• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Coursera
Online Degrees
Careers
Log In
Join for Free
Coursera
Infosec
Certified Information Systems Security Professional (CISSP) Specialization
  1. Information Technology
  2. Security
Infosec

Certified Information Systems Security Professional (CISSP) Specialization

Pass Your ISC2 CISSP Exam. Gain core knowledge of risk management, security and more across all 8 domains of the ISC2 CISSP.

Included with Coursera Plus

•

Learn more

8 course series
Get in-depth knowledge of a subject
4.6

(10 reviews)

Advanced level

Recommended experience

Recommended experience

Advanced level

At least 5 years of experience as a cybersecurity professional

Flexible schedule
1 month at 10 hours a week
Earn a career credential
Share your expertise with employers
8 course series
Get in-depth knowledge of a subject
4.6

(10 reviews)

Advanced level

Recommended experience

Recommended experience

Advanced level

At least 5 years of experience as a cybersecurity professional

Flexible schedule
1 month at 10 hours a week
Earn a career credential
Share your expertise with employers

Overview

The CISSP certification specialization will prepare students for the rigorous CISSP exam. Our individual courses provide in-depth coverage across all eight domains per ISC2, broken down into manageable sections a student can review at their own pace. Our instructor is an industry veteran with over 25 years of experience, both in the field and in the classroom.

The courses included in this learning path are organized and taught in such a way to allow maximum retention of information. Through the use of real-world scenarios, analogies and humor, the CISSP material comes to life. An individual who completes this learning path will gain knowledge equivalent to that of a seasoned professional and should be able to implement the learned skills, delivering value to any organization.

Applied Learning Project

Learners will be provided end-of-course assessments with questions similar to those on the CISSP in each domain. After completion of all courses, students will take a final practice exam that mirrors the length of the ISC2 CISSP exam and style of questions so that they can determine if they are prepared to take the exam.

  • The learner will be able to learner will be able to pass the CISSP exam as well as design, implement and manage a cybersecurity program.

Skills you'll gain

  • Contingency Planning
  • Data Security
  • Digital Assets
  • Risk Management Framework
  • Asset Protection
  • Risk Management
  • Intellectual Property
  • Security Testing
  • Computer Security Incident Management
  • Network Security
  • Information Systems Security
  • Identity and Access Management
  • Cryptographic Protocols
  • Cloud Security
  • IT Security Architecture
  • Threat Modeling
  • Incident Response
  • Application Security
  • Cryptography
  • Public Key Cryptography Standards (PKCS)

What’s included

Shareable certificate

Add to your LinkedIn profile

Taught in English
Recently updated!

June 2025

15 practice exercises

Advance your subject-matter expertise

  • Learn in-demand skills from university and industry experts
  • Master a subject or tool with hands-on projects
  • Develop a deep understanding of key concepts
  • Earn a career certificate from Infosec

Specialization - 8 course series

What you'll learn

We being our journey into CISSP with Domain 1. This course begins with the basic fundamentals of information security and builds to discuss the roles of information security governance, the importance of security frameworks, takes a look at laws and regulations impacting cyber security and examines how all the pieces fit together to provide an information security program that delivers value to the enterprise.e.g. This is primarily aimed at first- and second-year undergraduates interested in engineering or science, along with high school students and professionals with an interest in programming.

Skills you'll gain

Category: Risk Management
Risk Management
Category: Intellectual Property
Intellectual Property
Category: ISO/IEC 27001
ISO/IEC 27001
Category: Information Systems Security
Information Systems Security
Category: Security Controls
Security Controls
Category: Vulnerability Assessments
Vulnerability Assessments
Category: Personally Identifiable Information
Personally Identifiable Information
Category: Information Systems
Information Systems
Category: Threat Management
Threat Management
Category: Vendor Management
Vendor Management
Category: Law, Regulation, and Compliance
Law, Regulation, and Compliance
Category: Cybersecurity
Cybersecurity
Category: Information Privacy
Information Privacy
Category: Asset Protection
Asset Protection
Category: Business Risk Management
Business Risk Management
Category: Governance
Governance
Category: Information Assurance
Information Assurance

What you'll learn

One of the most important jobs an information security professional has is the protection of organizational assets. We will look at the various types of assets and discuss their value. We will then look at common threats to information and their mitigation, providing coverage throughout the entire data life cycle.

Skills you'll gain

Category: Data Loss Prevention
Data Loss Prevention
Category: Security Controls
Security Controls
Category: Data Storage Technologies
Data Storage Technologies
Category: Threat Management
Threat Management
Category: Information Management
Information Management
Category: Personally Identifiable Information
Personally Identifiable Information
Category: Data Security
Data Security
Category: Identity and Access Management
Identity and Access Management
Category: Data Governance
Data Governance

What you'll learn

In this course, we will cover Domain 3 of the CISSP exam, which focuses on security architecture and engineering. We introduce principles of security design like “secure-by-default” and principles of least privilege. We will examine security models on which systems can be built and look at the hardware, software and firmware that will enforce these models. We will also dive into cloud services and CISSP. Beginning with a high-level overview of how cloud computing works, you'll see different deployment models, different service structures and the various security risks inherent in each model.

