This comprehensive course covers the full breadth of the CISSP certification, spanning all eight domains. You will begin with Security and Risk Management, exploring essential concepts such as governance, legal regulations, and business continuity. Through detailed lessons on compliance and investigation requirements, you’ll build a solid foundation in risk management and threat modeling. Each video is crafted to clarify intricate ideas, preparing you for real-world security challenges.
Recommended experience
What you'll learn
Define key security concepts, including risk management and cryptography.
Implement security controls across networks, systems, and software development processes.
Evaluate threats and vulnerabilities to design secure architectures and systems.
Develop comprehensive security solutions that align with organizational goals and industry standards.
Skills you'll gain
Details to know
Add to your LinkedIn profile
October 2024
4 assignments
See how employees at top companies are mastering in-demand skills
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review
There are 8 modules in this course
In this module, we will explore the critical aspects of security and risk management, beginning with foundational concepts and progressing through governance, compliance, and legal frameworks. You will also learn key topics such as risk management, business continuity, personnel security, and threat modeling, culminating in strategies for managing supply chain risks and delivering effective security training.
What's included
11 videos
In this module, we will focus on the management and security of information assets, covering topics such as data classification, asset handling, and secure provisioning. You'll gain an understanding of the roles involved in managing data, how to handle asset retention at different stages of its lifecycle, and how to apply security controls and compliance requirements to protect organizational resources.
What's included
6 videos
In this module, we will delve into the architectural and engineering processes crucial to building secure systems. Topics will cover security models, cryptographic solutions, and security controls development. You’ll also learn about the security of different system types, including databases and microservices, while understanding cryptanalytic attacks and the integration of security principles into facility design.
What's included
10 videos1 assignment
In this module, we will explore the foundational elements of communication and network security. You will learn how to design secure networks by understanding the OSI and TCP/IP models, implement robust network hardware and components, and ensure secure communication protocols to protect data during transmission.
What's included
3 videos
In this module, we will cover the principles of identity and access management, focusing on controlling access to both physical and logical assets. You will learn about managed identification, federated identities, and authorization processes, along with key authentication systems like SSO, OpenID, and OAuth, ensuring secure and efficient access control throughout the identity lifecycle.
What's included
6 videos
In this module, we will examine the processes involved in security assessment and testing. You will learn how to design and validate assessments and audits, test security controls, and gather critical security data. Additionally, we will focus on analyzing test outputs and creating detailed reports to enhance organizational security measures.
What's included
4 videos1 assignment
In this module, we will explore the key elements of security operations, including investigation procedures, logging and monitoring, and configuration management. You’ll also learn about resource protection, the operation of detective and preventative controls, vulnerability management, and response strategies for disasters, along with essential practices for physical security and safety.
What's included
9 videos
In this module, we will focus on the integration of security within the software development process, emphasizing the importance of secure methodologies and maturity models in the SDLC. You’ll learn about security controls in each development phase, how to assess software security through audits, and how to implement secure coding guidelines to prevent common software vulnerabilities.
What's included
4 videos2 assignments
Instructor
Offered by
Recommended if you're interested in Security
Google Cloud
Google Cloud
Google Cloud
Why people choose Coursera for their career
New to Security? Start here.
Open new doors with Coursera Plus
Unlimited access to 7,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy
Frequently asked questions
Yes, you can preview the first video and view the syllabus before you enroll. You must purchase the course to access content not included in the preview.
If you decide to enroll in the course before the session start date, you will have access to all of the lecture videos and readings for the course. You’ll be able to submit assignments once the session starts.
Once you enroll and your session begins, you will have access to all videos and other resources, including reading items and the course discussion forum. You’ll be able to view and submit practice assessments, and complete required graded assignments to earn a grade and a Course Certificate.