Before Class
Why It Matters
Starting your CISSP journey with thorough preparation significantly enhances your learning experience and sets you up for success. Engaging with our pre-course materials and connecting with expert instructors before the class allows you to familiarize yourself with key concepts, identify areas for improvement, and arrive ready to fully immerse yourself in the intensive training.
Day 1: Security and Risk Management
- Welcome and Introduction to CISSP Boot Camp
- Overview of CISSP Exam Format and Study Strategy
- Domain 1 Introduction: Security and Risk Management
- Security Governance Principles, Compliance, and Legal Issues
- Professional Ethics, Risk Management Concepts, Threat Modeling, and Security Awareness
- Case Study: Risk Assessment and Management for a Financial Institution
- Theory Lab: Creating a Security Policy Framework
Why It Matters
Mastering risk management enables you to identify threats, manage vulnerabilities, and implement risk mitigation strategies critical to ensuring the security and success of your organization.
Day 2: Asset Security; Architecture & Engineering
- Domain 2: Asset Security
- Information and Asset Classification, Data Security Controls, and Compliance Requirements
- Case Study: Data Classification and Handling in a Healthcare Organization
- Evaluate data classification policies and suggest secure data handling and disposal methods.
- Domain 3: Security Architecture and Engineering
- Secure Design Principles, Security Models and Architectures, Cryptography Principles, and Site Security
- Theory Lab: Designing a Secure Enterprise Architecture
- Theory Lab: Cryptography and PKI Implementation
Why It Matters
Understanding how to classify and protect assets will help you ensure data security and privacy, fundamental to protecting sensitive information in any organization.
Day 3: Communication & Network Security; IAM
- Domain 4: Communication and Network Security
- Secure Network Architecture, Secure Network Components, and Communication Channels
- Case Study: Securing a Multi-Site Network for a Global Enterprise
- Domain 5: Identity and Access Management (IAM)
- Theory Lab: Implementing Identity and Access Management (IAM)
Why It Matters
IAM systems are critical for ensuring that only authorized individuals have access to sensitive data, helping to prevent breaches and maintain compliance.
Day 4: Security Assessment & Testing; Security Operations
- Domain 6: Security Assessment and Testing
- Theory Lab: Conducting a Vulnerability Assessment
- Domain 7: Security Operations
- Theory Lab: Business Continuity and Disaster Recovery Planning
Why It Matters
Being able to assess your systems’ security allows you to identify and fix vulnerabilities before attackers can exploit them, ensuring long-term stability and protection.
Day 5: Software Development Security; Domain Recap
- Domain 8: Software Development Security
- Case Study: Securing the Software Development Life Cycle (SDLC)
- Theory Lab: Secure Code Review and Vulnerability Remediation
- Final Theory Lab: CISSP Practice Exam and Review
- Q&A Session and Final Wrap-Up
Why It Matters
Secure software development is a cornerstone of modern cybersecurity. By integrating security practices into development, you can help reduce vulnerabilities in applications before they’re deployed.
Day 6: The Ultimate Exam Cram
- Review of Key Concepts
- Mock Exams
- Exam Tips and Strategies
- Final Q&A
Why It Matters
Day 6 is dedicated to ensuring you are fully prepared for the CISSP exam. This final day helps solidify your understanding and improves your chances of passing.