Enable job alerts via email!

Certified Information Systems Security Professional (CISSP) CISSP.AE2

uCertify

United States

Remote

USD 70,000 - 100,000

Full time

Today
Be an early applicant

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

Join a leading company offering a CISSP online course designed to prepare IT professionals for the CISSP certification. This self-paced course covers essential cybersecurity skills, from risk management to network security, equipping you for high-paying roles in the field. With interactive lessons and assessments, you'll gain the knowledge needed to excel in your cybersecurity career.

Qualifications

  • 5 years of work experience as a security analyst or similar role required.
  • Full-time paid work in at least two of the eight domains covered in the CISSP.

Responsibilities

  • Design and implement cybersecurity systems.
  • Prepare for CISSP exam and develop cybersecurity skills.
  • Manage security operations and compliance.

Skills

Risk Assessment
Security Management
Network Security
Compliance
Governance
Incident Response
Cryptography

Education

CISSP Certification

Job description

Certified Information Systems Security Professional (CISSP)

Learn to design and implement the best cybersecurity systems and increase your chances of securing the CISSP certification.

Access detailed information about the course content, learning objectives, activities, and assessments before adding it to your curriculum.

Certified Information Systems Security Professional (CISSP)

Looking to pass the CISSP exam and level up your cybersecurity career? Join our CISSP online course to prepare well and develop polished cybersecurity skills.

This self-paced, interactive course follows the latest ISC2 CISSP exam domains, covering everything from risk management to network security and identity access management.

Whether you're an IT professional, security consultant, or manager, this training gives you the knowledge and skills to ace the exam and step into high-paying security roles.

Skills You’ll Get
  • Learn security management, risk assessment, compliance, and governance to protect critical assets.
  • Secure networks, prevent cyberattacks, and implement firewalls, VPNs, and IDS/IPS.
  • Manage user access with multi-factor authentication, RBAC, and SSO.
  • Perform security operations to detect, analyze, and respond to cybersecurity threats in real-time.
  • Protect sensitive data with encryption, hashing, and cryptographic key management.
  • Identify vulnerabilities, conduct penetration testing, and ensure compliance with security assessment and testing.
  • Ensure software development security and implement secure coding practices to protect applications from cyber threats.
Watch Videos

22+ Interactive Lessons |540+ Exercises |417+ Quizzes |840+ Flashcards |420+ Glossary of terms

Gamified TestPrep

108+ Pre Assessment Questions |3+ Full Length Tests |108+ Post Assessment Questions |324+ Practice Test Questions

