Welcome to Certified Information Systems Security Professional (CISSP®): Seventh Edition. With your completion of the prerequisites and necessary years of experience, you are firmly grounded in the knowledge requirements of today's security professional. This course will expand upon your knowledge by addressing the essential elements of the eight domains that comprise a Common Body of Knowledge (CBK®) for information systems security professionals. The course offers a job-related approach to the security process, while providing a framework to prepare for CISSP certification.

Certified Information Systems Security Professional (CISSP)
Seize the savings! Get 40% off 3 months of Coursera Plus and full access to thousands of courses.

What you'll learn
You will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.
Details to know

Add to your LinkedIn profile
March 2026
1 assignment
See how employees at top companies are mastering in-demand skills

There are 9 modules in this course
In this course, you will explore a broad range of security concepts and best practices designed to meet the demands of increasingly specialized information systems security. Before you address specific security areas or elements, it is important that you have a plan in place for the overall management of these processes and elements. In this lesson, you will understand what comprises successful security and risk management.
What's included
1 reading16 plugins
In the last lesson, you learned the importance of the CIA triad and risk assessment and management. Because data is such an important asset to an organization, many of these same concepts will need to be applied to it as well. As data needs become more critical and the need to access it even more real time, it has become even more difficult to protect it. Organizations have always needed to protect their physical data assets and now they need to protect their logical data assets as well. Additionally, your users are no longer willing to exclusively work at their desk; they want whenever, wherever access. This means protecting data on more devices in more places than ever before. Companies need to consider all the places they store and transmit data and look for ways to protect it.
What's included
9 plugins
Now that you understand the relationship between assets, risks, and security, you can start to design cybersecurity for your organization.
What's included
15 plugins
In the last lesson, you learned about mitigation against vulnerabilities in system components, multiple architectures, and physical security. Many of those topics are pervasive in the CISSP® material, and you will see many of them throughout the course. Topics like defense in depth, cryptography, and network design will present themselves in regards to communication and network security as well. The network is changing, which means additional security measures are necessary. Voice and video are now delivered across the network, where before those were separate networks. Because the network has become such an important part of the business, protecting it has become critical. In this lesson, you will learn about security for your network systems.
What's included
7 plugins
A large part of maintaining the confidentiality, integrity, and availability of your data and your systems depends on identity and access control. By properly identifying the user or systems that are trying to gain access, you can determine how much, if any, control to grant them. This keeps unwanted entities out of your systems, while ensuring that the proper entities have exactly what they need, and no more. In this lesson, you will learn about identity and access management.
What's included
8 plugins
Now that you have an awareness of the importance of identification and access management, you will learn the importance of security assessments and testing to verify the security of your organization. It is only when you have done a thorough risk assessment of both your physical and logical assets that you can begin the work of protecting the organization. This lesson will delve further into vulnerability assessments, penetration testing, log reviews, all around testing, and validating your security.
What's included
7 plugins
Security operations is a concept that encompasses two basic ideas: to ensure that day-to-day activities that support the business are protected against risk and to deeply integrate security processes within those activities. Recognizing the importance of both of these ideas is a necessary step in ensuring the organization functions without any impairment. In this lesson, you will learn about the integral link between security and your day-to-day business operations.
What's included
15 plugins
In the last lesson, you learned about security operations. Many organizations not only manage their network infrastructure and systems, but also develop software. This can be for in-house use, or to sell to customers. In this final lesson, you will learn about developing software securely.
What's included
8 plugins
You'll wrap things up and then validate what you've learned in this course by taking an assessment.
What's included
1 assignment2 plugins
Instructor

Offered by
Why people choose Coursera for their career

Felipe M.

Jennifer J.

Larry W.

Chaitanya A.

Open new doors with Coursera Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy
Frequently asked questions
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
When you purchase a Certificate you get access to all course materials, including graded assignments. Upon completing the course, your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.
More questions
Financial aid available,

