CISSP Certification Boot Camp

CISSP Certification Boot CampSept. 26 – Oct. 1, 2016 – Novato, CA

$3,099 for MISAC members*, $3,799 for non-members*

NOTE: The CISSP Certification Exam WILL be given on the final day of this 6-day course, and the cost is included in the prices quoted above.

LOCATION INFORMATION

Training will start at 8:00am and end at 6:00pm from Monday, Sept. 26 – Saturday, Oct. 1 in the Womack Conference Room (2nd Floor) at Novato City Hall: 922 Machin Ave, Novato, CA 94945. The exam will take place on Saturday, Oct. 1 in the same room, starting at 11:00am.

NEARBY HOTEL INFORMATION

  • 1 mile away – Americas Best Value Inn-Novato-Marin-Sonoma – 7600 Redwood Blvd, Novato, CA 94945 – (415) 892-7500
  • 2 miles away – Days Inn Novato/San Francisco – 8141 Redwood Blvd, Novato, CA 94945 – (415) 897-7111
  • 4.5 miles away – Courtyard Novato Marin/Sonoma – 1400 Hamilton Pkwy, Novato, CA 94949 – (415) 883-8950
  • 5 miles away – Best Western Plus Novato Oaks Inn – 215 Alameda del Prado, Novato, CA 94949 – (415) 883-4400

FOOD & DRINK

A continental breakfast, lunch and drinks will be provided each day. Please contact Jon Barilone at jon@munitechacademy.org if you have any dietary restrictions or food allergies so we can make alternate arrangements.

CISSP CERTIFICATION COURSE OUTLINE

(ISC)² advises that this CISSP Certification training course is intended for professionals who have at least 5 years of recent full-time professional work experience in 2 or more of the 8 domains of the CISSP CBK and are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current information security careers. Learn more at www.isc2.org/cissp-training.aspx.

1. Security and Risk Management
(e.g., Security, Risk, Compliance, Law, Regulations, Business Continuity)

  • Understand and Apply Concepts of Confidentiality, Integrity, and Availability
  • Apply Security Governance Principles
  • Compliance
  • Understand Legal and Regulatory Issues that Pertain to Information Security in a Global Context
  • Develop and Implement Documented Security Policy, Standards, Procedures, and Guidelines
  • Understand Business Continuity Requirements
  • Contribute to Personnel Security Policies
  • Understand and Apply Risk Management Concepts
  • Understand and Apply Threat Modeling
  • Integrate Security Risk Considerations into Acquisitions Strategy and Practice
  • Establish and Manage Security Education, Training, and Awareness

2. Asset Security
(Protecting Security of Assets)

  • Classify Information and Supporting Assets
  • Determine and Maintain Ownership
  • Protect Privacy
  • Ensure Appropriate Retention
  • Determine Data Security Controls
  • Establish Handling Requirements

3. Security Engineering
(Engineering and Management of Security)

  • Implement and Manage an Engineering Life Cycle Using Security Design Principles
  • Understand Fundamental Concepts of Security Models
  • Select Controls and Countermeasures Based Upon Information Systems Security Standards
  • Understand the Security Capabilities of Information Systems
  • Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements
  • Assess and Mitigate Vulnerabilities in Web-based Systems
  • Assess and Mitigate Vulnerabilities in Mobile Systems
  • Assess and Mitigate Vulnerabilities in Embedded Devices and Cyber-Physical Systems
  • Apply Cryptography
  • Apply Secure Principles to Site and Facility Design
  • Design and Implement Facility Security

4. Communications and Network Security
(Designing and Protecting Network Security)

  • Apply Secure Design Principles to Network Architecture
  • Securing Network Components
  • Design and Establish Secure Communication Channels
  • Prevent or Mitigate Network Attacks

5. Identity and Access Management
(Controlling Access and Managing Identity)

  • Control Physical and Logical Access to Assets
  • Manage Identification and Authentication of People and Devices
  • Integrate Identity as a Service (IDaaS)
  • Integrate Third-Party Identity Services
  • Implement and Manage Authorization Mechanisms
  • Prevent or Mitigate Access Control Attacks
  • Manage the Identity and Access Provisioning Life Cycle

6. Security Assessment and Testing
(Designing, Performing, and Analyzing Security Testing)

  • Design and Validate Assessment and Test Strategies
  • Conduct Security Control Testing
  • Collect Security Process Data
  • Conduct or Facilitate Internal and Third-Party Audits

7. Security Operations
(e.g., Foundational Concepts, Investigations, Incident Management, Disaster Recovery)

  • Understand and Support Investigations
  • Understand Requirements for Investigation Types
  • Conduct Logging and Monitoring Activities
  • Secure the Provisioning of Resources through Configuration Management
  • Understand and Apply Foundational Security Operations Concepts
  • Employ Resource Protection Techniques
  • Conduct Incident Response
  • Operate and Maintain Preventative Measures
  • Implement and Support Patch and Vulnerability Management
  • Participate in and Understand Change Management Processes
  • Implement Recovery Strategies
  • Implement Disaster Recovery Processes
  • Test Disaster Recovery Plan
  • Participate in Business Continuity Planning
  • Implement and Manage Physical Security
  • Participate in Personnel Safety

8. Software Development Security
(Understanding, Applying, and Enforcing Software Security)

  • Understand and Apply Security in the Software Development Life Cycle
  • Enforce Security Controls in the Development Environment
  • Assess the Effectiveness of Software Security
  • Assess Software Acquisition Security

Saturday: CISSP Certification Review & Exam

  • Official Training Camp Value-Add Exam Review
  • Official CISSP Certification Exam (On-site)

Course Outline courtesy of TrainingCamp.com

* Once you have paid for this course, it is non-refundable unless MuniTech Academy needs to cancel the course due to lack of a minimum number of attendees.

(Back to top)