This CISSP preparation resource equips learners with the knowledge and tools needed to succeed in the certification exam and excel in cybersecurity roles. It covers essential domains such as risk management, network security, and software development, with practical insights and expert guidance. Designed for professionals aiming to advance their careers, it provides a structured and comprehensive learning path.

CISSP Certified Information Security Professional Exam Guide
访问权限由 Coursera Learning Team 提供
推荐体验
推荐体验
中级
Ideal for IT professionals with experience in GRC, network, or systems administration.
推荐体验
推荐体验
中级
Ideal for IT professionals with experience in GRC, network, or systems administration.
您将学到什么
Secure network communications and routing effectively.
Understand the distinctions between encryption and hashing.
Apply certificate and digital signature usage in security contexts.
要了解的详细信息

添加到您的领英档案
23 项作业
April 2026
了解顶级公司的员工如何掌握热门技能

该课程共有23个模块
In this section, we explore the ISC2 Code of Ethics, the CIA triad, and aligning security governance with organizational goals to support ethical and effective decision-making.
涵盖的内容
2个视频3篇阅读材料1个作业
2个视频•总计2分钟
- Course Overview•1分钟
- Ethics, Security Concepts, and Governance Principles - Overview Video•1分钟
3篇阅读材料•总计40分钟
- Introduction•20分钟
- People Safety Concepts•10分钟
- Essential Security Frameworks•10分钟
1个作业•总计10分钟
- Foundations of Information Security and Governance•10分钟
In this section, we explore contractual, legal, and industry requirements, analyze privacy principles, and differentiate investigation types to ensure data protection and legal compliance.
涵盖的内容
1个视频5篇阅读材料1个作业
1个视频•总计1分钟
- Compliance, Regulation, and Investigations - Overview Video•1分钟
5篇阅读材料•总计60分钟
- Introduction•10分钟
- Legal Requirements•10分钟
- Privacy Requirements•10分钟
- Software Licensing•10分钟
- Privacy•20分钟
1个作业•总计10分钟
- Compliance and Regulatory Standards•10分钟
In this section, we explore developing security policies, conducting business impact analysis, and implementing business continuity plans to ensure operational resilience and compliance.
涵盖的内容
1个视频6篇阅读材料1个作业
1个视频•总计1分钟
- Security Policies and Business Continuity - Overview Video•1分钟
6篇阅读材料•总计60分钟
- Introduction•10分钟
- Publishing Phase•10分钟
- Standards•10分钟
- Developing and Documenting the Scope and the Plan•10分钟
- Candidate Screening and Hiring•10分钟
- Onboarding, Transfers, and Termination Processes•10分钟
1个作业•总计10分钟
- Security Policies and Business Continuity Fundamentals•10分钟
In this section, we explore risk management frameworks, threat identification, and SCRM and SETA strategies to mitigate risks and enhance organizational security through structured approaches.
涵盖的内容
1个视频7篇阅读材料1个作业
1个视频•总计1分钟
- Risk Management - Overview Video•1分钟
7篇阅读材料•总计60分钟
- Introduction•10分钟
- Risk Response•5分钟
- Countermeasure Selection and Implementation•10分钟
- Control Assessments•10分钟
- Risk Frameworks•10分钟
- Third-Party Assessment and Monitoring•5分钟
- SETA Programs•10分钟
1个作业•总计10分钟
- Risk Management Fundamentals•10分钟
In this section, we explore identifying and classifying digital assets, establishing secure handling requirements, and allocating resources based on asset value for effective cybersecurity management.
涵盖的内容
1个视频2篇阅读材料1个作业
1个视频•总计1分钟
- Asset and Privacy Protection - Overview Video•1分钟
2篇阅读材料•总计20分钟
- Introduction•10分钟
- Establishing Information and Asset Handling Requirements•10分钟
1个作业•总计10分钟
- Digital Asset and Privacy Protection Fundamentals•10分钟
In this section, we explore data life cycle management, asset retention, and security controls to ensure compliance and effective digital asset governance throughout their existence.
涵盖的内容
1个视频4篇阅读材料1个作业
1个视频•总计1分钟
- Information and Asset Handling - Overview Video•1分钟
4篇阅读材料•总计40分钟
- Introduction•10分钟
- Data Location•10分钟
- Asset Retention•10分钟
- Standards Selection•10分钟
1个作业•总计10分钟
- Data Governance and Security Fundamentals•10分钟
In this section, we explore secure design principles, analyze security models, and select controls based on system requirements using frameworks like STRIDE and Zero Trust.
涵盖的内容
1个视频5篇阅读材料1个作业
1个视频•总计1分钟
- Secure Design Principles and Controls - Overview Video•1分钟
5篇阅读材料•总计50分钟
- Introduction•10分钟
- Defense in Depth•10分钟
- Zero Trust•10分钟
- Clark-Wilson•10分钟
- Identifying Security Controls•10分钟
1个作业•总计10分钟
- Security Design Fundamentals•10分钟
