Travel to Class or join the Live Video Conference via WebEx.

WebEx brings you directly into the Classroom!

Live Online Video Conference gives you the flexibility and a cost effective way to attend Live training events from the convenience of your home, office or even while you travel.  Engineers Login and Participate in the LIVE course with other students attending the course in person.  Live Online students enjoy all the benefits as students who attend in person. Same Books, Same Labs, Same TestPrep, Same Access to the Instructor!  The only thing you miss out on is the travel, the traffic, all the extra expenses and the anxiety of making it to class on time.  WebEx is available on Windows, Linux, MacOS & Mobile devices.  No Excuses. Register today for a class and Get Certified!

Our Live Video Conference via WebEx connections bring you directly into the Classroom!

ISC2 CISSP Bootcamp

Course Description:

This course combines lecture materials and hands-on labs throughout to make sure that you are able to successfully understand security concepts.  This course will help you prepare for the CISSP exam.

Live Online Participants join the Live class via WebEx. 

Live Online Courses give you the flexibility and cost effective way to attend a live training event from the convenience of your home or office.  Engineers will Login and Participate in the LIVE course with other online participants and students attending the course in person.  Live Online students enjoy all the benefits course curriculum, labs and test prep as students who attend in person.

 

Duration: Five days

Monday - Thursday we cover all objectives.  Friday we review all Domains & Chapters followed by a 3 hr. Mock Exam.  ISC2 - CISSP EXAM can be scheduled while you are in class!

 

Certification/Specialization: 

ISC2 CISSP

 

Prerequisite Knowledge:

There are no formal prerequisites for this class.

 

Who Should Attend:

  • Individuals seeking the CISSP certification.
  • Security Analyst
  • Computer Network Defense Analyst
  • Computer Network Defense Infrastructure Support personnel
  • Future Incident Responders and Security Operations Center (SOC) personnel
  • Managers in the cybersecurity field
  • IT personnel looking to learn more about the area of cybersecurity operations

 

Course Delivery Method:

This boot camp is approximately 60% lecture and 40% exam prep.  The instructor uses a combination of “Chalk talk” and “one on one mentoring”, the instructor will NOT always use an overhead projector.  We believe in traditional method of teaching where the subjects were taught and NOT lectured.  The classroom material and labs are based on current CISSP Exam Objectives. Travel to class, or join Live Online via WebEx.

Military and Veteran Pricing

Internetwork Academy Appreciates your Service

CISSP Course Objectives

1. Security and Risk Management (e.g., Security, Risk, Compliance, Law, Regulations, Business Continuity)

  • Understand and Apply Concepts of Confidentiality, Integrity, and Availability
  • Apply Security Governance Principles
  • Compliance
  • Understand Legal and Regulatory Issues that Pertain to Information Security in a Global Context
  • Develop and Implement Documented Security Policy, Standards, Procedures, and Guidelines
  • Understand Business Continuity Requirements
  • Contribute to Personnel Security Policies
  • Understand and Apply Risk Management Concepts
  • Understand and Apply Threat Modeling
  • Integrate Security Risk Considerations into Acquisitions Strategy and Practice
  • Establish and Manage Security Education, Training, and Awareness

2. Asset Security (Protecting Security of Assets)

  • Classify Information and Supporting Assets
  • Determine and Maintain Ownership
  • Protect Privacy
  • Ensure Appropriate Retention
  • Determine Data Security Controls
  • Establish Handling Requirements

3. Security Engineering (Engineering and Management of Security)

  • Implement and Manage an Engineering Life Cycle Using Security Design Principles
  • Understand Fundamental Concepts of Security Models
  • Select Controls and Countermeasures Based Upon Information Systems Security Standards
  • Understand the Security Capabilities of Information Systems
  • Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements
  • Assess and Mitigate Vulnerabilities in Web-based Systems
  • Assess and Mitigate Vulnerabilities in Mobile Systems
  • Assess and Mitigate Vulnerabilities in Embedded Devices and Cyber-Physical Systems
  • Apply Cryptography
  • Apply Secure Principles to Site and Facility Design
  • Design and Implement Facility Security

4. Communications and Network Security (Designing and Protecting Network Security)

  • Apply Secure Design Principles to Network Architecture
  • Securing Network Components
  • Design and Establish Secure Communication Channels
  • Prevent or Mitigate Network Attacks

5. Identity and Access Management (Controlling Access and Managing Identity)

  • Control Physical and Logical Access to Assets
  • Manage Identification and Authentication of People and Devices
  • Integrate Identity as a Service (IDaaS)
  • Integrate Third-Party Identity Services
  • Implement and Manage Authorization Mechanisms
  • Prevent or Mitigate Access Control Attacks
  • Manage the Identity and Access Provisioning Life Cycle

6. Security Assessment and Testing (Designing, Performing, and Analyzing Security Testing)

  • Design and Validate Assessment and Test Strategies
  • Conduct Security Control Testing
  • Collect Security Process Data
  • Conduct or Facilitate Internal and Third-Party Audits

7. Security Operations (e.g., Foundational Concepts, Investigations, Incident Management, Disaster Recovery)

  • Understand and Support Investigations
  • Understand Requirements for Investigation Types
  • Conduct Logging and Monitoring Activities
  • Secure the Provisioning of Resources through Configuration Management
  • Understand and Apply Foundational Security Operations Concepts
  • Employ Resource Protection Techniques
  • Conduct Incident Response
  • Operate and Maintain Preventative Measures
  • Implement and Support Patch and Vulnerability Management
  • Participate in and Understand Change Management Processes
  • Implement Recovery Strategies
  • Implement Disaster Recovery Processes
  • Test Disaster Recovery Plan
  • Participate in Business Continuity Planning
  • Implement and Manage Physical Security
  • Participate in Personnel Safety

8. Software Development Security (Understanding, Applying, and Enforcing Software Security)

  • Understand and Apply Security in the Software Development Life Cycle
  • Enforce Security Controls in the Development Environment
  • Assess the Effectiveness of Software Security
  • Assess Software Acquisition Security

Full 2022 CISSP Bootcamp Training Schedule

2022 Quarter 1

Jan 17 - 21 Live Online

March 14 - March 18 Live Online

 

2022 Quarter 2

- April 2022 -
April 25 - April 29 Austin, TX
April 25 - April 29 Live Online

- June 2022 -
June 06 - June 10 Austin, TX
June 06 - June 10 Live Online

 

2022 Quarter 3

- Aug 2022 -
Aug 01 - Aug 05 San Diego, CA
Aug 01 - Aug 05 Live Online

- September 2022 -
Sept 12 - Sept 16 Austin, TX
Sept 12 - Sept 16 Live Online

2022 Quarter 4

- October 2022 -
Oct 24 - Oct 28 Burbank, CA
Oct 24 - Oct 28 Live Online

- December 2022 -
Dec 19 - Dec 23 Austin, TX
Dec 19 - Dec 23 Live Online