Information Security Training Icon

The Official CISSP Certification Prep


5 Days Classroom Session   |  
5 Days Live Online
Classroom Registration
Individual:
$4295.00
Live Online Registration
Live Online:
$4295.00
Private Onsite Package

This course can be tailored to your needs for private, onsite delivery at your location.

Request a Private Onsite Price Quote

Professional Credits

IIBA (CDU)

ASPE is an IIBA Endorsed Education Provider of business analysis training. Select Project Delivery courses offer IIBA continuing development units (CDU) in accordance with IIBA standards.

PMI (PDU)

Select courses offer Leadership (PDU-L), Strategic (PDU-S) and Technical PMI professional development units that vary according to certification. Technical PDUs are available in the following types: ACP, PBA, PfMP, PMP/PgMP, RMP, and SP.

Certification
Overview

This course is the most comprehensive review of information security concepts and industry best practices, and covers the eight domains of the official CISSP CBK (Common Body of Knowledge). You will gain knowledge in information security that will increase your ability to successfully implement and manage security programs in any organization or government entity.

This five-day program is comprised of a total of eight domains and includes:

  • This five-day program is comprised of a total of eight domains and includes:
  • Official (ISC)2 Guide to the CISSP Common Body of Knowledge® (CBK) (electronic format)
  • Official (ISC)2 CISSP Training Handbook
  • Official (ISC)2 CISSP Flash Cards
  • CISSP Practice Test Questions
  • CISSP Certification Exam Voucher


This course covers the eight domains required to pass the CISSP exam in depth:

Security and Risk Management
Asset Security
Security Engineering
Communications and Network Security
Identity and Access Management
Security Assessment and Testing
Security Operations
Software Development Security
Upcoming Dates and Locations
All Live Online times are listed in Eastern Time Guaranteed To Run
Dec 10, 2018 – Dec 14, 2018    8:30am – 4:30pm San Jose, California

Please call ASPE for location details
at 1-877-800-5221
San Jose, CA 95101
United States

Register
Dec 10, 2018 – Dec 14, 2018    8:30am – 4:30pm Washington, District of Columbia

Please call ASPE for location details
at 1-877-800-5221
Washington, DC 20001
United States

Register
Dec 10, 2018 – Dec 14, 2018    11:30am – 7:30pm Live Online Register
Dec 17, 2018 – Dec 21, 2018    8:30am – 4:30pm Live Online Register
Dec 17, 2018 – Dec 21, 2018    8:30am – 4:30pm Morristown, New Jersey

Please call ASPE for location details
at 1-877-800-5221
Morristown, NJ 07960
United States

Register
Course Outline

Part 1: Access Control

  1. Introduction to Access Control
  2. Access Control Key Concepts, Methodologies, and Techniques
  3. System Logging and Monitoring
  4. Access Control Attacks and Threats
  5. Access Control Effectiveness
  6. Identify and Access Provisioning Lifecycle

Part 2: Telecommunications and Network Security

  1. Introduction to Telecommunications and Network Security
  2. Network Models and System Architecture
  3. The Network and IT Security
  4. Understanding the Attack
  5. Tools and Tasks in Network Security
  6. Layer 1: Physical Layer
  7. Layer 2: Data-link  Layer
  8. Layer 3: Network Layer
  9. Layer 4: Transport Layer
  10. Layer 5: Session Layer
  11. Layer 6: Presentation Layer
  12. Layer 7: Application Layer

Part 3: Information Security Governance and Risk Management

  1. Introduction to Information Security Governance and Risk Management
  2. Information Security Governance
  3. The Risk Management Process
  4. Ethical Considerations in Information Security

Part 4: Software development Security

  1. System Life Cycle Security
  2. Systems Development Methodologies
  3. Security Issues with Programming Languages
  4. Assessing the Effectiveness of Software Security
  5. Security Controls
  6. Database Security
  7. Application and Database Security Issues

Part 5: Cryptography

  1. Key Concepts and Common Terminology Used in Cryptography
  2. Historical Aspect of Cryptography
  3. Uses of Cryptography
  4. The Cryptographic Life Cycle
  5. Methods of Cryptography
  6. The Different Encryption Systems
  7. Algorithm Concepts
  8. Methods of Cryptanalytic Attacks
  9. Maintaining Network Security
  10. Maintaining Application Security
  11. Information Hiding Alternatives

Part 6: Security Architecture and Design

  1. Key Concepts and Definitions
  2. Types of Security Models
  3. Components of an Architecture
  4. Basic Principles of System Design
  5. Evaluation Models of Information Systems
  6. Common Security Frameworks
  7. Vulnerabilities and Threats

Part 7: Security Architecture and Design

  1. Key Concepts and Definitions
  2. Types of Security Models
  3. Components of an Architecture
  4. Basic Principles of System Design
  5. Evaluation Models of Information Systems
  6. Common Security Frameworks
  7. Vulnerabilities and Threats

Part 8: Security Operations

  1. Security Concepts and Activities
  2. Protection of Resources
  3. Preventive Measures
  4. Change Management and Configuration Management
  5. System Resilience and Fault Tolerance Requirements 

Part 9: Business Continuity and Disaster Recovery Planning

  1. Processes Required for Planning the Project
  2. Defining the Organization
  3. Plan Implementation 

Part 10: Legal, regulations, Investigations, and Compliance

  1. The Major Legal Systems in Information Security
  2. International Law in Information Security
  3. Supporting the Investigation
  4. The Forensic Investigation
  5. Hardware/Embedded Device Analysis
  6. Compliance Processes and Procedures
  7. Ensure Security in Contractual Agreements and Procurement Processes  

Part 11: Physical (Environmental) Security

  1. Definitions and Key Concepts
  2. Site and Facility Design Considerations
  3. Implementation and Operation of Perimeter Security
  4. Implementation and Operation of Internal Security
  5. Implementation and Operation of Facilities Security
  6. Equipment Protection
  7. Personnel Privacy and Safety  
Who should attend
  • Anyone whose position requires CISSP certification
  • Individuals who want to advance within their current computer security careers or migrate to a related career
Bonus Materials

Your CISSP Certification Exam Voucher is included with the course

Pre-Requisites

The CISSP Boot Camp is for students who have at least four years of recent full-time security professional work experience in two or more of the ten domains of the (ISC)² Certified Information System Security Professional® (CISSP) Common Body of Knowledge® (CBK). The CISSP CBK defines the work experience in architecture, design, management, risk, and controls that assure the security of a business environment.