CISSP®Boot Camp

Approved courseware

Industry expert trainers

35 study hours

Quizzes & workshops

Practice exams

CISSP-Logo

Overview

Certified Information Systems Security Professional (CISSP®) is one of the top certifications in information security. It vouches to a practitioner’s understanding of cybersecurity strategy and their ability to effectively design, implement, and manage a cybersecurity program. As the certification entails (ISC)² membership, certified professionals will further gain exclusive resources, tools, and networking opportunities.

Through the CISSP® Boot Camp, you will prepare for the certification exam by thoroughly studying the topics included in the CISSP Common Body of Knowledge (CBK). You will especially gain competence in the eight domains of CISSP to effectively stem cyber-attacks, expand skillset to meet organizational needs, and advance your own career.

Learning Objectives

In addition to preparing you for the CISSP certification examination, this course will help you achieve the following learning objectives as defined by (ISC)² :

  • Understand and apply fundamental concepts and methods related to the fields of information technology and security 
  • Align overall organizational operational goals with security functions and implementations 
  • Understand how to protect assets of the organization as they go through their lifecycle 
  • Understand the concepts, principles, structures and standards used to design, implement, monitor and secure operating systems, equipment, networks, applications and those controls used to enforce various levels of confidentiality, integrity and availability 
  • Implement system security through the application of security design principles and application of appropriate security control mitigations for vulnerabilities present in common information system types and architectures 
  • Understand the importance of cryptography and the security services it can provide in today’s digital and information age
  • Understand the impact of physical security elements on information system security and apply secure design principles to evaluate or recommend appropriate physical security protections
  • Understand the elements that comprise communication and network security coupled with a thorough description of how the communication and network systems function
  • List the concepts and architecture that define the associated technology and implementation systems and protocols at Open Systems Interconnection (OSI) model layers 1-7
  • Identify standard terms for applying physical and logical access controls to environments related to their security practice
  • Appraise various access control models to meet business security requirements
  • Name primary methods for designing and validating test and audit strategies that support business requirements
  • Enhance and optimize an organization’s operational function and capacity by applying and utilizing appropriate security controls and countermeasures
  • Recognize risks to an organization’s operational endeavors and assess specific threats, vulnerabilities and controls
  • Understand the System Lifecycle (SLC) and the Software Development Lifecycle (SDLC) and how to apply security to it; identify which security control(s) are appropriate for the development environment; and assess the effectiveness of software security

Who Should Attend this Training

  • Chief information security officers 
  • Chief information officers
  • Directors of security
  • IT directors or managers
  • Security managers, auditors, architects, and consultants
  • Security systems engineers
  • Security analysts
  • Network architects

Prerequisites

There are no prerequisites for the training or the certification exam. However, you can only achieve the certification upon passing the exam and having at least five years of cumulative, paid work experience in two or more of the eight domains of the Common Body of Knowledge (CBK).

Examination Format

  • 100 to 150 questions
  • Multiple choice and advanced innovative questions
  • 3 hours duration
  • Passing criteria is 700 out of 1000 points
  • Closed book exam

What’s Next?

CISSP certified practitioners can add to their knowledge with other Information Security Management certifications such as ISO/IEC 27001 Information Security Management System (ISMS) and Certified Information Security Manager (CISM®).

Talk to our Training Advisor?


Training Delivery Options

Self-Paced Training

Features include

  • Study anywhere, anytime, on any device
  • Enjoy lifetime access to accredited courseware
  • Test your knowledge with quizzes and practice exams

Coming Soon!

