Logical Operations

Certified Information Systems Security Professional (CISSP)

Seize the savings! Get 40% off 3 months of Coursera Plus and full access to thousands of courses.

Logical Operations

Certified Information Systems Security Professional (CISSP)

Bill Rosenthal

Instructor: Bill Rosenthal

Included with Coursera Plus

Gain insight into a topic and learn the fundamentals.
5 weeks to complete
at 10 hours a week
Flexible schedule
Learn at your own pace
Gain insight into a topic and learn the fundamentals.
5 weeks to complete
at 10 hours a week
Flexible schedule
Learn at your own pace

What you'll learn

  • You will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.

Details to know

Shareable certificate

Add to your LinkedIn profile

Recently updated!

March 2026

Assessments

1 assignment

Taught in English

See how employees at top companies are mastering in-demand skills

 logos of Petrobras, TATA, Danone, Capgemini, P&G and L'Oreal

There are 9 modules in this course

In this course, you will explore a broad range of security concepts and best practices designed to meet the demands of increasingly specialized information systems security. Before you address specific security areas or elements, it is important that you have a plan in place for the overall management of these processes and elements. In this lesson, you will understand what comprises successful security and risk management.

What's included

1 reading16 plugins

In the last lesson, you learned the importance of the CIA triad and risk assessment and management. Because data is such an important asset to an organization, many of these same concepts will need to be applied to it as well. As data needs become more critical and the need to access it even more real time, it has become even more difficult to protect it. Organizations have always needed to protect their physical data assets and now they need to protect their logical data assets as well. Additionally, your users are no longer willing to exclusively work at their desk; they want whenever, wherever access. This means protecting data on more devices in more places than ever before. Companies need to consider all the places they store and transmit data and look for ways to protect it.

What's included

9 plugins

Now that you understand the relationship between assets, risks, and security, you can start to design cybersecurity for your organization.

What's included

15 plugins

In the last lesson, you learned about mitigation against vulnerabilities in system components, multiple architectures, and physical security. Many of those topics are pervasive in the CISSP® material, and you will see many of them throughout the course. Topics like defense in depth, cryptography, and network design will present themselves in regards to communication and network security as well. The network is changing, which means additional security measures are necessary. Voice and video are now delivered across the network, where before those were separate networks. Because the network has become such an important part of the business, protecting it has become critical. In this lesson, you will learn about security for your network systems.

What's included

7 plugins

A large part of maintaining the confidentiality, integrity, and availability of your data and your systems depends on identity and access control. By properly identifying the user or systems that are trying to gain access, you can determine how much, if any, control to grant them. This keeps unwanted entities out of your systems, while ensuring that the proper entities have exactly what they need, and no more. In this lesson, you will learn about identity and access management.

What's included

8 plugins

Now that you have an awareness of the importance of identification and access management, you will learn the importance of security assessments and testing to verify the security of your organization. It is only when you have done a thorough risk assessment of both your physical and logical assets that you can begin the work of protecting the organization. This lesson will delve further into vulnerability assessments, penetration testing, log reviews, all around testing, and validating your security.

What's included

7 plugins

Security operations is a concept that encompasses two basic ideas: to ensure that day-to-day activities that support the business are protected against risk and to deeply integrate security processes within those activities. Recognizing the importance of both of these ideas is a necessary step in ensuring the organization functions without any impairment. In this lesson, you will learn about the integral link between security and your day-to-day business operations.

What's included

15 plugins

In the last lesson, you learned about security operations. Many organizations not only manage their network infrastructure and systems, but also develop software. This can be for in-house use, or to sell to customers. In this final lesson, you will learn about developing software securely.

What's included

8 plugins

You'll wrap things up and then validate what you've learned in this course by taking an assessment.

What's included

1 assignment2 plugins

Instructor

Bill Rosenthal
Logical Operations
155 Courses 15,219 learners

Offered by

Why people choose Coursera for their career

Felipe M.

Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."

Jennifer J.

Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."

Larry W.

Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."

Chaitanya A.

"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."
Coursera Plus

Open new doors with Coursera Plus

Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose Coursera for Business

Upskill your employees to excel in the digital economy

Frequently asked questions