Compass Technical Training in Quincy, Massachusetts1-617-481-9141 Compass Technical Training in Quincy, Massachusettsinfo@compasstechnicaltraining.com

CISSP Certification
Training

Now Offering
Student Loans


✔ 1-617-481-9141

Call Now
For More Information!

Now Offering
Student Loans


✔ 1-617-481-9141

Call Now
For More Information!

Special Financing Available
Payments as low as $100 per month

Certified Information Systems Security Professional (CISSP)

Accelerate your cybersecurity career with the CISSP certification.

Earning the CISSP proves you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program. With a CISSP, you validate your expertise and become an (ISC)² member, unlocking a broad array of exclusive resources, educational tools, and peer-to-peer networking opportunities.

Compass Technical Training's CISSP certification materials are always up to date and are synchronized with the latest (ISC)² exam objectives. Our comprehensive curriculum combined with professional CISSP training by expert instructors will be give you the edge you'll need to pass the CISSP exam.

Prove your skills, advance your career, and gain the support of a community of cybersecurity leaders to support you throughout your career

Certified Information Systems Security Professional (CISSP) Training

The goal of the bootcamp is to prepare you for the challenging CISSP exam by covering the objectives defined in the (ISC)² common body of knowledge (CBK). This material is matched to the most recent (ISC)² exam objectives and designed to provide you an unmatched, total immersion training experience that will successfully prepare you to pass the CISSP exam.

The CISSP is seen by many in the industry as one of the most sought-after certifications available today. It is a vendor-neutral qualification that encourages candidates to design, create, and deploy security systems and protocols within the organization.

What makes this qualification even more prestigious is that you must have a minimum of five years of cumulative, paid full-time work experience relating to two or more of the eight domains in the exam.


Key Features of this CISSP Training:
About the course:
  • Official CISSP Curriculum
  • Instructor led training and coaching benefit
  • Quiet classroom environment
  • Exam voucher is NOT included with course tuition
Prerequisites to obtain the CISSP certification:
  • At least five years of professional experience in the information security field
  • A work history reflecting direct experience in at least two of the eight domains listed in the (ISC)² CISSP Common Body of Knowledge (CBK)

  • Note: you can become an Associate of (ISC)² by passing the exam without the required work experience.
Registration:
  • Note: registration for CISSP Bootcamp must be completed at least 10 days prior to start date
CISSP Course Objectives

The Certified Information Systems Security Professional (CISSP) course will cover a variety of topics, including the following eight domains:

  • Domain 1: Security & risk management
    • Confidentiality, integrity and availability
    • Security governance policies and their supporting counterparts
    • Compliance
    • Global information security
    • Legal and regulatory policies
    • Professional ethics
    • Business continuity
    • Personnel security
    • Risk management
    • Threat modeling
    • Acquisition security
    • Security awareness
  • Domain 2: Asset security
    • Classify information
    • Identify and document asset ownership
    • Asset privacy concerns
    • Asset retention policies
    • Data security controls
    • Handling requirements
  • Domain 3: Security engineering
    • Secure engineering processes
    • Review security engineering models
    • Security architecture
    • Web-based vulnerabilities
    • Mobile vulnerabilities
    • Embedded device vulnerabilities
    • Cryptography components and their relationships
    • Site and facility design
    • Physical security
  • Domain 4: Communication and network security
    • Network architecture
    • Network components
    • Communication channels
    • Handling network attacks
  • Domain 5: Identity and access management
    • Physical and logical access
    • Authentication of people and devices
    • Identity as service (cloud identity)
    • Third-party identity
    • Authorization mechanisms
    • Access control attacks
    • Provisioning life cycle
  • Domain 6: Security assessment and testing
    • Validate assessment
    • Security control
    • Management and operational controls
    • Analyze and report test outputs
    • Internal and third party audits
    • Security operations
    • Handling investigations
    • Investigation types
    • Logging and monitoring
    • Provisioning of resources
  • Domain 7: Security operations
    • Resource protection
    • Incident management
    • Preventative measures
    • Patch and vulnerability management
    • Change management
    • Disaster recovery
    • Business continuity
    • Manage physical security
    • Personnel safety concerns
  • Domain 8: Software development security
    • Software development life cycle
    • Security for development environments
    • Software security
    • Purchased software risk

Request Course
Information

Need more information before you make a decision? Use our contact form to request additional details about our courses!


Request Information about this course


Upcoming Schedule



Please call to schedule this bootcamp style training course

1-617-481-9141

↑ Top
Comodo Positive SSL Certified