ISSAP Training and Certification Prep Course
Course 538X-OS
Course Outline
Dates: March 9 - March 12, 2026
Time: 9 AM - 4:30 PM EDT
Attendance Method: Virtual
Exam Included
The Information Systems Security Architecture Professional (ISSAP) is an advanced security credential for professionals who design enterprise security solutions and provide risk-based architectural guidance aligned to organizational mission, strategy, and regulatory requirements.
In this intensive one-day course, learners explore the four domains of the ISSAP Common Body of Knowledge (CBK®), gaining practical insight into governance, security architecture modeling, infrastructure and system protection, and identity and access management (IAM) architecture.
Successful participants strengthen their ability to align security architecture with business objectives, regulatory mandates, and evolving threat landscapes across enterprise, cloud, and hybrid environments.
Who Should Attend
This course is ideal for experienced cybersecurity professionals, including:
* Security architects and enterprise architects
* Senior security engineers and technical leads
* Governance, risk, and compliance (GRC) professionals
* IAM and infrastructure security specialists
* CISSP-certified professionals pursuing ISSAP endorsement
Prerequisites & Important Information
Certification Requirements
Candidates must meet one of the following:
* Hold an active CISSP in good standing and have two years of cumulative full-time experience in one or more ISSAP domains
OR
* Possess seven years of cumulative full-time experience in two or more ISSAP domains
Experience Substitution
* A relevant bachelor’s or master’s degree or an approved ISC2 credential may substitute for one year of experience
* Part-time work and internships may count toward experience requirements
Learning Objectives
After completing this course, you will be able to:
* Align enterprise security architecture with governance, risk, and compliance requirements
* Apply security architecture modeling frameworks, threat modeling, and validation techniques
* Design secure infrastructure, system, and cryptographic architectures across hybrid environments
* Architect scalable identity, authentication, authorization, and auditing solutions
* Provide risk-informed architectural guidance to organizational leadership
- choosing a selection results in a full page refresh