Certified Information Systems Security Professional (CISSP®) Bootcamp

Register for our upcoming Certified Information Systems Security Professional (CISSP®) Bootcamp course today!


This class is delivered by one of LearnSpectrum’s Partners, IQShare.

IN THIS COURSE

The CISSP® Boot Camp Educates and Prepares the Student to pass the “Certified Information Systems Security Professional (CISSP®)” exam. Professionals that hold the CISSP® Certification have demonstrated a deep knowledge of all 8 “Common Body of Knowledge” domains and have the necessary skills to provide leadership in the creation and operational duties of enterprise wide information security programs.

This Course (and the associated CISSP® Exam) focuses on Security at a very High-Level view, dealing more with Theory and Concept more than Implementation and Procedure.  It has been accurately described as topically, very broad (conceptually) but not very deep (in details).

The Course utilizes IQShare’s custom materials developed from the latest, proven industry techniques and tools, in concert with the CISSP® textbook.

DURATION/LOCATION

5 Days / Virtual class

PREREQUISITES

Prospective Students should possess the following prerequisites:

  • Familiarity with basic IT Concepts and associated Security Concerns
  • You must be a practicing Security Professional with at least 5 years full-time paid work experience.
    • OR 4 years full-time paid work experience if possessing a 4 year IT or IS Degree
      • The above experience must be covered by 2 or more of the 8 CISSP® Exam Domains.
    • Requires documentable 5 years IT Experience (or 4 Years if candidate possesses a 4-year Degree) in 2 or more of the 8 Domains covered by the CISSP® Exam.
    • Note – all prerequisites are controlled by the (ISC)2

 

WHAT YOU WILL LEARN

    • Security and Risk Management
    • Asset Security
    • Security Engineering
    • Communication and Network Security
    • Identity and Access Management
    • Security Assessment and Testing
    • Security Operations
    • Software Development Security

     

    COURSE OUTLINE

    Lesson 1: Security Governance via Principles and Policy

    • Introduction
    • Understand and Apply Concepts of Confidentiality, Integrity and Availability
    • Security Governance Principles
    • Develop & Implement Documented Security Policy
    • Understand and Apply Threat Modeling
    • Integrate Security Risk Considerations and Acquisition Strategy and Policy
    • Summary

     

    Lesson 2: Personnel Security and Risk Management Concepts

    • Introduction
    • Personnel Security Policies Detailed
    • Security Governance
    • Understand & Apply Risk Management Concepts
    • Establish and Manage Information Security Education
    • Summary

     

     Lesson 3: Business Continuity Planning

    • Introduction
    • Planning for Business Continuity
    • Project Scope and Planning
    • Business Impact Assessment
    • Continuity Planning
    • Proper Documentation
    • Summary

     

    Lesson 4: Laws, Regulations and Compliance

    • Introduction
    • Categories of Laws
    • Laws
    • Compliance Issues
    • Contracting & Procurement
    • Summary

     

    Lesson 5: Protecting Security of Assets

    • Introduction
    • Classifying and Labeling Assets
    • Identifying Data Roles
    • Protecting Privacy
    • Summary

     

    Lesson 6: Cryptography and Symmetric Key Algorithms

    • Introduction
    • Cryptography History
    • Cryptography Basics
    • Modern Cryptography
    • Symmetric Encryption
    • Cryptographic Lifecycle
    • Summary

     

    Lesson 7: PKI and Cryptographic Applications

    • Introduction
    • Asymmetric Cryptography
    • Hash Functions
    • Digital Signatures
    • Public Key Infrastructure
    • Asymmetric Key Management
    • Summary

     

    Lesson 8: Principles of Security Models, Design and Capabilities

    • Introduction
    • Implement & Manage Engineering Processes Using Secure Design Principles
    • Fundamental Concepts of Security Models
    • Controls and Countermeasures Appropriate to the Security Model
    • Security Capabilities of Information Systems
    • Summary

     

    Lesson 9: Vulnerabilities, Threats and Countermeasures

    • Introduction
    • Assess and Mitigate Vulnerabilities
    • Client Based
    • Server Based
    • Database Security
    • Distributed Security
    • Industrial Control Systems
    • Web Based
    • Essential Security Protection Mechanisms
    • Common Architecture Flaws & Security Issues
    • Summary

     

    Lesson 10: Physical Security Requirements

    • Introduction
    • Site and Facility Security Design
    • Secure Facility Plan
      • Media Storage Facilities
      • Evidence Storage
      • Restricted & Work Area Security
    • Data Center Security
    • Utilities, HVAC and Water Issues
    • Fire Prevention, Detection and Suppression
    • Summary

     

    Lesson 11: Secure Network Architecture

    • Introduction
    • OSI Model
    • TCP/IP Model
    • Converged Protocols
    • Wireless Networks
    • General Wi-Fi Security Procedures
    • Cabling, Wireless, Topology and Communications
    • Summary

     

    Lesson 12: Secure Communications and Network Attacks

    • Introduction
    • Network and Security Protocol Mechanisms
    • Secure Voice Communications
    • Multimedia Collaboration
    • Manage Email Security
    • Remote Access Security Management
    • Virtual Private Network
    • Virtualization Security
    • Network Address Translation
    • Switching Technologies
    • Security Boundaries
    • Summary

     

    Lesson 13: Managing Identity and Authentication

    • Introduction
    • Controlling Access to Assets
    • Identification and Authentication
    • Managing the Identity and Access Provisioning Lifecycle
    • Summary

     

    Lesson 14: Controlling and Monitoring Access

    • Introduction
    • Comparing Access Control Models
    • Understanding Access Control Attacks
    • Identifying Vulnerabilities
    • Summary

     

    Lesson 15: Security Assessment & Testing

    • Introduction
    • Building a Security Awareness Program & Testing Program
    • Performing Vulnerability Assessments
    • Testing your Software
    • Implementing Security Management Processes
    • Summary

     

    Lesson 16: Managing Security Operations

    • Introduction
    • Developing Secure Applications
    • Caching Information for Scalability
    • Monitoring Applications and Resources Using CloudWatch
    • Deploying Applications Using Elastic Beanstalk and CloudFormation
    • Summary

     

    Lesson 17: Preventing & Responding to Incidents

    • Introduction
    • Managing Incident Response
    • Implementing Preventive Measures
    • Logging, Monitoring and Auditing
    • Summary

     

    Lesson 18: Disaster Recovery Planning

    • Introduction
    • The Nature of Disaster
    • System Resilience & Fault Tolerance
    • Recovery Strategy
    • Recovery Plan Development
    • Training, Awareness and Documentation
    • Testing & Maintenance
    • Summary

     

    Lesson 19: Incidents & Ethics

    • Introduction
    • Investigations
    • Major Categories of Computer Crime
    • Incident Handling
    • Summary

     

    Lesson 20: Software Development Security

    • Introduction
    • Software Development Controls
    • Establishing Databases and Data Warehouses
    • Storing Data and Information
    • Understanding Knowledge-Based Systems
    • Summary

     

    Lesson 21: Malicious Code and Application Attacks

    • Introduction
    • Malicious Code
    • Password Attacks
    • Application Attacks
    • Web Application Security
    • Reconnaissance Attacks
    • Masquerading Attacks
    • Summary

    To register for this course today, please select the “Register Now” button above.