Security Governance Through Principles and Policies
  • Security 101
  • Understand and Apply Security Concepts
  • Security Boundaries
  • Evaluate and Apply Security Governance Principles
  • Manage the Security Function
  • Security Policy, Standards, Procedures, and Guidelines
  • Threat Modeling
  • Supply Chain Risk Management
  • Summary
3
Personnel Security and Risk Management Concepts
  • Personnel Security Policies and Procedures
  • Understand and Apply Risk Management Concepts
  • Establish and Maintain a Security Awareness, Education, and Training Program
  • Summary
4
Business Continuity Planning
  • Planning for Business Continuity
  • Project Scope and Planning
  • Business Impact Analysis
  • Continuity Planning
  • Plan Approval and Implementation
  • Summary
5
Laws, Regulations, and Compliance
  • Categories of Laws
  • Laws
  • State Privacy Laws
  • Compliance
  • Contracting and Procurement
  • Summary
6
Protecting Security of Assets
  • Identifying and Classifying Information and Assets
  • Establishing Information and Asset Handling Requirements
  • Data Protection Methods
  • Understanding Data Roles
  • Using Security Baselines
  • Summary
7
Cryptography and Symmetric Key Algorithms
  • Cryptographic Foundations
  • Modern Cryptography
  • Symmetric Cryptography
  • Cryptographic Life Cycle
  • Summary
8
PKI and Cryptographic Applications
  • Asymmetric Cryptography
  • Hash Functions
  • Digital Signatures
  • Public Key Infrastructure
  • Asymmetric Key Management
  • Hybrid Cryptography
  • Applied Cryptography
  • Cryptographic Attacks
  • Summary
9
Principles of Security Models, Design, and Capabilities
  • Understand the Fundamental Concepts of Security Models
  • Select Controls Based on Systems Security Requirements
  • Understand Security Capabilities of Information Systems
  • Summary
10
Security Vulnerabilities, Threats, and Countermeasures
  • Shared Responsibility
  • Data Localization and Data Sovereignty
  • Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements
  • Client-Based Systems
  • Server-Based Systems
  • Distributed Systems
  • High-Performance Computing (HPC) Systems
  • Real-Time Operating Systems
  • Internet of Things
  • Edge and Fog Computing
  • Embedded Devices and Cyber-Physical Systems
  • Microservices
  • Infrastructure as Code
  • Virtualized Systems
  • Containerization
  • Essential Security Protection Mechanisms
  • Common Security Architecture Flaws and Issues
  • Summary
11
Physical Security Requirements
  • Apply Security Principles to Site and Facility Design
  • Implement Site and Facility Security Controls
  • Implement and Manage Physical Security
  • Summary
12
Secure Network Architecture and Components
  • OSI Model
  • TCP/IP Model
  • Analyzing Network Traffic
  • Common Application Layer Protocols
  • Transport Layer Protocols
  • Domain Name System
  • Internet Protocol (IP) Networking
  • ARP Concerns
  • Secure Communication Protocols
  • Implications of Multilayer Protocols
  • Edge Networks
  • Wireless Networks
  • Satellite Communications
  • Content Distribution Networks (CDNs)
  • Summary
13
Secure Communications and Network Attacks
  • Protocol Security Mechanisms
  • Secure Voice Communications
  • Remote Access Security Management
  • Monitoring and Management
  • Manage Email Security
  • Virtual Private Network
  • Switching and Virtual LANs
  • Network Address Translation
  • Third-Party Connectivity
  • Switching Technologies
  • WAN Technologies
  • Fiber-Optic Links
  • Prevent or Mitigate Network Attacks
  • Summary
14
Managing Identity and Authentication
  • Controlling Access to Assets
  • The AAA Model
  • Implementing Identity Management
  • Managing the Identity and Access Provisioning Life Cycle
  • Summary
15
Controlling and Monitoring Access
  • Comparing Access Control Models
  • Zero-Trust Access Policy Enforcement
  • Summary
16
Security Assessment and Testing
  • Building a Security Assessment and Testing Program
  • Performing Vulnerability Assessments
  • Testing Your Software
  • Training and Exercises
  • Implementing Security Management Processes and Collecting Security Process Data
  • Summary
17
Managing Security Operations
  • Apply Foundational Security Operations Concepts
  • Address Personnel Safety and Security
  • Provision Information and Assets Securely
  • Apply Resource Protection
  • Managed Services in the Cloud
  • Perform Configuration Management (CM)
  • Manage Change
  • Manage Patches and Reduce Vulnerabilities
  • Summary
18
Preventing and Responding to Incidents
  • Implementing Detection and Preventive Measures
  • Logging and Monitoring
  • Summary
19
Disaster Recovery Planning
  • The Nature of Disaster
  • Understand System Resilience, High Availability, and Fault Tolerance
  • Recovery Strategy
  • Recovery Plan Development
  • Training, Awareness, and Documentation
  • Testing and Maintenance
  • Summary
20
Investigations and Ethics
  • Investigations
  • Major Categories of Computer Crime
  • Ethics
  • Summary
21
Software Development Security
  • Introducing Systems Development Controls
  • Establishing Databases and Data Warehousing
  • Storage Threats
  • Understanding Knowledge-Based Systems
  • Summary
22
Malicious Code and Application Attacks
  • Malware
  • Malware Prevention
  • Application Security Controls
  • Secure Coding Practices
  • Summary
Any questions?
Check out the FAQs

Read answers to commonly asked questions about this certification exam.

Certified Information Systems Security Professional certificate (CISSP) is a globally recognized cybersecurity certification that validates your expertise in security management, risk assessment, and network security. It’s highly valued by employers and can open doors to high-paying security roles.

To be eligible for Certified Information Systems Security Professional certification:

  • You need to have at least five years of work experience as a security analyst or similar role.
  • Full-time paid work in at least two of the eight domains covered in the CISSP.

Yes, you can clear the exam in 3 months of preparation, all you need is a consistent study routine and structured study materials with practice tests. With uCertify, you’ll get proper course content with hands-on labs, real-world scenarios, and practice tests that will enhance both your theoretical and practical knowledge.

Consider your own career goals:

  • If your goal is to become a cybersecurity professional, CISSP is the best choice.
  • If you are interested in IT auditing and governance, CISA is the ideal choice.

After passing, you need to:

  • Submit an endorsement application – This must be signed by an ISC2-certified professional who can verify your work experience.
  • Agree to the ISC2 Code of Ethics – You must commit to ISC2’s professional ethics guidelines.
  • Pay the Annual Maintenance Fee (AMF) of $125 to maintain your certification status.
  • Once approved, you officially become a CISSP-certified professional!
Get your ticket to pass the CISSP Exam

Obtain expertise to protect organizations, advance your career, and become a CISSP-certified expert.

Access detailed information about the course content, learning objectives, activities, and assessments before adding it to your curriculum.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.