This CISSP preparation resource equips learners with the knowledge and tools needed to succeed in the certification exam and excel in cybersecurity roles. It covers essential domains such as risk management, network security, and software development, with practical insights and expert guidance. Designed for professionals aiming to advance their careers, it provides a structured and comprehensive learning path.

CISSP Certified Information Security Professional Exam Guide
Ends soon: Grow your skills with Coursera Plus for $239/year (usually $399). Save now.

CISSP Certified Information Security Professional Exam Guide

Instructor: Packt - Course Instructors
Included with
Recommended experience
Recommended experience
Intermediate level
Ideal for IT professionals with experience in GRC, network, or systems administration.
Recommended experience
Recommended experience
Intermediate level
Ideal for IT professionals with experience in GRC, network, or systems administration.
What you'll learn
Secure network communications and routing effectively.
Understand the distinctions between encryption and hashing.
Apply certificate and digital signature usage in security contexts.
Details to know

Add to your LinkedIn profile
April 2026
23 assignments
See how employees at top companies are mastering in-demand skills

There are 23 modules in this course
In this section, we explore the ISC2 Code of Ethics, the CIA triad, and aligning security governance with organizational goals to support ethical and effective decision-making.
What's included
2 videos3 readings1 assignment
2 videos•Total 2 minutes
- Course Overview•1 minute
- Ethics, Security Concepts, and Governance Principles - Overview Video•1 minute
3 readings•Total 40 minutes
- Introduction•20 minutes
- People Safety Concepts•10 minutes
- Essential Security Frameworks•10 minutes
1 assignment•Total 10 minutes
- Foundations of Information Security and Governance•10 minutes
In this section, we explore contractual, legal, and industry requirements, analyze privacy principles, and differentiate investigation types to ensure data protection and legal compliance.
What's included
1 video5 readings1 assignment
1 video•Total 1 minute
- Compliance, Regulation, and Investigations - Overview Video•1 minute
5 readings•Total 60 minutes
- Introduction•10 minutes
- Legal Requirements•10 minutes
- Privacy Requirements•10 minutes
- Software Licensing•10 minutes
- Privacy•20 minutes
1 assignment•Total 10 minutes
- Compliance and Regulatory Standards•10 minutes
In this section, we explore developing security policies, conducting business impact analysis, and implementing business continuity plans to ensure operational resilience and compliance.
What's included
1 video6 readings1 assignment
1 video•Total 1 minute
- Security Policies and Business Continuity - Overview Video•1 minute
6 readings•Total 60 minutes
- Introduction•10 minutes
- Publishing Phase•10 minutes
- Standards•10 minutes
- Developing and Documenting the Scope and the Plan•10 minutes
- Candidate Screening and Hiring•10 minutes
- Onboarding, Transfers, and Termination Processes•10 minutes
1 assignment•Total 10 minutes
- Security Policies and Business Continuity Fundamentals•10 minutes
In this section, we explore risk management frameworks, threat identification, and SCRM and SETA strategies to mitigate risks and enhance organizational security through structured approaches.
What's included
1 video7 readings1 assignment
1 video•Total 1 minute
- Risk Management - Overview Video•1 minute
7 readings•Total 60 minutes
- Introduction•10 minutes
- Risk Response•5 minutes
- Countermeasure Selection and Implementation•10 minutes
- Control Assessments•10 minutes
- Risk Frameworks•10 minutes
- Third-Party Assessment and Monitoring•5 minutes
- SETA Programs•10 minutes
1 assignment•Total 10 minutes
- Risk Management Fundamentals•10 minutes
In this section, we explore identifying and classifying digital assets, establishing secure handling requirements, and allocating resources based on asset value for effective cybersecurity management.
What's included
1 video2 readings1 assignment
1 video•Total 1 minute
- Asset and Privacy Protection - Overview Video•1 minute
2 readings•Total 20 minutes
- Introduction•10 minutes
- Establishing Information and Asset Handling Requirements•10 minutes
