The CISSP Certification Boot Camp is an intensive, accelerated training program designed to prepare information security professionals for the ISC2 CISSP exam. The course focuses on the eight domains of the CISSP Common Body of Knowledge (CBK) and provides a comprehensive understanding of information security principles, practices, and tools. Participants will engage in immersive, hands-on training to acquire the skills and knowledge needed to pass the CISSP exam and advance their careers in cybersecurity.
Why Choose This Boot Camp:
- Accelerated Learning: This boot camp condenses weeks of self-study into an intensive 5-day program, helping participants quickly achieve certification.
- Expert Instructors: Learn from seasoned cybersecurity professionals who bring real-world experience and insights to the classroom.
- Hands-On Labs: Engage in practical labs that simulate real-world scenarios to reinforce key concepts and techniques.
- Exam Preparation: Benefit from practice exams, exam tips, and a comprehensive review of exam domains to enhance your test-taking skills.
- Post-Course Support: Access to additional resources and support after the course to ensure you are fully prepared for the exam.
Prerequisites
The knowledge and skills that the learner should have before attending this course are as follows:
- A minimum of five years of cumulative paid work experience in two or more of the eight CISSP domains is required to become certified.
- A four-year college degree or an approved credential may be substituted for one year of experience.
Course Includes
The course includes the following:
- Official CISSP study materials
- Practice exams and exam simulations
- Post-course online access to additional resources
- Exam voucher for the CISSP certification exam
Day 1: Security and Risk Management
- Introduction to CISSP Boot Camp and Exam Overview
- Introduction to Security and Risk Management
- Security Governance Principles
- Compliance and Legal Issues
- Professional Ethics
- Risk Management Concepts
- Threat Modeling
- Business Continuity Planning (BCP)
Day 2: Asset Security and Security Architecture & Engineering
- Domain 2: Asset Security
- Information and Asset Classification
- Handling and Retention Requirements
- Data Security Controls
- Domain 3: Security Architecture and Engineering
- Secure Design Principles
- Security Models and Architecture
- Cryptography and Secure System Design
Day 3: Communication and Network Security
- Domain 4: Communication and Network Security
- Secure Network Design
- OSI Model and Protocols
- Network Security Controls and Devices
- Secure Communications
- Network Attack Strategies
- Network Access Control
Day 4: Identity and Access Management (IAM) and Security Assessment and Testing
- Domain 5: Identity and Access Management (IAM)
- IAM Concepts and Access Control Models
- Authentication, Authorization, and Accounting (AAA)
- Identity and Access Provisioning Lifecycle
- Domain 6: Security Assessment and Testing
- Security Testing Strategies
- Vulnerability Assessment and Penetration Testing
Day 5: Security Operations and Software Development Security
- Domain 7: Security Operations
- Security Operations and Administration
- Incident Response Management
- Disaster Recovery Planning and Execution
- Domain 8: Software Development Security
- Secure Software Development Life Cycle (SDLC)
- Application Security Controls
- Exam Preparation and Review
- Final Practice Exam and Test-Taking Strategies
Course Wrap-Up:
- Final Q&A and Review
- Exam Registration and Next Steps
- Post-Course Support Information
Lab Outline
Labs are designed to assure learners a whole practical experience, through the following practical activities:
- Lab 1: Developing a Security Policy Framework
- Lab 2: Conducting Risk Assessments
- Lab 3: Designing Secure Network Architectures
- Lab 4: Implementing Data Protection Controls
- Lab 5: Configuring Firewalls and Intrusion Detection Systems (IDS)
- Lab 6: Securing Wireless Networks
- Lab 7: Implementing Identity and Access Controls
- Lab 8: Conducting Vulnerability Scans and Penetration Tests
- Lab 9: Implementing Incident Response Plans
- Lab 10: Securing Applications and Software Development
The primary audience for this course is as follows:
- Security Consultants, Managers, and Auditors
- IT Directors and Managers
- Security Policy Writers and Cybersecurity Professionals
- Network Architects and Analysts
- Any professional seeking to achieve CISSP certification