Free Course Image Cyber Security CISSP Exam

Free online courseCyber Security CISSP Exam

Duration of the online course: 9 hours and 39 minutes

New

Prepare for the CISSP exam with a free online cyber security course on risk, access control and crypto, plus practice questions to sharpen real-world skills.

In this free course, learn about

  • Personnel security policies: screening, onboarding, roles, offboarding, and enforcement
  • Principle of Least Privilege: grant only required permissions; minimize attack surface
  • Risk management fundamentals: threats, vulnerabilities, likelihood, impact, and risk treatment
  • Social engineering tactics and awareness training; human factors like avoiding conflict
  • Business Continuity Planning: keep critical business functions running during disruptions
  • Disaster Recovery Planning: restore IT systems/data and resume operations after outages
  • Symmetric cryptography concepts; one-time pad purpose and perfect secrecy requirements
  • PKI and asymmetric cryptography: key pairs, certificates, encryption, and digital signatures
  • Vulnerability concepts and assessment: identifying weaknesses and reducing exposure
  • CPU modes and security implications: privilege levels, isolation, and kernel/user separation
  • Access control monitoring: authentication/authorization, logging, and enforcing policy
  • Mandatory Access Control (MAC): central label-based control, not user-controlled permissions
  • Security assessment/testing: validate controls, find gaps, and support continuous improvement
  • Secure software development: SDLC models, secure coding, and common malware/app attacks

Course Description

Strengthen your cyber security foundations and prepare confidently for the CISSP exam with a practical, exam-aligned learning experience. This free online course focuses on the kind of decision-making security professionals face every day: balancing business needs with protection, choosing appropriate controls, and responding to risk with clarity instead of guesswork. Whether you are pursuing a role in information security, aiming for a promotion, or validating your knowledge for certification, you will build a solid understanding of how modern organizations design and manage secure environments.

You will develop a clear grasp of core security principles such as least privilege, personnel security policies, and governance concepts that shape how access is granted and monitored. The course also strengthens your ability to think in risk terms: defining threats, understanding vulnerabilities, and applying risk management concepts that connect policy to real operational outcomes. Along the way, you will learn why security awareness and social engineering defenses matter, and how training can reduce human-driven incidents that technology alone cannot prevent.

Continuity is another critical area covered, helping you differentiate planning goals and build a mindset around resilience. You will explore what business continuity is designed to protect, how disaster recovery supports restoration, and how security teams contribute to both preparedness and response. Technical depth is included where it matters for CISSP readiness, including cryptography essentials such as symmetric algorithms, one-time pads, and how PKI uses asymmetric cryptography to enable trust at scale. You will also connect system-level concepts, like CPU modes, to real security implications.

To reinforce learning, the course includes knowledge-check questions that mirror the way CISSP concepts are tested, helping you practice accurate interpretation, eliminate distractors, and validate comprehension. You will also gain perspective on secure software development, lifecycle models, and common malicious code and application attacks, building a security-first lens that supports both technical and governance-focused roles.

By the end, you will be better equipped to communicate security priorities, justify controls, and approach the CISSP domains with stronger confidence and structure, while also gaining skills that translate directly to day-to-day cyber security work.

Course content

  • Video class: Unit 1.1 (Lesson 1) Personnel Security Policies (CISSP Ch 2.1) 34m
  • Exercise: What is the Principle of Least Privilege?
  • Video class: Unit 1.1 (Lesson 2) Apply Risk Management Concepts (CISSP Ch 2.2) 46m
  • Exercise: What is a threat in risk management?
  • Video class: 1-1 (Lesson 3) : Social Engineering and Training (CISSP Ch 2.3) 51m
  • Exercise: Which principle of social engineering exploits the human nature of avoiding conflict?
  • Video class: Unit 1.3.1 Business Continuity Planning (CISSP Chapter 3) 21m
  • Exercise: What is the primary focus of a Business Continuity Plan (BCP)?
  • Video class: Unit 2.1 Cryptography and Symmetric Key Algorithms (CISSP Chapter 6) 1h16m
  • Exercise: What is the primary purpose of a one-time pad in cryptography?
  • Video class: Unit 2-2 PKI and Cryptographic Applications (CISSP Chapter 7) 42m
  • Exercise: What is the purpose of asymmetric cryptography in public key infrastructure (PKI)?
  • Video class: Unit 1.2 - Vulnerability (CISSP Chapter 9) 1h09m
  • Exercise: Understanding CPU Modes and Security Implications
  • Video class: Unit 1.4 Controlling and Monitoring Access (CISSP Chapter 14) 40m
  • Exercise: What is a key characteristic of mandatory access control (MAC)?
  • Video class: Unit 1.5 Security Assessment and Testing (CISSP Chapter 15) 42m
  • Exercise: What is the purpose of regular security testing in a company?
  • Video class: Unit 1.3.2 Disaster Recovery Planning (CISSP Chapter 18) 36m
  • Exercise: What is the primary purpose of a Disaster Recovery Plan (DRP)?
  • Video class: Unit 0.1 Secure Software Development (CISSP Ch 20) 1h02m
  • Exercise: Software Development Lifecycle Models
  • Video class: Unit 0.2 Malicious Code and Application Attacks (CISSP Ch 21) 55m
  • Exercise: What is the purpose of a virus in software development?

This free course includes:

9 hours and 39 minutes of online video course

Digital certificate of course completion (Free)

Exercises to train your knowledge

100% free, from content to certificate

Ready to get started?Download the app and get started today.

Install the app now

to access the course
Icon representing technology and business courses

Over 5,000 free courses

Programming, English, Digital Marketing and much more! Learn whatever you want, for free.

Calendar icon with target representing study planning

Study plan with AI

Our app's Artificial Intelligence can create a study schedule for the course you choose.

Professional icon representing career and business

From zero to professional success

Improve your resume with our free Certificate and then use our Artificial Intelligence to find your dream job.

You can also use the QR Code or the links below.

QR Code - Download Cursa - Online Courses

More free courses at Cyber Security

Free Ebook + Audiobooks! Learn by listening or reading!

Download the App now to have access to + 5000 free courses, exercises, certificates and lots of content without paying anything!

  • 100% free online courses from start to finish

    Thousands of online courses in video, ebooks and audiobooks.

  • More than 60 thousand free exercises

    To test your knowledge during online courses

  • Valid free Digital Certificate with QR Code

    Generated directly from your cell phone's photo gallery and sent to your email

Cursa app on the ebook screen, the video course screen and the course exercises screen, plus the course completion certificate