Training Programs Cybersecurity ISC2 CISSP® Training Boot Camp
cart-icn

You already have a course in your cart

You can only add one course to your cart at a time! By adding this course, you will replace the existing course from your cart. How would you like to proceed?

ISC2 CISSP® Training Boot Camp

Take your career to the next level by earning one of the most in-demand cybersecurity certifications. This comprehensive boot camp provides you with a proven method for mastering the broad range of knowledge required to become a Certified Information Systems Security Professional (CISSP).

Infosec-ISC-2-CISSP-Training-Boot-Camp
$4,299.00 (USD)

Have a question?We're here to help

Overview

Objective

Outline

  1. Security & Risk Management
    1. Confidentiality, integrity and availability
    2. Security governance policies and their supporting counterparts
    3. Compliance
    4. Global information security
    5. Legal and regulatory policies
    6. Professional ethics
    7. Business continuity
    8. Personnel security
    9. Risk management
    10. Threat modeling
    11. Acquisition security
    12. Security awareness
  2. Asset Security
    1. Classify information
    2. Identify and document asset ownership
    3. Asset privacy concerns
    4. Asset retention policies
    5. Data security controls
    6. Handling requirements
  3. Security Engineering
    1. Secure engineering processes
    2. Review security engineering models
    3. Security architecture
    4. Web-based vulnerabilities
    5. Mobile vulnerabilities
    6. Embedded device vulnerabilities
    7. Cryptography components and their relationships
    8. Site and facility design
    9. Physical security
  4. Communication and Network Security
    1. Network architecture
    2. Network components
    3. Communication channels
    4. Handling network attacks
  5. Identity & Access Management
    1. Physical and logical access
    2. Authentication of people and devices
    3. Identity as service (cloud identity)
    4. Third-party identity
    5. Authorization mechanisms
    6. Access control attacks
    7. Provisioning life cycle
  6. Security Assessment and Testing
    1. Validate assessment
    2. Security control
    3. Management and operational controls
    4. Analyze and report test outputs
    5. Internal and third-party audits
    6. Security operations
    7. Handling investigations
    8. Investigation types
    9. Logging and monitoring
    10. Provisioning of resources
  7. Security Operations
    1. Resource protection
    2. Incident management
    3. Preventative measures
    4. Patch and vulnerability management
    5. Change management
    6. Disaster recovery
    7. Business continuity
    8. Managing physical security
    9. Personnel safety concerns
  8. Software Development Security
    1. Software development life cycle
    2. Security for development environments
    3. Software security
    4. Purchased software risk

Requirements

Prerequisites

You've got questions.
We're here to help.

Our highly knowledgeable Enrollment Specialists will answer any questions you might have about the course and payment options.

REQUEST INFO

Instructor

FAQs

Reviews

You've got questions.
We're here to help.

Our highly knowledgeable Enrollment Specialists will answer any questions you might have about the course and payment options.

REQUEST INFO
Central Michigan University
Innovation and Online
Global Campus
Mount Pleasant, MI 48859 US
MAIN CONTENT

Copyright © 1997 - 2024 All rights reserved. The material on this site cannot be reproduced or redistributed unless you have obtained prior written permission from Cengage Learning. Privacy Policy