651-905-3729 Microsoft Silver Learning Partner EC Counsel Reseller compTIA Authorized Partner

(ISC)2 CISSP Training

6 Days

Description

This Official (ISC)² CISSP Certification Boot Camp is a comprehensive review of Cyber security & industry best practices merged with an award-winning comprehensive exam preparation for the rigorous CISSP adaptive exam.

This CISSP Training features:
• Up-to-date official CISSP courseware with practical interactive exercises
• Emphasis on exam content and format through instruction and mock tests
• Comprehensive study materials and resources
• Support from (ISC)2 certified CISSP experts for any questions
• Unbeatable “CISSP Pass Guarantee” for exam success.

Upon completion of the course, students are offered to attend (as many times as desired) our ongoing live, online full-day exam preparation review sessions prior to taking the examination. We are so confident in our course, we offer the industry’s best “CISSP Free-Retake Guarantee.”

Who Should Attend

Our Official (ISC)² CISSP Certification Boot Camp is ideal for professionals in the information security field who want to become CISSP certified. This includes, but is not limited to:

  • Information security analysts
  • Network architects
  • Security consultants
  • Security managers
  • IT auditors
  • Risk management professionals
  • Chief Information Security Officers (CISOs)

It is also suitable for professionals who want to expand their knowledge and skills in information security, including those working in related fields such as compliance, governance, and cyber law. The boot camp is designed to prepare individuals for the CISSP exam and provide the necessary knowledge and skills to succeed in the field of information security.

No Upcoming Public Classes

There are currently no public events available for this course. However, you can submit a request for a new date and we will try our best to get you into a (ISC)2 CISSP Training class.

Private Training Available
No date scheduled, don’t see a date that works for you or looking for a private training event, please call 651-905-3729 or submit a request for further information here.
request a private session or new date

Course Overview

SECURITY AND RISK MANAGEMENT

  • Understand and apply concepts of confidentiality, integrity and availability
  • Evaluate and apply security governance principles
  • Determine compliance requirements
  • Understand legal and regulatory issues that pertain to information security in a global context
  • Understand, adhere to, and promote professional ethics
  • Develop, document, and implement security policy, standards, procedures, and guidelines
  • Identify, analyze, and prioritize Business Continuity (BC) requirements
  • Contribute to and enforce personnel security policies and procedures
  • Understand and apply risk management concepts
  • Understand and apply threat modeling concepts and methodologies
  • Apply risk-based management concepts to the supply chain
  • Establish and maintain a security awareness, education, and training program

ASSET SECURITY

  • Identify and classify information and assets
  • Determine and maintain information and asset ownership
  • Protect privacy
  • Ensure appropriate asset retention
  • Determine data security controls
  • Establish information and asset handling requirements

SECURITY ARCHITECTURE AND ENGINEERING

  • Implement and manage engineering processes using secure design principles
  • Understand the fundamental concepts of security models
  • Select controls based upon systems security requirements
  • Understand security capabilities of information systems (e.g., memory protection, Trusted Platform Module (TPM), encryption/decryption)
  • Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements
  • Assess and mitigate vulnerabilities in web-based systems
  • Assess and mitigate vulnerabilities in mobile systems
  • Assess and mitigate vulnerabilities in embedded devices
  • Apply cryptography
  • Apply security principles to site and facility design
  • Implement site and facility security controls

COMMUNICATION AND NETWORK SECURITY

  • Implement secure design principles in network architectures
  • Secure network components
  • Implement secure communication channels according to design

IDENTITY AND ACCESS MANAGEMENT (IAM)

  • Control physical and logical access to assets
  • Manage identification and authentication of people, devices, and services
  • Integrate identity as a third-party service
  • Implement and manage authorization mechanisms
  • Manage the identity and access provisioning lifecycle

SECURITY ASSESSMENT AND TESTING

  • Design and validate assessment, test, and audit strategies
  • Conduct security control testing
  • Collect security process data (e.g., technical and administrative)
  • Analyze test output and generate report
  • Conduct or facilitate security audits

SECURITY OPERATIONS

  • Understand and support investigations
  • Understand requirements for investigation types
  • Conduct logging and monitoring activities
  • Securely provisioning resources
  • Understand and apply foundational security operations concepts
  • Apply resource protection techniques
  • Conduct incident management
  • Operate and maintain detective and preventative measures
  • Implement and support patch and vulnerability management
  • Understand and participate in change management processes
  • Implement recovery strategies
  • Implement Disaster Recovery (DR) processes
  • Test Disaster Recovery Plans (DRP)
  • Participate in Business Continuity (BC) planning and exercises
  • Implement and manage physical security
  • Address personnel safety and security concerns

SOFTWARE DEVELOPMENT SECURITY

  • Understand and integrate security in the Software Development Life Cycle (SDLC)
  • Identify and apply security controls in development environments
  • Assess the effectiveness of software security
  • Assess security impact of acquired software
  • Define and apply secure coding guidelines and standards

No Upcoming Public Classes

There are currently no public events available for this course. However, you can submit a request for a new date and we will try our best to get you into a (ISC)2 CISSP Training class.

Private Training Available
No date scheduled, don’t see a date that works for you or looking for a private training event, please call 651-905-3729 or submit a request for further information here.
request a private session or new date

Prerequisites

Click here to see our unofficial CISSP offering

No Upcoming Public Classes

There are currently no public events available for this course. However, you can submit a request for a new date and we will try our best to get you into a (ISC)2 CISSP Training class.

Private Training Available
No date scheduled, don’t see a date that works for you or looking for a private training event, please call 651-905-3729 or submit a request for further information here.
request a private session or new date

Course Comments

Inculdes Exam Voucher

Click here to see our other CISSP course option

No Upcoming Public Classes

There are currently no public events available for this course. However, you can submit a request for a new date and we will try our best to get you into a (ISC)2 CISSP Training class.

Private Training Available
No date scheduled, don’t see a date that works for you or looking for a private training event, please call 651-905-3729 or submit a request for further information here.
request a private session or new date