication Channel Security•65分钟
- Network Attack Mitigation•65分钟
- Mastery Builder: Assessing Communications and Network Security•45分钟
- Lesson Summary•5分钟
A large part of maintaining the confidentiality, integrity, and availability of your data and your systems depends on identity and access control. By properly identifying the user or systems that are trying to gain access, you can determine how much, if any, control to grant them. This keeps unwanted entities out of your systems, while ensuring that the proper entities have exactly what they need, and no more. In this lesson, you will learn about identity and access management.
涵盖的内容
8个插件
8个插件•总计280分钟
- Lesson Introduction•5分钟
- Physical and Logical Access Control•45分钟
- Identification and Authentication•45分钟
- Identity as a Service•45分钟
- Authorization Mechanisms•45分钟
- Access Control Attack Mitigation•45分钟
- Mastery Builder: Assessing Identity and Access Management•45分钟
- Lesson Summary•5分钟
Now that you have an awareness of the importance of identification and access management, you will learn the importance of security assessments and testing to verify the security of your organization. It is only when you have done a thorough risk assessment of both your physical and logical assets that you can begin the work of protecting the organization. This lesson will delve further into vulnerability assessments, penetration testing, log reviews, all around testing, and validating your security.
涵盖的内容
7个插件
7个插件•总计175分钟
- Lesson Introduction•5分钟
- System Security Control Testing•30分钟
- Software Security Control Testing•30分钟
- Security Process Data Collection•30分钟
- Audits•30分钟
- Mastery Builder: Assessing Security Assessment and Testing•45分钟
- Lesson Summary•5分钟
Security operations is a concept that encompasses two basic ideas: to ensure that day-to-day activities that support the business are protected against risk and to deeply integrate security processes within those activities. Recognizing the importance of both of these ideas is a necessary step in ensuring the organization functions without any impairment. In this lesson, you will learn about the integral link between security and your day-to-day business operations.
涵盖的内容
15个插件
15个插件•总计490分钟
- Lesson Introduction•5分钟
- Security Operations Concepts•35分钟
- Change Management•35分钟
- Physical Security•35分钟
- Personnel Security•35分钟
- Detective and Preventive Measures•35分钟
- Patch and Vulnerability Management•35分钟
- Logging and Monitoring•35分钟
- Incident Response•35分钟
- Investigations•35分钟
- Disaster Recovery Planning•35分钟
- Disaster Recovery Strategies•35分钟
- Disaster Recovery Implementation•35分钟
- Mastery Builder: Assessing Security Operations•60分钟
- Lesson Summary•5分钟
In the last lesson, you learned about security operations. Many organizations not only manage their network infrastructure and systems, but also develop software. This can be for in-house use, or to sell to customers. In this final lesson, you will learn about developing software securely.
涵盖的内容
8个插件
8个插件•总计230分钟
- Lesson Introduction•5分钟
- Security Principles in the System Lifecycle•35分钟
- Security Principles in the Software Development Lifecycle•35分钟
- Security Controls in the Development Environment•35分钟
- Database Security in Software Development•35分钟
- Software Security Effectiveness Assessment•35分钟
- Mastery Builder: Assessing Software Development Security•45分钟
- Lesson Summary•5分钟
You'll wrap things up and then validate what you've learned in this course by taking an assessment.
涵盖的内容
1个作业2个插件
1个作业•总计90分钟
- Course Assessment•90分钟
2个插件•总计35分钟
- Appendices•30分钟
- Course Summary•5分钟
位教师

提供方

提供方

Logical Operations is the world's largest general publisher of instructor-led technology curriculum, and a leader in the technical training community for over 40 years. We employ a rigorous, expert-driven authoring process that, for decades, has produced successful results for learners the world over. Our courseware aligns with real-world business needs and objectives, ensuring learners are able to apply their newly developed skills while on the job.
人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.

Jennifer J.

Larry W.

