This course features

Mobile-Ready

eBooks & Materials

100% Self Paced

Certificate of Completion

Education and National Certifications

  • Students should have or be pursuing a high school diploma or GED.
  • There is National Certification exams that are available to students who successfully complete this program:
    • Certified Information Systems Security Professional (CISSP)
    • IMPORTANT: In addition to this training program, earning certification requires the following:
      • 5 years of security work experience: You must be able to show proof of five paid full-time years of work experience in at least two of the eight CISSP CBK (Common Body of Knowledge) domains, which are Security and Risk Management, Asset Security, Security Engineering, Communications and Network Security, Identity and Access Management, Security Assessment and Testing, Security Operations, and Software Development Security.
      • Get endorsed to become a CISSP: Once you complete the CISSP exam, you'll have to subscribe to the (ISC)2 Code of Ethics and complete an endorsement form to become a CISSP. The endorsement form must be signed by another (ISC)2 certified professional who verifies your professional work experience. You must submit the completed form within nine months of passing your exam to become fully certified, because passing the exam doesn't automatically grant you certification status.

National Certification

Students who complete the Texas A&M University - Texarkana (TAMUT) Certified Information Systems Security Professional (CISSP) program will be prepared to sit for the Certified Information Systems Security Professional (CISSP) national certification exam(s). In order to work as a Certified Information Systems Security Professional (CISSP), many states nationwide are requiring that learners achieve national certification prior to working in that state. Students who complete this program are encouraged to complete the practical/clinical externship option with their program. This comprehensive program is designed to prepare students to sit for Certified Information Systems Security Professional (CISSP)exam(s). Students who complete this program can and do sit for the Certified Information Systems Security Professional (CISSP) national certification exam(s) and are qualified, eligible and prepared to do so.

Overview

Program Tuition: $1,250.00

Financing or payment plans option available. For more information, click on Request Information and fill out the contact form.

 

The CISSP Program

CISSP certified individuals are trained to ensure organizations meet information system security challenges,now and into the future. Certified Information Systems Security Professional (CISSP) is an information security certification developed by the International Information Systems Security Certification Consortium, also known as (ISC)². The CISSP designation is a globally recognized, vendor-neutral standard for attesting to an IT security professional's technical skills and experience in implementing and managing a security program. The CISSP is a certification sought by IT professionals with job titles such as security auditor, security systems engineer, security architect and chief information security officer, among others.

The Certified Information Systems Security Professional material introduces participants to all eight domains of advanced security knowledge covered on the CISSP exam. Participants learn how to model threats, assess risks, plan business continuity, protect assets, and engineer strong security into complex systems. Participants also learn how to protect networks, communications, access, and identities; assess and test security, and manage security operations. Once complete, participants will have core skills for designing, implementing, and managing IT security for entire organizations.

Program Objectives

At the conclusion of this program, students will be able to:

  • Perform risk management and apply security governance
  • Manage assets and protect data privacy
  • Implement secure design principles, security models, and cryptography
  • Test security from target identification through penetration testing
  • Improve security throughout the software development lifecycle
  • Implement and support firewalls and IDS/IPS
  • Use best practices for managing vulnerability, patches, and malware
  • Use Microsoft Office
Show More

Texas A&M University - Texarkana

Payment Options

Enrollment Options