Certified Information Systems
Security Professional (CISSP®) Bootcamp

Register for our upcoming Certified Information Systems Security Professional (CISSP®) Bootcamp course today!

This class is delivered by one of LearnSpectrum’s Partners, IQShare.
IN THIS COURSE

The CISSP® Boot Camp Educates and Prepares the Student to pass the “Certified Information Systems Security Professional (CISSP®)” exam. Professionals that hold the CISSP® Certification have demonstrated a deep knowledge of all 8 “Common Body of Knowledge” domains and have the necessary skills to provide leadership in the creation and operational duties of enterprise wide information security programs.

This Course (and the associated CISSP® Exam) focuses on Security at a very High-Level view, dealing more with Theory and Concept more than Implementation and Procedure.  It has been accurately described as topically, very broad (conceptually) but not very deep (in details).

The Course utilizes IQShare’s custom materials developed from the latest, proven industry techniques and tools, in concert with the CISSP® textbook.

DURATION/LOCATION

5 Days / Virtual class

PREREQUISITES

Prospective Students should possess the following prerequisites:

  • Familiarity with basic IT Concepts and associated Security Concerns
  • You must be a practicing Security Professional with at least 5 years of full-time paid work experience.
    • OR 4 years full-time paid work experience if possessing a 4 year IT or IS Degree
      • The above experience must be covered by 2 or more of the 8 CISSP® Exam Domains.
    • Requires documentable 5 years IT Experience (or 4 Years if candidate possesses a 4-year Degree) in 2 or more of the 8 Domains covered by the CISSP® Exam.
    • Note – all prerequisites are controlled by the (ISC)2
WHAT YOU WILL LEARN
  • Security and Risk Management
  • Asset Security
  • Security Engineering
  • Communication and Network Security
  • Identity and Access Management
  • Security Assessment and Testing
  • Security Operations
  • Software Development Security
COURSE OUTLINE
Lesson 1: Security Governance via Principles and Policy
  • Introduction
  • Understand and Apply Concepts of Confidentiality, Integrity, and Availability
  • Security Governance Principles
  • Develop & Implement Documented Security Policy
  • Understand and Apply Threat Modeling
  • Integrate Security Risk Considerations and Acquisition Strategy and Policy
  • Summary
Lesson 2: Personnel Security and Risk Management Concepts
  • Introduction
  • Personnel Security Policies Detailed
  • Security Governance
  • Understand & Apply Risk Management Concepts
  • Establish and Manage Information Security Education
  • Summary
 Lesson 3: Business Continuity Planning
  • Introduction
  • Planning for Business Continuity
  • Project Scope and Planning
  • Business Impact Assessment
  • Continuity Planning
  • Proper Documentation
  • Summary
Lesson 4: Laws, Regulations and Compliance
  • Introduction
  • Categories of Laws
  • Laws
  • Compliance Issues
  • Contracting & Procurement
  • Summary
Lesson 5: Protecting Security of Assets
  • Introduction
  • Classifying and Labeling Assets
  • Identifying Data Roles
  • Protecting Privacy
  • Summary
Lesson 6: Cryptography and Symmetric Key Algorithms
  • Introduction
  • Cryptography History
  • Cryptography Basics
  • Modern Cryptography
  • Symmetric Encryption
  • Cryptographic Lifecycle
  • Summary
Lesson 7: PKI and Cryptographic Applications
  • Introduction
  • Asymmetric Cryptography
  • Hash Functions
  • Digital Signatures
  • Public Key Infrastructure
  • Asymmetric Key Management
  • Summary
Lesson 8: Principles of Security Models, Design and Capabilities
  • Introduction
  • Implement & Manage Engineering Processes Using Secure Design Principles
  • Fundamental Concepts of Security Models
  • Controls and Countermeasures Appropriate to the Security Model
  • Security Capabilities of Information Systems
  • Summary
Lesson 9: Vulnerabilities, Threats and Countermeasures
  • Introduction
  • Assess and Mitigate Vulnerabilities
  • Client Based
  • Server Based
  • Database Security
  • Distributed Security
  • Industrial Control Systems
  • Web Based
  • Essential Security Protection Mechanisms
  • Common Architecture Flaws & Security Issues
  • Summary
Lesson 10: Physical Security Requirements
  • Introduction
  • Site and Facility Security Design
  • Secure Facility Plan
  • Media Storage Facilities
  • Evidence Storage
  • Restricted & Work Area Security
  • Data Center Security
  • Utilities, HVAC and Water Issues
  • Fire Prevention, Detection, and Suppression
  • Summary
Lesson 11: Secure Network Architecture
  • Introduction
  • OSI Model
  • TCP/IP Model
  • Converged Protocols
  • Wireless Networks
  • General Wi-Fi Security Procedures
  • Cabling, Wireless, Topology and Communications
  • Summary
Lesson 12: Secure Communications and Network Attacks
  • Introduction
  • Network and Security Protocol Mechanisms
  • Secure Voice Communications
  • Multimedia Collaboration
  • Manage Email Security
  • Remote Access Security Management
  • Virtual Private Network
  • Virtualization Security
  • Network Address Translation
  • Switching Technologies
  • Security Boundaries
  • Summary
Lesson 13: Managing Identity and Authentication
  • Introduction
  • Controlling Access to Assets
  • Identification and Authentication
  • Managing the Identity and Access Provisioning Lifecycle
  • Summary
Lesson 14: Controlling and Monitoring Access
  • Introduction
  • Comparing Access Control Models
  • Understanding Access Control Attacks
  • Identifying Vulnerabilities
  • Summary
Lesson 15: Security Assessment & Testing
  • Introduction
  • Building a Security Awareness Program & Testing Program
  • Performing Vulnerability Assessments
  • Testing your Software
  • Implementing Security Management Processes
  • Summary
Lesson 16: Managing Security Operations
  • Introduction
  • Developing Secure Applications
  • Caching Information for Scalability
  • Monitoring Applications and Resources Using CloudWatch
  • Deploying Applications Using Elastic Beanstalk and CloudFormation
  • Summary
Lesson 17: Preventing & Responding to Incidents
  • Introduction
  • Managing Incident Response
  • Implementing Preventive Measures
  • Logging, Monitoring and Auditing
  • Summary
Lesson 18: Disaster Recovery Planning
  • Introduction
  • The Nature of Disaster
  • System Resilience & Fault Tolerance
  • Recovery Strategy
  • Recovery Plan Development
  • Training, Awareness, and Documentation
  • Testing & Maintenance
  • Summary
Lesson 19: Incidents & Ethics
  • Introduction
  • Investigations
  • Major Categories of Computer Crime
  • Incident Handling
  • Summary
Lesson 20: Software Development Security
  • Introduction
  • Software Development Controls
  • Establishing Databases and Data Warehouses
  • Storing Data and Information
  • Understanding Knowledge-Based Systems
  • Summary
Lesson 21: Malicious Code and Application Attacks
  • Introduction
  • Malicious Code
  • Password Attacks
  • Application Attacks
  • Web Application Security
  • Reconnaissance Attacks
  • Masquerading Attacks
  • Summary

We use cookies to give you the best online experience. By agreeing you accept the use of cookies in accordance with our cookie policy.