In this section, we examine system architecture vulnerabilities and cryptographic methods to secure data. Key concepts include encryption types, attack mitigation, and practical applications in IoT and cloud systems.
涵盖的内容
1个视频13篇阅读材料1个作业
1个视频•总计1分钟
- Architecture Vulnerabilities and Cryptography - Overview Video•1分钟
13篇阅读材料•总计125分钟
- Introduction•10分钟
- Universal Security Models•10分钟
- Mitigating with Access Control Techniques•5分钟
- Mitigating Threats in System Virtualization•10分钟
- Industrial Control Systems•10分钟
- High-Performance Computing Systems•10分钟
- Web Application Security•10分钟
- End-to-End Encryption•10分钟
- Symmetric Encryption•10分钟
- Asymmetric Encryption•10分钟
- Hashing Algorithms•10分钟
- Public Key Infrastructure•10分钟
- Understanding Methods of Cryptanalytic Attacks•10分钟
1个作业•总计10分钟
- Security Fundamentals in Modern Systems•10分钟
In this section, we explore physical security principles for site design, facility controls, and HVAC measures to protect data and systems from unauthorized access and environmental threats.
涵盖的内容
1个视频4篇阅读材料1个作业
1个视频•总计1分钟
- Facilities and Physical Security - Overview Video•1分钟
4篇阅读材料•总计40分钟
- Introduction•10分钟
- Physical and Electronic Locks•10分钟
- Machine Learning and AI•10分钟
- Utilities and Heating Ventilation and Air Conditioning HVAC•10分钟
1个作业•总计10分钟
- Facilities and Physical Security Fundamentals•10分钟
In this section, we explore secure network design using OSI and TCP/IP models, focusing on layer-based security analysis and real-world protocol implications.
涵盖的内容
1个视频4篇阅读材料1个作业
1个视频•总计1分钟
- Network Architecture Security - Overview Video•1分钟
4篇阅读材料•总计40分钟
- Introduction•10分钟
- OSI Layer 3 Network•10分钟
- TCP/IP Model•10分钟
- Software Defined Networks and Software-Defined Wide Area Networks•10分钟
1个作业•总计10分钟
- Network Security Fundamentals•10分钟
In this section, we explore securing network components and communication channels to ensure data confidentiality, integrity, and protection against vulnerabilities in network environments.
涵盖的内容
1个视频3篇阅读材料1个作业
1个视频•总计1分钟
- Securing Communication Channels - Overview Video•1分钟
3篇阅读材料•总计30分钟
- Introduction•10分钟
- Endpoint Security•10分钟
- Remote Access•10分钟
1个作业•总计10分钟
- Securing Communication Channels•10分钟
In this section, we explore identity and access management, focusing on secure access control, federation, and user provisioning to balance data security and operational efficiency.
涵盖的内容
1个视频3篇阅读材料1个作业
1个视频•总计1分钟
- Identity, Access Management, and Federation - Overview Video•1分钟
3篇阅读材料•总计30分钟
- Introduction•10分钟
- Identity Provisioning•10分钟
- Authentication Methods•10分钟
1个作业•总计10分钟
- Identity and Access Management Fundamentals•10分钟
In this section, we explore implementing authentication systems for third parties, analyzing authentication and access control mechanisms, and designing secure collaboration strategies using federated identity management and SSO.
涵盖的内容
1个视频5篇阅读材料1个作业
1个视频•总计1分钟
- Identity Management Implementation - Overview Video•1分钟
5篇阅读材料•总计50分钟
- Introduction•10分钟
- OpenID Connect•10分钟
- Kerberos Authentication•10分钟
- Kerberos Attacks•10分钟
- Risk-Based Access Controls•10分钟
1个作业•总计10分钟
- Identity Management Fundamentals•10分钟
In this section, we explore designing and validating security assessment strategies, conducting control testing, and ensuring audit outcomes are accurate and actionable for continuous improvement.
涵盖的内容
1个视频6篇阅读材料1个作业
1个视频•总计1分钟
- Designing and Conducting Security Assessments - Overview Video•1分钟
6篇阅读材料•总计60分钟
- Introduction•10分钟
- Conducting an External Audit•10分钟
- Conducting Security Control Testing•10分钟
- Log Reviews•10分钟
- Code Review and Testing•10分钟
- Interface Testing•10分钟
1个作业•总计10分钟
- Security Assessment Fundamentals•10分钟
In this section, we explore collecting and analyzing security data to improve system resilience, focusing on audit processes, disaster recovery, and effective reporting techniques.
涵盖的内容
1个视频2篇阅读材料1个作业
1个视频•总计1分钟
- Designing and Conducting Security Testing - Overview Video•1分钟
2篇阅读材料•总计30分钟
- Introduction•10分钟
- Backup Verification Data•20分钟
1个作业•总计10分钟
- Security Testing and Business Continuity Fundamentals•10分钟
In this section, we explore pre-incident planning for security operations, focusing on incident response, logging, monitoring, and configuration management to ensure operational resilience and effective threat response.
涵盖的内容
1个视频11篇阅读材料1个作业
1个视频•总计1分钟
- Planning for Security Operations - Overview Video•1分钟
