The Certified
Information Systems Security Professional (CISSP) is the most globally
recognized certification in the information security market. CISSP validates an
information security professional’s deep technical and managerial knowledge and
experience to effectively design, engineer, and manage the overall security
posture of an organization.
The broad
spectrum of topics included in the CISSP Common Body of Knowledge (CBK®) ensure its relevancy across all disciplines in the field of
information security. Successful candidates are competent in the following
eight domains:
- Security and Risk
Management
- Asset Security
- Security Architecture
and Engineering
- Communication and
Network Security
- Identity and Access
Management (IAM)
- Security Assessment and
Testing
- Security Operations
- Software Development
Security
- Understanding of the eight CISSP domains as
defined by (ISC)²
- Advanced knowledge of security and risk management
- Skills in asset security and information
classification
- Proficiency in security architecture and engineering
- Expertise in communications and network security
- Knowledge of identity and access management (IAM)
- Competence in security assessment and testing
- Ability to design and implement security operations
- Understanding of software development security
- Risk analysis, mitigation, and compliance management
- Incident response and disaster recovery planning
- Preparation for the CISSP certification exam
with exam strategies
- Hands-on experience through case studies and
real-world scenarios
- Critical thinking and problem-solving in
cybersecurity
- Enhanced professional credibility and leadership
in information security
Candidates must
have a minimum of five years cumulative, full-time experience in two or more of
the eight domains of the current CISSP Exam Outline. Earning a post-secondary
degree (bachelors or masters) in computer science, information technology (IT)
or related fields may satisfy up to one year of the required experience or an
additional credential from the ISC2 approved list may satisfy up to one year of
the required experience. Part-time work and internships may also count towards
the experience requirement.
A candidate that doesn’t
have the required experience to become a CISSP may become an Associate of ISC2
by successfully passing the CISSP examination. The Associate of ISC2 will then
have six years to earn the five years required experience. You can
learn more about CISSP experience requirements and
how to account for part-time work and internships
Domain 1. Security and Risk
Management
Domain 2. Asset Security
Domain 3. Security Architecture and
Engineering
Domain 4. Communication and Network
Security
Domain 5. Identity and Access
Management (IAM)
Domain 6. Security Assessment and
Testing
Domain 7. Security Operations
Domain 8. Software Development
Security
Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review. It is a proof for an employer, school, or other institution that you have successfully completed an online course.
|
 |
Accreditation
CISSP was the
first credential in the field of information security to meet the stringent requirements
of ANSI/ISO/IEC Standard 17024.
Job Task Analysis (JTA)
ISC2 has an
obligation to its membership to maintain the relevancy of the CISSP. Conducted
at regular intervals, the Job Task Analysis (JTA) is a methodical and critical
process of determining the tasks that are performed by security professionals
who are engaged in the profession defined by the CISSP. The results of the JTA
are used to update the examination. This process ensures that candidates are
tested on the topic areas relevant to the roles and responsibilities of today’s
practicing information security professionals.
Career Paths After Completing This
Course
- Chief Information Security Officer (CISO)
- Information Security Manager
- Security Architect
- IT Security Consultant
- Security Analyst
- Cybersecurity Manager
- Network Security Engineer
- Security Operations Center (SOC) Manager
- Risk and Compliance Manager
- Penetration Tester (with additional specialization)
- Information Assurance Analyst
- Systems Security Engineer
- IT Auditor
- Governance, Risk, and Compliance (GRC) Specialist
- Cloud Security Consultant
These roles are typically found in
sectors such as finance, healthcare, government, defense, technology, and
consulting.