Level: Advanced

CISSP - Information Systems Security Engineering Professional (ISSEP)

5 Day | Instructor Led

This course is designed to prepare (ISC)2 CISSP-certification holders for the Information Systems Security Engineering Professional (ISSEP) exam. (ISC)2 created the CISSP-ISSEP engineering-specific concentration in conjunction with the U.S. National Security Agency (NSA) providing an invaluable tool for any systems security engineering professional. CISSPR-ISSEP is the guide for incorporating security into projects, applications, business processes, and all information systems. The course guides students to understand the CISSP-ISSEP Common Body of Knowledge (CBK) by comparing it to a traditional Systems Engineering model, enabling you to see the correlation of how security fits into the design and development process for information systems. The course also introduces key points of more than 50 U.S. government policies and procedures that need to be understood in order to understand the CBK and protect U.S. government information.

Inquire About:
CISSP - Information Systems Security Engineering Professional (ISSEP)

Ideal Candidates for CISSP - Information Systems Security Engineering Professional (ISSEP) Class

Cyber architects
Information assurance engineers
Individuals pursuing CISSP-ISSEP® certification

CISSP - Information Systems Security Engineering Professional (ISSEP) Prerequisites

While there are no prerequisites to attend the ISSEP Course, students must posses a valid CISSP certification to sit for the ISSEP exam

What You'll Get in CISSP - Information Systems Security Engineering Professional (ISSEP)

Expert Level Instruction

Official (ISC)2 Guide to the CISSP-ISSEP CBK

Ultimate Knowledge Institute Award Winning ISSEP Student Workbook

Daily Homework Questions (Over 600 Questions)

Daily Quiz Questions (Over 600 Questions)

Handy Reference Charts and Tables

Flash Cards

Course Related Readings (Reinforcement)

Daily Exercises to Reinforce Memory Recall - Cognitive Core

What You'll Learn in CISSP - Information Systems Security Engineering Professional (ISSEP)

Identify the four domains that are required to cover the Common Body of Knowledge for ISSEP certification

Recognize the components of the SE and ISSE processes

Recognize the activities that comprise the ISSE process

Identify the function and procedures of the PNE process

Identify SE and ISSE activities

Define Certification and Accreditation and its relationship to SE and ISSE

Recognize the concepts and elements of Defense-in-depth

Recognize the elements of risk management

Identify risk assessment activities

CISSP - Information Systems Security Engineering Professional (ISSEP) Certification

Information Systems Security Engineering Professional (ISSEP) Concentration

CISSP - Information Systems Security Engineering Professional (ISSEP) Outline

1. Domain 1: U.S. Government Information Assurance (IA)-Related Policies and Issuances

  • Welcome to the U.S. Government IA-Related Policies and Issuances Domain
  • Applicable National Laws and Policies
  • Department of Defense (DoD) Regulations
  • National Security Systems: Committee on National Security Systems (CNSS)/ National Security Telecommunications and Information Systems Security Policy (NSTISSP) Regulations
  • Regulations for Everyone: Public Laws, FIPS, and Special Publications
  • IA Regulations
  • Definitions and Self-Study Materials

2. Domain 2: Certification and Accreditation (C&A)/Risk Management Framework (RMF)

  • Welcome to the C&A/RMF Domain
  • Integrating C&A/RMF Processes Into Systems Security Engineering
  • U.S. Government Certification and Accreditation Process
  • Managing Security and Risk in Information Systems
  • Definitions and Self-Study Materials

3. Domain 3: Technical Management

  • Welcome to the Technical Management Domain
  • The Support and Acquisition Process
  • Technical Effort Project Initiation
  • Project Planning
  • Technical Effort Implementation and Management
  • Closing the Technical Effort
  • Definitions and Self-Study Materials

4. Domain 4: ISSE-Systems Security Engineering

  • Welcome to the ISSEP-Systems Security Engineering Domain
  • Security Engineering vs. Systems Engineering
  • Discover Information Protection Needs/Conduct a Mission Needs Analysis: Activity 1
  • Define System Security Requirements: Activity 2
  • Define System Security Architecture: Activity 3
  • Develop Detailed Security Systems Design: Activity 4
  • Implement System Security: Activity 5
  • Definitions and Self-Study Materials


A. Erlich


I just wanted to say your presentation on Social Media Technology and Security was the finest I have ever attended.

Wilder Guerra

US Navy Reserve

This course is definitely an eye opener. With how much social media has taken over, it is important to be fully aware of the capabilities along with all the risks it brings. It is important to get this course because social media is the new norm.

Rebekah Coughlin


The Social Media and Security Training course offered by UKI is a great and beneficial course combining technical training to fully understand TCP IP networking, DNS, and the harms of malware and cross-site scripting; as well as practical training that allowed attendees to play with open source social intelligence gathering solutions. This is the perfect class for those involved in IT security and interested in social media and identity theft.

Top Related Courses

If you are ready to take your security career to the next level, Ultimate Knowledge's Certified Information Systems Security Professional (CISSP) training and certification boot camp will help get you there. You will receive instruction from our experts who possess in-depth, real-world experience as you cover all the material you need to be fully prepared for the (ISC)2 CISSP exam. Our comprehensive CISSP exam prep tools contain the industry's most relevant, up-to-date information and includes summary charts, insightful data, and practice exams. Along with our CISSP training and certification custom course material, you will receive a free copy of Shon Harris' CISSP Certification All-in-One Exam Guide, 5th Edition and a CISSP Practice Exams Book (All-in-One).

This course is the most comprehensive review of cloud security concepts and industry best practices covering the six domains of the (ISC)2 Common Body of Knowledge (CBK®). You will gain knowledge in identifying the types of controls necessary to administer various levels of confidentiality, integrity, and availability, with regard to securing data in the cloud. You will identify the virtual and physical components of the cloud infrastructure with regard to risk management analysis, including tools and techniques necessary for maintaining a secure cloud infrastructure. You will gain an understanding in cloud software assurance and validation, utilizing secure software, and the controls necessary for developing secure cloud environments. You will identify privacy issues and audit processes utilized within a cloud environment, including auditing controls, assurance issues, and the specific reporting attributes.

CISSP Information Systems Security Architecture Professional (ISSAP)

© 2019 Ultimate Knowledge Insitute | All Rights Reserved
GSA# GS-35F-0469W