1 assignment•Total 10 minutes
- Digital Asset and Privacy Protection Fundamentals•10 minutes
In this section, we explore data life cycle management, asset retention, and security controls to ensure compliance and effective digital asset governance throughout their existence.
What's included
1 video4 readings1 assignment
1 video•Total 1 minute
- Information and Asset Handling - Overview Video•1 minute
4 readings•Total 40 minutes
- Introduction•10 minutes
- Data Location•10 minutes
- Asset Retention•10 minutes
- Standards Selection•10 minutes
1 assignment•Total 10 minutes
- Data Governance and Security Fundamentals•10 minutes
In this section, we explore secure design principles, analyze security models, and select controls based on system requirements using frameworks like STRIDE and Zero Trust.
What's included
1 video5 readings1 assignment
1 video•Total 1 minute
- Secure Design Principles and Controls - Overview Video•1 minute
5 readings•Total 50 minutes
- Introduction•10 minutes
- Defense in Depth•10 minutes
- Zero Trust•10 minutes
- Clark-Wilson•10 minutes
- Identifying Security Controls•10 minutes
1 assignment•Total 10 minutes
- Security Design Fundamentals•10 minutes
In this section, we examine system architecture vulnerabilities and cryptographic methods to secure data. Key concepts include encryption types, attack mitigation, and practical applications in IoT and cloud systems.
What's included
1 video13 readings1 assignment
1 video•Total 1 minute
- Architecture Vulnerabilities and Cryptography - Overview Video•1 minute
13 readings•Total 125 minutes
- Introduction•10 minutes
- Universal Security Models•10 minutes
- Mitigating with Access Control Techniques•5 minutes
- Mitigating Threats in System Virtualization•10 minutes
- Industrial Control Systems•10 minutes
- High-Performance Computing Systems•10 minutes
- Web Application Security•10 minutes
- End-to-End Encryption•10 minutes
- Symmetric Encryption•10 minutes
- Asymmetric Encryption•10 minutes
- Hashing Algorithms•10 minutes
- Public Key Infrastructure•10 minutes
- Understanding Methods of Cryptanalytic Attacks•10 minutes
1 assignment•Total 10 minutes
- Security Fundamentals in Modern Systems•10 minutes
In this section, we explore physical security principles for site design, facility controls, and HVAC measures to protect data and systems from unauthorized access and environmental threats.
What's included
1 video4 readings1 assignment
1 video•Total 1 minute
- Facilities and Physical Security - Overview Video•1 minute
4 readings•Total 40 minutes
- Introduction•10 minutes
- Physical and Electronic Locks•10 minutes
- Machine Learning and AI•10 minutes
- Utilities and Heating Ventilation and Air Conditioning HVAC•10 minutes
1 assignment•Total 10 minutes
- Facilities and Physical Security Fundamentals•10 minutes
In this section, we explore secure network design using OSI and TCP/IP models, focusing on layer-based security analysis and real-world protocol implications.
What's included
1 video4 readings1 assignment
1 video•Total 1 minute
- Network Architecture Security - Overview Video•1 minute
4 readings•Total 40 minutes
- Introduction•10 minutes
- OSI Layer 3 Network•10 minutes
- TCP/IP Model•10 minutes
- Software Defined Networks and Software-Defined Wide Area Networks•10 minutes
1 assignment•Total 10 minutes
- Network Security Fundamentals•10 minutes
In this section, we explore securing network components and communication channels to ensure data confidentiality, integrity, and protection against vulnerabilities in network environments.
What's included
1 video3 readings1 assignment
1 video•Total 1 minute
- Securing Communication Channels - Overview Video•1 minute
3 readings•Total 30 minutes
- Introduction•10 minutes
- Endpoint Security•10 minutes
- Remote Access•10 minutes
1 assignment•Total 10 minutes
- Securing Communication Channels•10 minutes
In this section, we explore identity and access management, focusing on secure access control, federation, and user provisioning to balance data security and operational efficiency.
What's included
1 video3 readings1 assignment
1 video•Total 1 minute
- Identity, Access Management, and Federation - Overview Video•1 minute
3 readings•Total 30 minutes
- Introduction•10 minutes
- Identity Provisioning•10 minutes
