Sept. 26 – Oct. 1, 2016 – Novato, CA
$3,099 for MISAC members*, $3,799 for non-members*
NOTE: The CISSP Certification Exam WILL be given on the final day of this 6-day course, and the cost is included in the prices quoted above.
LOCATION INFORMATION
Training will start at 8:00am and end at 6:00pm from Monday, Sept. 26 – Saturday, Oct. 1 in the Womack Conference Room (2nd Floor) at Novato City Hall: 922 Machin Ave, Novato, CA 94945. The exam will take place on Saturday, Oct. 1 in the same room, starting at 11:00am.
NEARBY HOTEL INFORMATION
- 1 mile away – Americas Best Value Inn-Novato-Marin-Sonoma – 7600 Redwood Blvd, Novato, CA 94945 – (415) 892-7500
- 2 miles away – Days Inn Novato/San Francisco – 8141 Redwood Blvd, Novato, CA 94945 – (415) 897-7111
- 4.5 miles away – Courtyard Novato Marin/Sonoma – 1400 Hamilton Pkwy, Novato, CA 94949 – (415) 883-8950
- 5 miles away – Best Western Plus Novato Oaks Inn – 215 Alameda del Prado, Novato, CA 94949 – (415) 883-4400
FOOD & DRINK
A continental breakfast, lunch and drinks will be provided each day. Please contact Jon Barilone at jon@munitechacademy.org if you have any dietary restrictions or food allergies so we can make alternate arrangements.
CISSP CERTIFICATION COURSE OUTLINE
(ISC)² advises that this CISSP Certification training course is intended for professionals who have at least 5 years of recent full-time professional work experience in 2 or more of the 8 domains of the CISSP CBK and are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current information security careers. Learn more at www.isc2.org/cissp-training.aspx.
1. Security and Risk Management
(e.g., Security, Risk, Compliance, Law, Regulations, Business Continuity)
- Understand and Apply Concepts of Confidentiality, Integrity, and Availability
- Apply Security Governance Principles
- Compliance
- Understand Legal and Regulatory Issues that Pertain to Information Security in a Global Context
- Develop and Implement Documented Security Policy, Standards, Procedures, and Guidelines
- Understand Business Continuity Requirements
- Contribute to Personnel Security Policies
- Understand and Apply Risk Management Concepts
- Understand and Apply Threat Modeling
- Integrate Security Risk Considerations into Acquisitions Strategy and Practice
- Establish and Manage Security Education, Training, and Awareness
2. Asset Security
(Protecting Security of Assets)
- Classify Information and Supporting Assets
- Determine and Maintain Ownership
- Protect Privacy
- Ensure Appropriate Retention
- Determine Data Security Controls
- Establish Handling Requirements
3. Security Engineering
(Engineering and Management of Security)
- Implement and Manage an Engineering Life Cycle Using Security Design Principles
- Understand Fundamental Concepts of Security Models
- Select Controls and Countermeasures Based Upon Information Systems Security Standards
- Understand the Security Capabilities of Information Systems
- Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements
- Assess and Mitigate Vulnerabilities in Web-based Systems
- Assess and Mitigate Vulnerabilities in Mobile Systems
- Assess and Mitigate Vulnerabilities in Embedded Devices and Cyber-Physical Systems
- Apply Cryptography
- Apply Secure Principles to Site and Facility Design
- Design and Implement Facility Security
4. Communications and Network Security
(Designing and Protecting Network Security)
- Apply Secure Design Principles to Network Architecture
- Securing Network Components
- Design and Establish Secure Communication Channels
- Prevent or Mitigate Network Attacks
5. Identity and Access Management
(Controlling Access and Managing Identity)
- Control Physical and Logical Access to Assets
- Manage Identification and Authentication of People and Devices
- Integrate Identity as a Service (IDaaS)
- Integrate Third-Party Identity Services
- Implement and Manage Authorization Mechanisms
- Prevent or Mitigate Access Control Attacks
- Manage the Identity and Access Provisioning Life Cycle
6. Security Assessment and Testing
(Designing, Performing, and Analyzing Security Testing)
- Design and Validate Assessment and Test Strategies
- Conduct Security Control Testing
- Collect Security Process Data
- Conduct or Facilitate Internal and Third-Party Audits
7. Security Operations
(e.g., Foundational Concepts, Investigations, Incident Management, Disaster Recovery)
- Understand and Support Investigations
- Understand Requirements for Investigation Types
- Conduct Logging and Monitoring Activities
- Secure the Provisioning of Resources through Configuration Management
- Understand and Apply Foundational Security Operations Concepts
- Employ Resource Protection Techniques
- Conduct Incident Response
- Operate and Maintain Preventative Measures
- Implement and Support Patch and Vulnerability Management
- Participate in and Understand Change Management Processes
- Implement Recovery Strategies
- Implement Disaster Recovery Processes
- Test Disaster Recovery Plan
- Participate in Business Continuity Planning
- Implement and Manage Physical Security
- Participate in Personnel Safety
8. Software Development Security
(Understanding, Applying, and Enforcing Software Security)
- Understand and Apply Security in the Software Development Life Cycle
- Enforce Security Controls in the Development Environment
- Assess the Effectiveness of Software Security
- Assess Software Acquisition Security
Saturday: CISSP Certification Review & Exam
- Official Training Camp Value-Add Exam Review
- Official CISSP Certification Exam (On-site)
Course Outline courtesy of TrainingCamp.com
* Once you have paid for this course, it is non-refundable unless MuniTech Academy needs to cancel the course due to lack of a minimum number of attendees.