Skills you'll gain

Category: Computer Security
Computer Security
Category: Data Security
Data Security
Category: Security Controls
Security Controls
Category: Cloud Security
Cloud Security
Category: Cloud Computing
Cloud Computing
Category: IT Security Architecture
IT Security Architecture
Category: Information Systems Security
Information Systems Security
Category: Software As A Service
Software As A Service
Category: Threat Modeling
Threat Modeling
Category: Threat Detection
Threat Detection
Category: Platform As A Service (PaaS)
Platform As A Service (PaaS)
Category: Infrastructure As A Service (IaaS)
Infrastructure As A Service (IaaS)
Category: Systems Architecture
Systems Architecture
Category: Security Engineering
Security Engineering
Category: Public Cloud
Public Cloud
Category: Role-Based Access Control (RBAC)
Role-Based Access Control (RBAC)
Category: Secure Coding
Secure Coding
Category: Threat Management
Threat Management
Category: Authorization (Computing)
Authorization (Computing)
Category: Application Security
Application Security

What you'll learn

This course focuses on Domain 4 of the CISSP exam, covering network security. It begins with an in-depth look at the OSI Reference Model. At each layer, we will discuss functionality, threats/vulnerabilities and common mitigation strategies. In addition, we will focus on firewalls, proxy servers and remote access solutions. It also covers the security services that cryptography can provide and examine common terms like initialization vectors, salts, hashing, algorithms and keys. We will then build on this foundation to explore symmetric, asymmetric and hybrid cryptography and look at its practical implementations.

Skills you'll gain

Category: Encryption
Encryption
Category: Cryptography
Cryptography
Category: Network Security
Network Security
Category: Virtual Private Networks (VPN)
Virtual Private Networks (VPN)
Category: Key Management
Key Management
Category: Network Protocols
Network Protocols
Category: Firewall
Firewall
Category: Emerging Technologies
Emerging Technologies
Category: Public Key Infrastructure
Public Key Infrastructure
Category: Data Integrity
Data Integrity
Category: TCP/IP
TCP/IP
Category: Authentications
Authentications
Category: Remote Access Systems
Remote Access Systems
Category: Wireless Networks
Wireless Networks
Category: Infrastructure Security
Infrastructure Security
Category: OSI Models
OSI Models

What you'll learn

The Identity and Access Management course corresponds to Domain 5 of the CISSP exam. It provides an insight into the steps of access control. We will begin by discussing identity management and provisioning/deprovisioning accounts. We will then move to the AAA functions of authentication, authorization and accounting. We will additionally cover the concepts of single sign-on in local domains, as well as across the internet.

Skills you'll gain

Category: Multi-Factor Authentication
Multi-Factor Authentication
Category: Identity and Access Management
Identity and Access Management
Category: Security Assertion Markup Language (SAML)
Security Assertion Markup Language (SAML)
Category: Single Sign-On (SSO)
Single Sign-On (SSO)
Category: Authentications
Authentications
Category: Role-Based Access Control (RBAC)
Role-Based Access Control (RBAC)
Category: Authorization (Computing)
Authorization (Computing)
Category: User Provisioning
User Provisioning
Category: OAuth
OAuth
Category: User Accounts
User Accounts

What you'll learn

Security assessment and testing is the focus of Domain 6 on the CISSP exam. We will look at the processes and systems necessary to provide an insight into the organization’s security posture. We will explore security tests, vulnerability analysis and penetration testing, then look at security devices like SIEM systems, intrusion detection systems and honeypots.

Skills you'll gain

Category: Vulnerability Assessments
Vulnerability Assessments
Category: Security Controls
Security Controls
Category: Software Testing
Software Testing
Category: Application Security
Application Security
Category: Vulnerability Scanning
Vulnerability Scanning
Category: Penetration Testing
Penetration Testing
Category: Risk Management Framework
Risk Management Framework
Category: Continuous Monitoring
Continuous Monitoring
Category: Intrusion Detection and Prevention
Intrusion Detection and Prevention
Category: Security Testing
Security Testing
Category: Cyber Security Assessment
Cyber Security Assessment
Category: Test Tools
Test Tools

What you'll learn

This course covers Domain 7 of the CISSP exam, focusing on security operations. In it we will look at incident response and forensic investigations, including response planning and change management. We'll also discuss how to keep your systems ready for anything with redundancy and how to plan ahead with a module on contingency planning, including facility recovery and testing. And finally, we'll explore physical security, including site and facility design; fire safety and prevention; and data center security.

