Log On/Register  

855.838.5028

CISSP (ISC)2 - Certified Information Systems Security Professional Bootcamp

Duration: 5 Days
Course Price: $3,395

Learn IT! offers this top-notch Boot Camp to train and prepare for the Certified Information Systems Security Professional (CISSP®), the premier security certification created and administered by the International Systems Security Certification Consortium (ISC²). CISSP holders have the necessary skills and best practices to provide IT leadership in the creation and execution of enterprise security infrastructure.

Learn IT!'s CISSP program focuses on preparing students for the CISSP exam through extensive mentoring and drill sessions, review of the entire body of knowledge, and practical question and answer scenarios, all following a high-energy seminar approach.

Learn IT! is not responsible to register students for exams. For more information on the Exam requirements, schedules and to register here are the following links:

Course Completion

Completing our CISSP Boot Camp will provide you with valuable skills, including the ability to:

  • Competently handle security threats
  • Gain credentials as a leading security professional for current and future employment
  • Proficiently understand the 10 essential core domains of the common body of knowledge:
  • Security Management Practices
  • Access Control Systems and Methodology
  • Security Architecture and Models
  • Business Continuity and Disaster Recovery Planning
  • Cryptography
  • Physical Security
  • Network and Telecommunications Security
  • Computer Law, Investigations and Ethics
  • Applications and Systems Development
  • Security Operations Security

Certified Professional Exam

Learn IT!'s CISSP Boot Camp comprehensively prepares students for the CISSP certification exam.

Learn IT! offers this top-notch Boot Camp to train and prepare for the Certified Information Systems Security Professional (CISSP®), the premier security certification created and administered by the International Systems Security Certification Consortium (ISC²). CISSP holders have the necessary skills and best practices to provide IT leadership in the creation and execution of enterprise security infrastructure.

Learn IT!'s CISSP program focuses on preparing students for the CISSP exam through extensive mentoring and drill sessions, review of the entire body of knowledge, and practical question and answer scenarios, all following a high-energy seminar approach.

Learn IT! is not responsible to register students for exams. For more information on the Exam requirements, schedules and to register here are the following links:

Course Completion

Completing our CISSP Boot Camp will provide you with valuable skills, including the ability to:

  • Competently handle security threats
  • Gain credentials as a leading security professional for current and future employment
  • Proficiently understand the 10 essential core domains of the common body of knowledge:
  • Security Management Practices
  • Access Control Systems and Methodology
  • Security Architecture and Models
  • Business Continuity and Disaster Recovery Planning
  • Cryptography
  • Physical Security
  • Network and Telecommunications Security
  • Computer Law, Investigations and Ethics
  • Applications and Systems Development
  • Security Operations Security

Certified Professional Exam

Learn IT!'s CISSP Boot Camp comprehensively prepares students for the CISSP certification exam.

Prerequisites

Prior to enrolling in Learn IT!'s CISSP Boot Camp, students should have roughly three years of experience in security.

Course Outline

Day 1   Day 2
  • Introduction
  • Security Management Practices
  • Management Responsibilities
  • Security Policies and their supporting counterparts
  • Information Classification
  • Roles and Responsibilities
  • Risk Management
  • Security Awareness
  • Access Control
  • Identification, authentication, authorization methods
  • Authentication methods, models and technologies
  • Discretionary, mandatory and non-discretionary access control
  • Accountability, monitoring and auditing practices
  • Possible threats to access control practices and technologies
  • Security Architecture
  • Computer architecture and the items that fall within it
  • Components within an operating system
  • OSI Model
  • Trusted computing base and security mechanisms
  • Different security models used in software development
  • Security criterion and ratings
  • Certification and accreditation processes
  • Business Continuity Planning
  • Business Continuity Planning
  • Disaster Recovery Planning
  • Possible Threats
  • Business Impact Analysis
  • Roles and Responsibilities
  • Backups and Off-site Facilities
Day 3   Day 4
  • Cryptography
  • History of cryptography
  • Cryptography components and their relationships
  • Government involvement in cryptography
  • Symmetric and asymmetric key cryptosystems
  • Public key infrastructure (PKI) concepts and mechanisms
  • Hashing algorithms and uses
  • Types of attacks on cryptosystems
  • Physical Security
  • Administrative, technical and physical controls pertaining to physical security
  • Facility location, construction and management
  • Physical security risks, threats and countermeasures
  • Electrical issues and countermeasures
  • Fire prevention, detection and suppression
  • Authenticating individuals and intrusion detection
  • Telecommunication, Network and Internet Security
  • TCP/IP Suite
  • Cabling and data transmission types
  • LAN and WAN technologies
  • Network devices and service
  • Telecommunication protocols and devices
  • Remote access methods and technologieFault tolerance mechanisms
  • Law, Investigations, Ethics
  • Ethics, pertaining to security professionals and best practices
  • Computer crimes and computer laws
  • Motivations and profiles of attackers
  • Computer crime investigation process and evidence collection
  • Incident handling procedures
  • Different types of evidence
  • Laws and acts put into effect to fight computer crime
Day 5    
  • Applications Security
  • Different types of software controls and implementation
  • Database concepts and security issues
  • Data warehousing and data mining
  • Software life cycle development processes
  • Change control concepts
  • Object-oriented programming components
  • Expert systems and artificial intelligence
  • Operations Security
  • Operations responsibilities
  • Configuration management
  • Media access protection
  • System recovery
  • Facsimile security
  • Intrusion detection systems
  • Attack types
 
Learn More
Please type the letters below so we know you are not a robot (upper or lower case):