- Authentication Methods•10 minutes
1 assignment•Total 10 minutes
- Identity and Access Management Fundamentals•10 minutes
In this section, we explore implementing authentication systems for third parties, analyzing authentication and access control mechanisms, and designing secure collaboration strategies using federated identity management and SSO.
What's included
1 video5 readings1 assignment
1 video•Total 1 minute
- Identity Management Implementation - Overview Video•1 minute
5 readings•Total 50 minutes
- Introduction•10 minutes
- OpenID Connect•10 minutes
- Kerberos Authentication•10 minutes
- Kerberos Attacks•10 minutes
- Risk-Based Access Controls•10 minutes
1 assignment•Total 10 minutes
- Identity Management Fundamentals•10 minutes
In this section, we explore designing and validating security assessment strategies, conducting control testing, and ensuring audit outcomes are accurate and actionable for continuous improvement.
What's included
1 video6 readings1 assignment
1 video•Total 1 minute
- Designing and Conducting Security Assessments - Overview Video•1 minute
6 readings•Total 60 minutes
- Introduction•10 minutes
- Conducting an External Audit•10 minutes
- Conducting Security Control Testing•10 minutes
- Log Reviews•10 minutes
- Code Review and Testing•10 minutes
- Interface Testing•10 minutes
1 assignment•Total 10 minutes
- Security Assessment Fundamentals•10 minutes
In this section, we explore collecting and analyzing security data to improve system resilience, focusing on audit processes, disaster recovery, and effective reporting techniques.
What's included
1 video2 readings1 assignment
1 video•Total 1 minute
- Designing and Conducting Security Testing - Overview Video•1 minute
2 readings•Total 30 minutes
- Introduction•10 minutes
- Backup Verification Data•20 minutes
1 assignment•Total 10 minutes
- Security Testing and Business Continuity Fundamentals•10 minutes
In this section, we explore pre-incident planning for security operations, focusing on incident response, logging, monitoring, and configuration management to ensure operational resilience and effective threat response.
What's included
1 video11 readings1 assignment
1 video•Total 1 minute
- Planning for Security Operations - Overview Video•1 minute
11 readings•Total 110 minutes
- Introduction•10 minutes
- Policies and Guidelines•10 minutes
- Extended Detection and Response•10 minutes
- Conducting Logging and Monitoring Activities•10 minutes
- XDR-Based Approach•10 minutes
- Operating a SIEM System•10 minutes
- Intelligence Cycle•10 minutes
- Performing Configuration Management•10 minutes
- Applying Foundational Security Operations Concepts•10 minutes
- Attack Graphs•10 minutes
- Job Rotation•10 minutes
1 assignment•Total 10 minutes
- Security Operations Planning Fundamentals•10 minutes
In this section, we explore the incident response cycle, detective and preventive security measures, and patch and vulnerability management for practical security operations.
What's included
1 video10 readings1 assignment
1 video•Total 1 minute
- Security Operations - Overview Video•1 minute
10 readings•Total 100 minutes
- Introduction•10 minutes
- Response•10 minutes
- Lateral Movement•10 minutes
- Reporting•10 minutes
- Operating and Maintaining Detective and Preventive Measures•10 minutes
- Hunting and Endpoint Queries•10 minutes
- Intrusion Detection and Prevention Systems•10 minutes
- Sandboxing•10 minutes
- The Zero Trust Concept•10 minutes
- Remediation•10 minutes
1 assignment•Total 10 minutes
- Security Operations Fundamentals•10 minutes
In this section, we explore disaster recovery strategies, testing plans, and recovery site options to ensure IT system availability and resilience in real-world scenarios.
What's included
1 video5 readings1 assignment
1 video•Total 1 minute
- Disaster Recovery - Overview Video•1 minute
5 readings•Total 50 minutes
- Introduction•10 minutes
- Recovery Site Strategies•10 minutes
- Multiple Processing Sites•10 minutes
- Implementing Disaster Recovery Processes•10 minutes
- Lessons Learned•10 minutes
1 assignment•Total 10 minutes
- Disaster Recovery Fundamentals•10 minutes
In this section, we examine business continuity, personnel, and physical security, focusing on stakeholder collaboration, access controls, and safety protocols to enhance organizational resilience and disaster recovery planning.