Skills you'll gain

Category: Disaster Recovery
Disaster Recovery
Category: Incident Response
Incident Response
Category: Computer Security Incident Management
Computer Security Incident Management
Category: Infrastructure Security
Infrastructure Security
Category: Security Management
Security Management
Category: Contingency Planning
Contingency Planning
Category: Business Continuity Planning
Business Continuity Planning
Category: Information Systems Security
Information Systems Security
Category: Enterprise Security
Enterprise Security
Category: Data Centers
Data Centers
Category: Cybersecurity
Cybersecurity
Category: Network Administration
Network Administration
Category: Change Control
Change Control

What you'll learn

This course examines the need to provide security throughout the SDLC, which aligns with Domain 8 on the CISSP exam. We will compare and contrast Agile and the waterfall methodologies, and look at the assessment of web applications and more traditional applications. We will examine common threats like cross-site scripting, buffer overflows and race conditions. Finally, we will examine databases and their vulnerabilities/solutions.

Skills you'll gain

Category: Software Development Life Cycle
Software Development Life Cycle
Category: Application Security
Application Security
Category: Risk Management Framework
Risk Management Framework
Category: Secure Coding
Secure Coding
Category: Software Development Methodologies
Software Development Methodologies
Category: Agile Methodology
Agile Methodology
Category: Web Applications
Web Applications
Category: Threat Modeling
Threat Modeling
Category: Software Testing
Software Testing
Category: Application Programming Interface (API)
Application Programming Interface (API)
Category: Vulnerability Assessments
Vulnerability Assessments
Category: Database Systems
Database Systems

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.

Instructor

InfoSec Institute Instructor
InfoSec Institute Instructor
Infosec
11 Courses•24,185 learners

Offered by

Infosec

Offered by

Infosec

Infosec believes knowledge is power when fighting cybercrime. We help IT and security professionals advance their careers with skills development and certifications while empowering all employees with security awareness and privacy training to stay cyber-safe at work and home. Learn more at infosecinstitute.com.

Why people choose Coursera for their career

Felipe M.
Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."
Coursera Plus

Open new doors with Coursera Plus

Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Learn more

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Explore degrees

Join over 3,400 global companies that choose Coursera for Business

Upskill your employees to excel in the digital economy

Learn more

Frequently asked questions

There are 15 hours of video content, plus quizzes and a practice exam at the end of the specialization. It should take at least 22-25 hours to complete the specialization

It is recommended that anyone taking the exam have a background of at least 5 years as a cybersecurity professional.

The courses can be taken in any order, but covering them sequentially by Domain, as they are in this specialization, may work best.

No.

Some jobs for which you may be competative are: a Security Analyst, Chief Information Security Officer (CISO), Security Systems Engineer, Security Architect, Network Architect, Security Manager, IT Security Consultant, Cybersecurity Engineer, Security Auditor, Senior Information Security Risk Officer, and more!

This course is completely online, so there’s no need to show up to a classroom in person. You can access your lectures, readings and assignments anytime and anywhere via the web or your mobile device.

If you subscribed, you get a 7-day free trial during which you can cancel at no penalty. After that, we don’t give refunds, but you can cancel your subscription at any time. See our full refund policy.

Yes! To get started, click the course card that interests you and enroll. You can enroll and complete the course to earn a shareable certificate. When you subscribe to a course that is part of a Specialization, you’re automatically subscribed to the full Specialization. Visit your learner dashboard to track your progress.

Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.

No, you cannot take this course for free. When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. If you cannot afford the fee, you can apply for financial aid.

More questions

Visit the learner help center

Financial aid available,

Coursera Footer

Technical Skills

  • ChatGPT
  • Coding
  • Computer Science
  • Cybersecurity
  • DevOps
  • Ethical Hacking
  • Generative AI
  • Java Programming
  • Python
  • Web Development

Analytical Skills

  • Artificial Intelligence
  • Big Data
  • Business Analysis
  • Data Analytics
  • Data Science
  • Financial Modeling
  • Machine Learning
  • Microsoft Excel
  • Microsoft Power BI
  • SQL

Business Skills

  • Accounting
  • Digital Marketing
  • E-commerce
  • Finance
  • Google
  • Graphic Design
  • IBM
  • Marketing
  • Project Management
  • Social Media Marketing

Career Resources

  • Essential IT Certifications
  • High-Income Skills to Learn
  • How to Get a PMP Certification
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Popular Data Analytics Certifications
  • What Does a Data Analyst Do?
  • Career Development Resources
  • Career Aptitude Test
  • Share your Coursera Learning Story

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • ECTS Credit Recommendations

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Manage Cookie Preferences
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2025 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok
Coursera

Sign up

Learn on your own time from top universities and businesses.

​
​
Between 8 and 72 characters
Your password is hidden
​

or

Already on Coursera?


I accept Coursera's Terms of Use and Privacy Notice. Having trouble logging in? Learner help center

This site is protected by reCAPTCHA Enterprise and the Google Privacy Policy and Terms of Service apply.