cxlISC (2) - CISSP Boot camp class with NO Testing Voucher

Date: 24 - 28 Feb 2020 Days: Mon-Fri Hours: 9:00 AM - 5:00 PM
Course type: Instructor Led
Region: North America
Location: Vienna, VA, United States
Capacity:Open
Enroll by: 24 Feb 2020

About this course

Description

IMPORTANT INFORMATION ABOUT THIS COURSE

Cellebrite will provide: 

  • 35 hours of classroom training preparing students to take the CISSP examination. 
  • Official textbooks: Everything you need to know to be successful and pass your exam. 

NOTE: Estimated delivery of shipments is 5 - 7 days after payment and enrollment are complete.

Time Limit: Participants will have access to the course and all associated course resources for three months (90 days). 

This class DOES NOT INCLUDE an Exam voucher to take CISSP. If you would like to purchase the class as well as the Exam Voucher please visit the Cellebrite Learning Center.

About Cellebrite's (ISC)² Trainers

Cellebrite is an (ISC)² Official Training Providers and uses official courseware developed by (ISC)². This ensures your training content is relevant and up-to-date. The instructors are verified security experts. And they’ve gone through an intense training and authorization process with (ISC)² to teach our content.


About ISC (2) - CISSP Boot camp class with NO Testing Voucher

Cellebrite's Official (ISC)² 5-Day CISSP Certification Boot Camp is a comprehensive study of the information security concepts combined with exam preparation for CISSP. Certified Information Systems Security Professional is an independent information security certification granted by the International Information System Security Certification Consortium, also known as (ISC)². As an official (ISC)² training partner, Cellebrite's CISSP instructors will prepare the student to pass the examination with an intensive review of all the domain knowledge necessary to pass the CISSP examination.



Learning objectives

The 5-day training is a comprehensive review of information security concepts & industry best practices that assist with the preparation for the CISSP exam. The Official (ISC)² courseware covers a broad spectrum of topics in the 8 domains of the CISSP Common Body of Knowledge (CBK). 

Domain 1: Security and Risk Management 

  • Confidentiality, integrity, and availability concepts 
  • Security governance principles 
  • Compliance 
  • Legal and regulatory issues 
  • Professional ethics 
  • Security policies, standards, procedures and guidelines 
Domain 2: Asset Security 

  • Information and asset classification 
  • Ownership (e.g. data owners, system owners) 
  • Protect privacy 
  • Appropriate retention 
  • Data security controls 
  • Handling requirements (e.g. markings, labels, storage) 

Domain 3: Security Architecture and Engineering 

  • Engineering processes using secure design principles 
  • Security models fundamental concepts 
  • Security evaluation models 
  • Security capabilities of information systems 
  • Security architectures, designs, and solution elements vulnerabilities 
  • Web-based systems vulnerabilities 
  • Mobile systems vulnerabilities 
  • Embedded devices and cyber-physical systems vulnerabilities 
  • Cryptography 
  • Site and facility design secure principles 
  • Physical security Domain 4: Communication and Network Security 
  • Secure network architecture design (e.g. IP & non-IP protocols, segmentation) 
  • Secure network components 
  • Secure communication channels 
  • Network attacks 
Domain 5: Identity and Access Management (IAM) 

  • Physical and logical assets control 
  • Identification and authentication of people and devices 
  • Identity as a service (e.g. cloud identity) 
  • Third-party identity services (e.g. on-premise) 
  • Access control attacks 
  • Identity and access provisioning lifecycle (e.g. provisioning review) 
Domain 6: Security Assessment and Testing 

  • Assessment and test strategies 
  • Security process data (e.g. management and operational controls) 
  • Security control testing 
  • Test outputs (e.g. automated, manual) 
  • Security architectures vulnerabilities 
Domain 7: Security Operations 

  • Investigations support and requirements 
  • Logging and monitoring activities 
  • Provisioning of resources 
  • Foundational security operations concepts 
  • Resource protection techniques 
  • Incident management 
  • Preventative measures 
  • Patch and vulnerability management 
  • Change management processes 
  • Recovery strategies 
  • Disaster recovery processes and plans 
  • Business continuity planning and exercises 
  • Physical security 
  • Personnel safety concerns 
Domain 8: Software Development Security 

  • Security in the software development lifecycle 
  • Development environment security controls 
  • Software security effectiveness 
  • Acquired software security impact 

Class details