11篇阅读材料•总计110分钟
- Introduction•10分钟
- Policies and Guidelines•10分钟
- Extended Detection and Response•10分钟
- Conducting Logging and Monitoring Activities•10分钟
- XDR-Based Approach•10分钟
- Operating a SIEM System•10分钟
- Intelligence Cycle•10分钟
- Performing Configuration Management•10分钟
- Applying Foundational Security Operations Concepts•10分钟
- Attack Graphs•10分钟
- Job Rotation•10分钟
1个作业•总计10分钟
- Security Operations Planning Fundamentals•10分钟
In this section, we explore the incident response cycle, detective and preventive security measures, and patch and vulnerability management for practical security operations.
涵盖的内容
1个视频10篇阅读材料1个作业
1个视频•总计1分钟
- Security Operations - Overview Video•1分钟
10篇阅读材料•总计100分钟
- Introduction•10分钟
- Response•10分钟
- Lateral Movement•10分钟
- Reporting•10分钟
- Operating and Maintaining Detective and Preventive Measures•10分钟
- Hunting and Endpoint Queries•10分钟
- Intrusion Detection and Prevention Systems•10分钟
- Sandboxing•10分钟
- The Zero Trust Concept•10分钟
- Remediation•10分钟
1个作业•总计10分钟
- Security Operations Fundamentals•10分钟
In this section, we explore disaster recovery strategies, testing plans, and recovery site options to ensure IT system availability and resilience in real-world scenarios.
涵盖的内容
1个视频5篇阅读材料1个作业
1个视频•总计1分钟
- Disaster Recovery - Overview Video•1分钟
5篇阅读材料•总计50分钟
- Introduction•10分钟
- Recovery Site Strategies•10分钟
- Multiple Processing Sites•10分钟
- Implementing Disaster Recovery Processes•10分钟
- Lessons Learned•10分钟
1个作业•总计10分钟
- Disaster Recovery Fundamentals•10分钟
In this section, we examine business continuity, personnel, and physical security, focusing on stakeholder collaboration, access controls, and safety protocols to enhance organizational resilience and disaster recovery planning.
涵盖的内容
1个视频4篇阅读材料1个作业
1个视频•总计1分钟
- Business Continuity, Personnel, and Physical Security - Overview Video•1分钟
4篇阅读材料•总计40分钟
- Introduction•10分钟
- Implement and Manage Physical Security•10分钟
- Security Auditing of Physical Access Systems•10分钟
- Travel•10分钟
1个作业•总计10分钟
- Business Continuity and Organizational Security Fundamentals•10分钟
In this section, we explore secure software development methodologies, maturity models, and change management to ensure application security and functionality throughout the life cycle.
涵盖的内容
1个视频4篇阅读材料1个作业
1个视频•总计1分钟
- Software Development Life Cycle Security - Overview Video•1分钟
4篇阅读材料•总计40分钟
- Introduction•10分钟
- Agile•10分钟
- Maturity Models•10分钟
- Operations and Maintenance•10分钟
1个作业•总计10分钟
- Software Development Life Cycle Security Fundamentals•10分钟
In this section, we explore secure coding practices, SAST and DAST integration in CI/CD, and automation of security testing to reduce application vulnerabilities.
涵盖的内容
1个视频1篇阅读材料1个作业
1个视频•总计1分钟
- Software Development Security Controls - Overview Video•1分钟
1篇阅读材料•总计20分钟
- Software Development Security Controls - The Reading•20分钟
1个作业•总计10分钟
- Security in Software Development Lifecycle•10分钟
In this section, we examine software security effectiveness, evaluate risks of acquired software, and analyze common vulnerabilities to enhance digital system protection.
涵盖的内容
1个视频3篇阅读材料1个作业
1个视频•总计1分钟
- Securing Software Development - Overview Video•1分钟
3篇阅读材料•总计30分钟
- Introduction•10分钟
- Buffer Overflows•10分钟
- Assess the Security Impact of Acquired Software•10分钟
1个作业•总计10分钟
- Securing Software Development Fundamentals•10分钟
In this section, we examine secure coding practices, source code vulnerabilities, and database security to build resilient systems and protect data integrity.
涵盖的内容
1个视频4篇阅读材料1个作业
1个视频•总计1分钟
- Secure Coding Guidelines, Third-Party Software, and Databases - Overview Video•1分钟
4篇阅读材料•总计50分钟
- Introduction•10分钟
- Third-Party Trust•20分钟
- Processing Database Transactions•10分钟
- Polyinstantiation•10分钟
1个作业•总计10分钟
- Secure Software Development and Database Management•10分钟
位教师

提供方

提供方

Packt helps tech professionals put software to work by distilling and sharing the working knowledge of their peers. Packt is an established global technical learning content provider, founded in Birmingham, UK, with over twenty years of experience delivering premium, rich content from groundbreaking authors on a wide range of emerging and popular technologies.
人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.

Jennifer J.

Larry W.

Chaitanya A.
从 Information Technology 浏览更多内容
LLogical Operations
课程

课程


