Live Chat
Monday - Friday 8am - 6pm EST Chat Now
Contact Us
Monday - Friday 8am - 8pm EST 1-866-716-6688 Other Contact Options

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:


Fundamentals of Information Systems Security

Learn about new risks, threats, and vulnerabilities associated with the transformation to a digital world.

GK# 3431

Course Overview

In this course, you will learn about new risks, threats, and vulnerabilities associated with the transformation to a digital world, including a look at how business, government, and individuals operate today. You will also be provided with a high-level overview of each of the seven domains within the System Security Certified Practitioner certification. You will also be given additional material on information security standards, education, professional certifications, and compliance laws.

In addition to premium instructional content from Jones & Bartlett Learning's comprehensive Information Systems Security and Assurance (ISSA) curriculum, this course provides access to a customized "virtual sandbox" learning environment that aggregates an unparalleled spectrum of cybersecurity applications. Providing instant, unscheduled access to labs from the convenience of a web-browser, this course allows you to practice "white hat" hacking on a real IT infrastructure-these are not simulations. Winner of the "Security Training and Educational Programs" top prize at the prestigious 2013 Global Excellence Awards by Info Security Products Guide, the industry's leading information security research and advisory guide, these labs provide valuable exposure to complex, real world challenges and over 200 hours of training exercises on how hackers and perpetrators use these applications and tools.


The instructional content is adapted from the Official (ISC)2 SSCP Certified Body of Knowledge and features a SSCP practice exam as well as a coupon offer for the SSCP Review Seminar. This course covers content within the following industry certification exams:

  • Certified Information Systems Security Professional (CISSP) - six content domains covered
  • Security + - five content domains covered
  • System Security Certified Practitioner (SSCP) - six content domains covered
  • National Institute of Standards and Technology (NIST) - five content domains covered
  • 8570.01 - five content domains covered

Delivery Format Options

  • Classroom Live

    Classroom Live

    Receive face-to-face instruction at one of our training center locations.


    $4095 CAD

    5 day

  • Virtual Classroom Live

    Virtual Classroom Live

    Experience expert-led online training from the convenience of your home, office or anywhere with an Internet connection.


    $4095 CAD

    5 day

  • Private Group Training

    Private Group Training

    Train your entire team in a private, coordinated professional development session at the location of your choice.

    Receive private training for teams online and in-person.

Request a date or location for this course.

What You'll Learn

  • Concepts of information systems security as applied to an IT infrastructure
  • How malicious attacks, threats, and vulnerabilities impact an IT infrastructure
  • Access controls in implementing a security policy
  • Operations and administration in effective implementation of security policy
  • Security audits, testing, and monitoring to effective security policy
  • Risk management, common response techniques, and issues related to recovery of IT systems
  • How businesses apply cryptography in maintaining information security
  • Network principles and architecture to security operations
  • Ways attackers use to compromise systems and networks and defenses used by organizations
  • Apply international and domestic information security standards and compliance laws to real-world implementation in both the private and public sector

Follow-On Courses

Who Needs To Attend

  • Information security analysts
  • Payroll specialists
  • IT infrastructure security specialists
  • People who decide which information technology and cybersecurity products to acquire for their organization

Course Outline

Download Course Outline