ISC2 CISSP Live Bootcamp

3 Weeks

·

Cohort-based Course

Designed to prepare students to pass their CISSP® exam on the first attempt "guarantee".

Course overview

Why become a CISSP®?

The exam is designed to test your understanding of the Common Body of Knowledge, which may be thought of as the universal language of information security professionals.


The CISSP® exam covers a lot of theoretical information that is critical for a security professional to understand.

Students will be able to:

01

Understand the 8 domains of knowledge that are covered on the CISSP® exam

02

Apply the knowledge and testing skills learned in class to pass the CISSP® exam

03

Analyze questions on the exam and be able to select the correct answer.

After completing the course students will have:

The foundational information needed to become a Certified Information Systems Security Professional (CISSP®)


An understanding of how to apply the skills learned across the 8 domains to solve security problems when you return to work


The technical skills required to understand each question


Detailed coverage of the 8 domains of knowledge and analytical skills required to pass the CISSP® exam


What people are saying

        Prior to signing up for AIT, I came across a YouTube video of preview class which demonstrated what I was looking for in an instructor. Francois has been very helpful and available during and after the training. He carved out extra time for the exam review and made me feel confident to take the exam. Passed my exam on the first try.
Tomah R.

Tomah R.

AIT Student
        Words cannot express how grateful I am to you Francois for helping me achieve such a great accomplishment. Thank you so much for staying with me every step of this journey, my family and I are looking forward to a great future.
Rebecca L.

Rebecca L.

AIT Student

Meet your instructor

Francois B. Arthanas

Francois B. Arthanas

Founder of AIT, Cyber Training Engineer at ISACA & Former InfoSec Officer at THT

I believe if security is negatively impacting your business, then security is wrong. Security should be the enabler, allowing business to do what the business do best (making money)

Having trained hundreds of students and worked as an information security officer for a healthcare company, has thought me what works and what doesn’t. 


This Live training is designed to help you pass the CISSP® exam on the first attempt.

A pattern of wavy dots

Be the first to know about upcoming cohorts

ISC2 CISSP Live Bootcamp

Course syllabus

01

Introduction to Security and Risk Management

This first section introduces the specific requirements needed to obtain CISSP® certification. The 2021 exam update will be discussed in detail. We will cover the general security principles needed to understand the 8 domains of knowledge, with specific examples for each domain. The first of the 8 domains, Security and Risk Management, will be disc

02

Asset Security and Security Architecture and Engineering

Understanding asset security is critical to building a solid information security program. The Asset Security domain, the initial focus of the second course section, describes data classification programs, including those used by governments, the military, and the private sector. We will also discuss ownership, covering owners ranging from business

03

Security Engineering, Communication and Network Security

This section continues the discussion of the Security Engineering domain, including a deep dive into cryptography. The focus is on real-world implementation of core cryptographic concepts, including the three types of cryptography: symmetric, asymmetric, and hashing. Quantum cryptography and fault injection attacks (newly added in the 2021 exam)

04

Identity and Access Management (IAM) 

Controlling access to data and systems is one of the primary objectives of information security. Domain 5, Identity and Access Management, strikes at the heart of access control by focusing on the identification, authentication, and authorization of accounts. Password-based authentication represents a continued weakness.....

05

Security Assessment, Testing and Operations

This course section covers Domain 6 (Security Assessment) and Domain 7 (Security Operations). Security Assessment covers types of security tests, testing strategies, and security processes. Security Operations covers investigatory issues, including eDiscovery, logging and monitoring, and provisioning. We will discuss cutting-edge technologies....

06

Software Development Security

The final course section examines Domain 8 (Software Development Security), which describes the requirements for secure software. Security should be "baked in" as part of network design from day one, since it is always less effective when it is added later to a poor design. We will discuss classic development models, including waterfall and SDLC...

Course schedule

15 - 20 hours per week

  • 3 Saturdays

    9:00am - 5:00pm EST


  • 3 Sundays

    15 - 20 hours per week


A pattern of wavy dots

Be the first to know about upcoming cohorts

ISC2 CISSP Live Bootcamp