Length: 3 Days
College Credits: 3
Continuing Education Credits: 6
CISSP Exam Preparation- Certified Information Systems Security Professional Certification
This intensive 3-day bootcamp is designed to prepare participants for the CISSP exam by covering the critical domains of the (ISC)² CISSP Common Body of Knowledge (CBK). Through targeted review sessions, practice exams, and expert instruction, candidates will strengthen their grasp of key security concepts and improve their exam readiness.
Learning Objectives
- Understand all eight domains of the CISSP CBK.
- Identify exam topics and key focus areas.
- Apply concepts through sample questions and case studies.
- Learn about the components of the Security and Risk Management domain (Including threat modeling).
- Learn about the components of the Asset Security domain.
- Learn about the components of the Security Engineering domain,
- Learn about the components of the Communications and Network Security domain.
- Learn about the components of the Identity and Access Management domain.
- Learn about the components of the Security Assessment and Testing domain.
- Learn about the components of the Security Operations domain.
- Learn about the components of the Software Development Security domain.
Target Audience
- IT Security Professionals
- Security Consultants
- Security Managers
- IT Directors/Managers
- Security Auditors
- Network Architects
- Anyone preparing for the CISSP certification exam.
Prerequisites
- Basic understanding of information security principles.
Daily Agenda
Day 1: Foundations and Core Security Concepts
Morning Session
- Introduction to the CISSP Exam
- Exam format and structure
- Tips and tricks for the exam
- Study plan strategies
- Domain 1: Security and Risk Management
- Confidentiality, Integrity, and Availability (CIA Triad)
- Security governance and compliance
- Legal, regulatory, and investigative concepts
- Risk analysis, management, and response
- Professional ethics (ISC)² Code of Ethics
- Practice Questions
Afternoon Session
- Domain 2: Asset Security
- Classification and ownership of information and assets
- Data security controls
- Handling and protection of assets
- Domain 3: Security Architecture and Engineering
- Security models and system architecture
- Cryptography fundamentals
- Security capabilities of information systems
- Security evaluation models (Common Criteria, etc.)
- Practice Questions and Case Study Review
Day 2: Technical and Operational Security
Morning Session
- Domain 4: Communication and Network Security
- Secure network architecture and design
- Secure communication channels
- Network attacks and countermeasures
- Secure protocols
- Practice Questions
- Domain 5: Identity and Access Management (IAM)
- Identification, authentication, and authorization
- Identity as a service (IDaaS)
- Federated identity
- Access control models (RBAC, ABAC, MAC, DAC)
Afternoon Session
- Domain 6: Security Assessment and Testing
- Assessment and test strategies
- Security process data collection
- Test outputs and security audits
- Practice Questions and Lab Exercise
- Vulnerability assessment walkthrough
- Sample audit exercise
Day 3: Security Operations and Software Development
Morning Session
- Domain 7: Security Operations
- Investigations and incident management
- Disaster recovery planning (DRP)
- Business continuity planning (BCP)
- Logging, monitoring, and security event management
- Configuration and change management
- Physical security
- Practice Questions
Afternoon Session
- Domain 8: Software Development Security
- Security in the Software Development Life Cycle (SDLC)
- Secure coding guidelines
- Software vulnerabilities and countermeasures
- Mobile and web application security basics
- Final Review and Exam Strategies
- Exam simulations
- Key concepts summary
- Last-minute tips and advice
- Final Mock Test (100+ Questions)
- Time simulation
- Review answers and discuss rationales
Materials Provided
- Participant Workbook (Slides, Notes)
- Practice Exam Questions and Answers
- Domain-by-Domain Study Guides
- Exam Blueprint
- Flashcards for Key Concepts
- Post-Class Access to Online Resources (optional)
This course prepares you for the CISSP exam but does not include the exam fee or scheduling of the exam. Official certification is granted by (ISC)² upon passing the CISSP exam and fulfilling experience requirements.
Program Coverage
The CISSP Exam Prep Bootcamp is a comprehensive program that includes:
1. Security and Risk Management
Principles of confidentiality, integrity, and availability (CIA).
Governance frameworks and compliance regulations.
Professional ethics and security policies.
Risk analysis methodologies, threat modeling, and risk mitigation.
2. Asset Security
Information classification and ownership.
Privacy protection and data handling requirements.
Data lifecycle management and secure data retention policies.
3. Security Architecture and Engineering
Security models and security engineering principles.
Secure design principles for hardware, software, and systems.
Cryptography fundamentals, key management, and cryptographic attacks.
4. Communication and Network Security
Secure network architecture and transmission methods.
Secure protocols, wireless security, and network attacks mitigation.
Virtual Private Networks (VPNs), firewalls, IDS/IPS.
5. Identity and Access Management (IAM)
Authentication mechanisms, authorization models, and accountability.
Single Sign-On (SSO), Federated Identity Management, and Identity as a Service (IDaaS).
Privileged Access Management and access control attacks.
6. Security Assessment and Testing
Design and implement security testing strategies.
Vulnerability assessment techniques and security audits.
Penetration testing planning, execution, and reporting.
7. Security Operations
Logging, monitoring, and Security Information and Event Management (SIEM).
Incident response processes and digital forensics basics.
Disaster Recovery (DR) and Business Continuity Planning (BCP).
Investigations, evidence handling, and legal considerations.
8. Software Development Security
Secure software development life cycle (SDLC) practices.
Common software vulnerabilities and application security controls.
Secure coding techniques, mobile and web application security.