Instructor-Led Training

Features include

  • Train with the best instructors wherever you are
  • Gain access to quizzes, exams, and valuable resources
  • Interact with instructors in real-time for maximum learning
View Schedule
Coporate Training

Features include

  • Flexible pricing and schedule at your ease
  • Self-paced and instructor-led training options
  • Comprehensive learner assistance and support
Contact us

Syllabus

  • Identify and classify information and assets
  • Determine and maintain information and asset ownership
  • Protect privacy
  • Ensure appropriate asset retention 
  • Determine data security controls 
  • Establish information and asset handling requirements

  • Implement and manage engineering processes using secure design principles
  • Understand the fundamental concepts of security models
  • Select controls based upon systems security requirements
  • Understand security capabilities of information systems 
  • Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements
  • Assess and mitigate vulnerabilities in web-based systems
  • Assess and mitigate vulnerabilities in mobile systems
  • Assess and mitigate vulnerabilities in embedded devices
  • Apply cryptography
  • Apply security principles to site and facility design
  • Implement site and facility security controls

  • Implement secure design principles in network architectures
  • Secure network components
  • Implement secure communication channels according to design

  • Control physical and logical access to assets
  • Manage identification and authentication of people, devices, and services
  • Integrate identity as a third-party service
  • Implement and manage authorization mechanisms
  • Manage the identity and access provisioning lifecycle

  • Design and validate assessment, test, and audit strategies 
  • Conduct security control testing 
  • Collect security process data (e.g., technical and administrative)
  • Analyze test output and generate report 
  • Conduct or facilitate security audits

  • Understand and support investigations
  • Understand requirements for investigation types
  • Conduct logging and monitoring activities
  • Securely provisioning resources
  • Understand and apply foundational security operations concepts
  • Apply resource protection techniques
  • Conduct incident management
  • Operate and maintain detective and preventative measures
  • Implement and support patch and vulnerability management
  • Understand and participate in change management processes
  • Implement recovery strategies
  • Implement Disaster Recovery (DR) processes
  • Test Disaster Recovery Plans (DRP)
  • Participate in Business Continuity (BC) planning and exercises
  • Implement and manage physical security
  • Address personnel safety and security concerns

  • Understand and integrate security in the Software Development Life Cycle (SDLC)
  • Identify and apply security controls in development environments
  • Assess the effectiveness of software security
  • Assess security impact of acquired software
  • Define and apply secure coding guidelines and standards

Exam & Certification FAQs

What is the difference between CISSP CAT and CISSP Linear examinations?

The CISSP Computerized Adaptive Testing (CAT) exam is offered to those who wish to attempt the certification exam in English. It comprises 100 to 150 multiple choice and advanced innovative questions which you should attempt in three hours.

The CISSP Linear exam is offered to those attempting the exam in French, German, Brazilian Portuguese, Spanish, Japanese, Simplified Chinese, and Korean. This exam comprises 250 multiple choice and advanced innovative questions and is six hours long.

 

What does the CISSP exam cover?

The CISSP exam covers the following domains, which are shown with their average weights:

    • Security and Risk Management (15%)
    • Asset Security (10%)
    • Security Architecture and Engineering (13%)
    • Communication and Network Security (14%)
    • Identify and Access Management (13%)
    • Security Assessment and Testing (12%)
    • Security Operations (13%)
    • Software Development Security (10%)

 

What if I do not have the required experience to become a CISSP?

In case you do not have the required experience by the time you pass the exam, you can become an Associate of (ISC)2. You will then have six years to earn the required experience to become a Certified CISSP.

 

Will I need to be recertified?

Yes, you will need to recertify every three years. For this purpose, you need to earn 120 continuing professional education (CPE) credits and pay an Annual Maintenance Fee (AMF). You only need to pay a single AMF for all your (ISC)2 certifications.

 

What is the Online Endorsement Application?

Candidates who pass the CISSP certification exam will need to start the online Endorsement Application. This process entails having your application endorsed and signed by an active (ISC)2 credential holder. If you do not know someone, (ISC)2 will act as your endorser. This process should be completed within nine months. You may also be subjected to an audit and prompted to provide additional information for verification.

Talk to our Training Advisor?


Why Choose LearningCert As Your Training Partner?

Accredited course material

Our training materials received approval by relevant accreditation bodies to assure learners of high quality and consistency.

Accredited Training Organization

LearningCert has been approved by relevant accreditation bodies, and has been licensed to deliver each of the courses offered.

Excellent feedback

From high levels of engagement to quality materials, our courses have received an ‘Excellent’ rating from trainees.

At your premises

Get more from your training and achieve learning objectives faster at your preferred location, at your preferred time.

User Registration

x

Reset Password