Skip to Content

Certified Information Systems Security Professional (CISSP)

The CISSP course at Texas Business School prepares mid- to senior-level security professionals to lead enterprise cybersecurity through in-depth training on the eight CISSP domains, real-world challenges, and hands-on labs.


The CISSP credential is recognized worldwide as the gold standard in information security leadership. Designed for mid- to senior-level security professionals, the CISSP course at Texas Business School equips you to design, implement, and manage best-in-class cybersecurity programs. With a focus on the eight CISSP domains and real-world leadership challenges, this rigorous program blends theory, frameworks, and hands-on labs to prepare you for both the exam and the demands of enterprise security.

Professional Certificate in CISSP (Certified Information Systems Security Professional)

Duration: 3 Months (3 sessions/week) | Format: Live Online or In-Person | Total Estimated Learning Hours: ~72

For: Mid-level IT professionals, Security Engineers, SOC Analysts, CISOs, Risk & Compliance Officers

Skill Level: Intermediate to Advanced


Program Overview

Texas Business School’s CISSP program is built for professionals ready to move beyond technical roles into strategic security leadership. Rooted in the eight domains defined by (ISC)², this course provides the knowledge and skills to protect organizational assets, manage risk, align security with business strategy, and pass the CISSP exam with confidence. Graduates will be prepared to lead enterprise security operations, respond to regulatory requirements, and defend against global cyber threats.

Core Courses

1. Security and Risk Management

Hours: 9

Prerequisites: None

Summary:

Cover confidentiality, integrity, availability, governance, and compliance. Learn how to align security policies with organizational goals and handle ethical/legal considerations.

Learning Outcomes

  • Define security governance and risk tolerance
  • Understand regulatory frameworks: ISO 27001, GDPR, HIPAA
  • Develop policies, standards, and procedures
  • Evaluate legal systems and professional ethics in security

 

2. Asset Security

Hours: 6

Prerequisites: Course 1

Summary:

Learn how to classify and handle assets across their lifecycle while ensuring data confidentiality and privacy.

Learning Outcomes

  • Apply data classification policies
  • Secure data at rest, in motion, and in use
  • Design secure data retention and disposal processes
  • Implement access control based on sensitivity


6. Security Assessment and Testing

Hours: 6

Prerequisites: Course 3 or 4

Summary:

Gain skills in security testing, audits, and vulnerability assessments. Learn to build and monitor secure software environments.

Learning Outcomes

  • Plan and execute security assessments
  • Use tools like Nessus, Nmap, and Metasploit
  • Interpret audit findings
  • Evaluate testing coverage and automation

7. Security Operations

Hours: 12

Prerequisites: Course 1, 3, or 5

Summary:

Develop operational security practices for incident response, monitoring, forensics, and business continuity.

Learning Outcomes

  • Manage logs, SIEM, and monitoring tools
  • Build incident response and recovery plans
  • Apply forensics principles during investigations
  • Conduct disaster recovery testing and tabletop exercises





3. Security Architecture and Engineering

Hours: 9

Prerequisites: Course 2

Summary:

Understand security models, cryptography, and secure system design—including vulnerabilities in hardware, software, and cloud architectures.

Learning Outcomes

  • Analyze secure architecture models (Bell-LaPadula, Biba, Clark-Wilson)
  • Identify vulnerabilities in system components
  • Understand cryptographic algorithms and key management
  • Evaluate security in IoT, cloud, and mobile systems

4. Communication and Network Security

Hours: 9

Prerequisites: Course 2 or 3

Summary:

Explore network architecture, secure protocols, and mechanisms to maintain integrity and confidentiality in enterprise communications.

Learning Outcomes

  • Explain OSI and TCP/IP models
  • Secure wireless and VoIP communications
  • Identify and mitigate common network threats
  • Implement VPNs, firewalls, IDS/IPS

5. Identity and Access Management (IAM)

Hours: 9

Prerequisites: Course 1 or 2

Summary:

Dive into access control methods, identity federation, and authentication models for managing user privileges securely.

Learning Outcomes

  • Compare RBAC, ABAC, and MAC models
  • Implement SSO, MFA, and federated identity
  • Design and audit IAM systems
  • Manage lifecycle of user credentials


8. Software Development Security

Hours: 6

Prerequisites: Course 3 or 4

Summary:

Ensure secure software lifecycle development and reduce software risks through secure coding practices.

Learning Outcomes

  • Implement secure SDLC models
  • Identify application vulnerabilities (OWASP Top 10)
  • Apply security in DevOps environments
  • Conduct code reviews and static/dynamic testing

9. Capstone Project: Enterprise Security Design and Risk Audit

Hours: 6

Prerequisites: Completion of all prior modules

Summary:

Simulate a full security audit and present a strategic enterprise security architecture, tying together risk, IAM, operations, and compliance.

Learning Outcomes

  • Demonstrate end-to-end security domain mastery
  • Present security architecture recommendations to executives
  • Write a risk-based audit report with mitigation roadmap
  • Justify security controls based on business priorities



Ready to Transform Your Career?

Innovation in cybersecurity waits for no one—and neither should you. By enrolling in the CISSP program at Texas Business School, you’ll gain the strategic expertise to lead, protect, and shape the future of information security. This is your invitation to join the next generation of security leaders—skilled, trusted, and ready to make a global impact.

Register Now