What You'll Learn

Lectures cover, in detail, the eight security domains required for the CISSP examination.

Security Assessment and Testing

The tools and methods used to penetrate security systems. Conducting security control testing, processing data, analyzing, and reporting. Facilitating security audits.

Software Development Security

Understand and integrate security in the Software Development Life Cycle. Environment security controls, development models, and software testing.

Asset Security

The identification and classification of information, data retention, privacy concerns, and determining asset ownership.

Security Operations

Understanding and supporting investigations and their requirements. Operating and maintaining preventative measures. Recovery strategies and processes.

Security Engineering

Using secure design principles to develop engineering processes. Mitigating vulnerabilities and the application of cryptography, and secure site design.

Communication & Network Security

Developing secure network design and communication channels to include Internet Protocol, wireless, and software-defined networks. Understanding network attacks.

Security and Risk Management

The basic concepts of information security such as confidentiality, integrity and availability. The application of risk management approaches and creating effective security training and awareness programs.

Identity and Access Management

Access control of information, devices and facilities. Understanding and recognizing access control attacks. Identification and authentication management, third-party identity services, and implementing authorization mechanisms.

UTSA Center for Infrastructure Assurance and Security


Certified Information Systems Security Professional Prep Courses are instructed by researchers from the UTSA Center for Infrastructure Assurance and Security (CIAS), a world's foremost cyber security think tank for multidisciplinary education and development of operational infrastructure security capabilities.

Over the past 15 years, the CIAS has been on the forefront of cyber security training efforts. The CIAS has been called upon by Congress, with support from the Department of Homeland Security and the Department of Defense, to strengthen the nation's cyber security preparedness.

hours of high-impact, live-online training delivered by UTSA instructors
sessions covering real-world problem solving, preventative, and management techniques
security domains covered, in detail, required for the CISSP examination

Career Outlook

In Texas, Information Security Analysts are projected grow 45% between 2021-2031, much faster than the average growth for all occupations.


According to the Texas Comptroller's office, as of 2017, the average annual wage for Information Security Analysts in the state was $95,000, nearly twice as much as the average annual wage for all occupations. Top industries searching for this specialized skill set include information technology & services, defense & space, computer network & security, management consulting, and financial services.

Skills Needed

Information Security, Network Security, Vulnerability Assessment

Possible Careers

CISSP Certification prepares candidates for a variety of high-level positions including:

  • Information Technology Project Managers
  • Network and Computer Systems Administrators
  • Computer Network Architects
  • Security Management Specialists
  • Clinical Data Managers
  • Database Architects
  • Data Warehousing Specilists
  • Database Administrators
  • Information Security Analysts

Group Discounts Available

Bring two colleagues and receive a 10% discount on all three registrations!
Registration for this course is currently closed. Please use the sign-up form to receive notification when dates are available. Thank you for your interest.

Total cost of the high-impact, 40 hour CISSP Preparation course.

Materials are not provided. Please click 'View Materials' button below to locate necessary books.

Candidates must have a minimum of five years cumulative paid work experience in two or more of the eight domains of the CISSP CBK. Earning a four-year college degree or regional equivalent or an additional credential from the (ISC)² approved list will satisfy one year of the required experience.

Sign up to Learn More
Call (210) 458-2411 or sign up to receive more information on this live-online training