What's included
1 video4 readings1 assignment
1 video•Total 1 minute
- Business Continuity, Personnel, and Physical Security - Overview Video•1 minute
4 readings•Total 40 minutes
- Introduction•10 minutes
- Implement and Manage Physical Security•10 minutes
- Security Auditing of Physical Access Systems•10 minutes
- Travel•10 minutes
1 assignment•Total 10 minutes
- Business Continuity and Organizational Security Fundamentals•10 minutes
In this section, we explore secure software development methodologies, maturity models, and change management to ensure application security and functionality throughout the life cycle.
What's included
1 video4 readings1 assignment
1 video•Total 1 minute
- Software Development Life Cycle Security - Overview Video•1 minute
4 readings•Total 40 minutes
- Introduction•10 minutes
- Agile•10 minutes
- Maturity Models•10 minutes
- Operations and Maintenance•10 minutes
1 assignment•Total 10 minutes
- Software Development Life Cycle Security Fundamentals•10 minutes
In this section, we explore secure coding practices, SAST and DAST integration in CI/CD, and automation of security testing to reduce application vulnerabilities.
What's included
1 video1 reading1 assignment
1 video•Total 1 minute
- Software Development Security Controls - Overview Video•1 minute
1 reading•Total 20 minutes
- Software Development Security Controls - The Reading•20 minutes
1 assignment•Total 10 minutes
- Security in Software Development Lifecycle•10 minutes
In this section, we examine software security effectiveness, evaluate risks of acquired software, and analyze common vulnerabilities to enhance digital system protection.
What's included
1 video3 readings1 assignment
1 video•Total 1 minute
- Securing Software Development - Overview Video•1 minute
3 readings•Total 30 minutes
- Introduction•10 minutes
- Buffer Overflows•10 minutes
- Assess the Security Impact of Acquired Software•10 minutes
1 assignment•Total 10 minutes
- Securing Software Development Fundamentals•10 minutes
In this section, we examine secure coding practices, source code vulnerabilities, and database security to build resilient systems and protect data integrity.
What's included
1 video4 readings1 assignment
1 video•Total 1 minute
- Secure Coding Guidelines, Third-Party Software, and Databases - Overview Video•1 minute
4 readings•Total 50 minutes
- Introduction•10 minutes
- Third-Party Trust•20 minutes
- Processing Database Transactions•10 minutes
- Polyinstantiation•10 minutes
1 assignment•Total 10 minutes
- Secure Software Development and Database Management•10 minutes
Instructor

Offered by

Offered by

Packt helps tech professionals put software to work by distilling and sharing the working knowledge of their peers. Packt is an established global technical learning content provider, founded in Birmingham, UK, with over twenty years of experience delivering premium, rich content from groundbreaking authors on a wide range of emerging and popular technologies.
Why people choose Coursera for their career

Felipe M.

Jennifer J.

Larry W.

Chaitanya A.

Open new doors with Coursera Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy
Frequently asked questions
Yes, you can preview the first video and view the syllabus before you enroll. You must purchase the course to access content not included in the preview.
If you decide to enroll in the course before the session start date, you will have access to all of the lecture videos and readings for the course. You’ll be able to submit assignments once the session starts.
Once you enroll and your session begins, you will have access to all videos and other resources, including reading items and the course discussion forum. You’ll be able to view and submit practice assessments, and complete required graded assignments to earn a grade and a Course Certificate.
If you complete the course successfully, your electronic Course Certificate will be added to your Accomplishments page - from there, you can print your Course Certificate or add it to your LinkedIn profile.
This course is currently available only to learners who have paid or received financial aid, when available.
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.
More questions
Financial aid available,