ISC2 – CISSP
ISC2 - CISSP - Earning the CISSP proves you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program. With a CISSP, you validate your expertise, unlocking a broad array of exclusive resources, educational tools, and peer-to-peer networking opportunities.
Prerequisites: The CISSP is ideal for experienced security practitioners, managers and executives interested in proving their knowledge across a wide array of security practices and principles, including those in the following positions: Chief Information Security Officer Chief Information Officer Director of Security IT Director/Manager Security Systems Engineer Security Analyst Security Manager Security Auditor Security Architect Security Consultant Network Architect
Learning Outcomes:
Accelerate your cybersecurity career with the CISSP certification. Earning the CISSP proves you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program. With a CISSP, you validate your expertise and become an (ISC)² member, unlocking a broad array of exclusive resources, educational tools, and peer-to- peer networking opportunities. Prove your skills, advance your career, and gain the support of a community of cybersecurity leaders here to support you throughout your career
NICE Framework Connections:
Knowledge Skills and Abilities (KSAs) Mapping:
The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Specialty Area details within the interactive National Cybersecurity Workforce Framework.
Course Outline:
ISC2 - CISSP - Earning the CISSP proves you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program. With a CISSP, you validate your expertise, unlocking a broad array of exclusive resources, educational tools, and peer-to-peer networking opportunities.
Prerequisites: The CISSP is ideal for experienced security practitioners, managers and executives interested in proving their knowledge across a wide array of security practices and principles, including those in the following positions: Chief Information Security Officer Chief Information Officer Director of Security IT Director/Manager Security Systems Engineer Security Analyst Security Manager Security Auditor Security Architect Security Consultant Network Architect
Learning Outcomes:
Accelerate your cybersecurity career with the CISSP certification. Earning the CISSP proves you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program. With a CISSP, you validate your expertise and become an (ISC)² member, unlocking a broad array of exclusive resources, educational tools, and peer-to- peer networking opportunities. Prove your skills, advance your career, and gain the support of a community of cybersecurity leaders here to support you throughout your career
NICE Framework Connections:
- Securely Provision
- Operate and maintain
- Protect and Defend
- Oversee and Govern
Knowledge Skills and Abilities (KSAs) Mapping:
The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Specialty Area details within the interactive National Cybersecurity Workforce Framework.
- Risk Management
- Systems Analysis
- Vulnerability Assessment and Management
- Cybersecurity Management
- Program/Project Management and Acquisition
Course Outline:
- Security and Risk Management
- Network Security - EAP PEAP LEAP
- Identity and Access Management (IAM) - Federation
- Asset Security
- Identity and Access Management (IAM) - Active Directory
- Security Assessment and Testing
- Asset Security -Intellectual Property
- Identity and Access Management (IAM) - IAAA
- Security Assessment and Testing - Types
- Security Architecture and Engineering
- Identity and Access Management (IAM) - Principle of Least Privilege
- Security Operations - Defense in Depth
- Security Architecture and Engineering - Models
- Identity and Access Management (IAM) - Provisioning Accounts
- Security Operations - HIDS vs. NIDS
- Network Security - Architecture and Design
- Identity and Access Management (IAM) - RBAC
- Software Development Security
- Software Development Security - Methods
WATCH THESE VIDEOS
Usually, students across the nation struggle with these topics when attempting the CISSP
If you watch these videos, you WILL learn more about each of these topics. I suggest watching these videos @ 1.5x speed if you can stand my voice for any longer 😊
Identity and Access Management Overview
https://youtu.be/g9BOjBTj6gg
Clouds - Pizza As A Service
https://youtu.be/phZo-jssAAw
Network Segmentation - VLANS
https://youtu.be/6dghYSZzcF8
Using Smoky the Bear approach for Authorization Mechanisms – DAC, MAC, RBAC, Rule Based
https://youtu.be/-Y2FboBbgnc
Security Models – Bell-Lapadula, Biba, Clark-Wilson, Yo-Mamma?
https://youtu.be/zkxUFNuZIcw
Authentication for Dummies - EAP PEAP LEAP - YOU CHEAP
https://youtu.be/I5UofyTDSUQ
ALE, SLE, ARO - Risk Management and Risk Assessment
https://youtu.be/eMUZ8HpJ8ho
802.11 -- WEP Sucks! What types Of Wireless Encryption Should you use?
https://youtu.be/axDvGWvPbSQ
Identity and Access Management Overview
https://youtu.be/g9BOjBTj6gg
Clouds - Pizza As A Service
https://youtu.be/phZo-jssAAw
Network Segmentation - VLANS
https://youtu.be/6dghYSZzcF8
Using Smoky the Bear approach for Authorization Mechanisms – DAC, MAC, RBAC, Rule Based
https://youtu.be/-Y2FboBbgnc
Security Models – Bell-Lapadula, Biba, Clark-Wilson, Yo-Mamma?
https://youtu.be/zkxUFNuZIcw
Authentication for Dummies - EAP PEAP LEAP - YOU CHEAP
https://youtu.be/I5UofyTDSUQ
ALE, SLE, ARO - Risk Management and Risk Assessment
https://youtu.be/eMUZ8HpJ8ho
802.11 -- WEP Sucks! What types Of Wireless Encryption Should you use?
https://youtu.be/axDvGWvPbSQ
PLEASE NOTE: WE PROVIDE THE CISSP CERTIFICATION EXAM VOUCHER FOR THIS COURSE, BUT THE EXAM WILL NEED TO BE SCHEDULED SEPARATELY at a convenient Pearson-Vue test center. The exam voucher can be purchased through CyberProtex as part of the price or can be purchased directly through Pearson-Vue.
Exam voucher must be used (exam taken) within one year of bootcamp.
All courses are subject to cancellation and/or rescheduling due to insufficient enrollment or unforeseen circumstances, as per CyberProtex Policy. Additionally, if for some unforeseen reason an instructor cannot be available at any particular time, we will notify the attendees of the class as soon as possible and allow a makeup time for the missed instruction due to the instructors' absence.
Exam voucher must be used (exam taken) within one year of bootcamp.
All courses are subject to cancellation and/or rescheduling due to insufficient enrollment or unforeseen circumstances, as per CyberProtex Policy. Additionally, if for some unforeseen reason an instructor cannot be available at any particular time, we will notify the attendees of the class as soon as possible and allow a makeup time for the missed instruction due to the instructors' absence.