CISSP Practice Exams Member Login | Contact and Support

CISSP Certification Bootcamp
On-Demand Course Now $498.00


Flexible course access from your web browser or mobile device.

This On-Demand CISSP Bootcamp course is designed to comprehensively prepare students for the CISSP exam. Access intensive, self-paced course lessons without limitation, from any web browser or mobile device. Our CISSP training program covers all aspects of the CISSP CBK Domains. Includes 18+ hours of interactive course lessons, full CISSP study guide, CISSP chapter quizzes, and more.


CPE Credits Included with Course

Includes 18 CEU Credits from (ISC)² and course certificate


Course Instructor

Shon Gerber, CISSP


Registration Cost - $698.00 (USD)
Save $200.00
Now $498.00 (USD) with 180-day access





Add CISSP Practice Exams and Save an Extra $10





What Our Students are Saying

"If you utilize this training course you will have the ability to apply your already learned knowledge to the real exam very well. The CISSP is a very hard exam which has a broad range of questions and very tricky wording. CISSP exam prep provides an important tool which helped me pass the CISSP on the first try."

Bobby Nasham, CISSP - Information Security Engineer
Boston, MA

"I passed my exam last month. Your CISSP exam preparation site was a great study tool. Thank You."

Minesh Pujara, CISSP
Capgemini
United Kingdom

"This online exam prep delivers as promised. Top notch CISSP training that will dramatically expand your "insight" base. A comprehensive yet affordable approach to CISSP exam preparation."

John Latawiec, CISSP

"I passed the CISSP exam which I gave on 9th October and also have completed my endorsement as a CISSP. The training quality was very good. Keep up the good work. I would recommend this product to anyone who aspires for CISSP."

Nina Vara, CISSP
United Kingdom

Intensive CISSP Course Curriculum - Designed for On-Demand Learning

Course Milestones 1 - 3:

  • Course Introduction 15m Course
  • Domain 01 - Security and Risk Management 3h 7m
  • Domain 02 - Asset Management 1h 24m

Course Milestones 4 - 6:

  • Domain 03 - Security Architecture and Engineering 2h 57m
  • Domain 04 - Communication and Network Security 1h 2m
  • Domain 05 - Identity and Access Management 1h 14m

Course Milestones 6 - 9:

  • Domain 06 - Security Assessment and Testing 1h 14m
  • Domain 07 - Security Operations 3h 21m
  • Domain 08 - Software Development Security 1h 5m

Included in this CISSP Training Course

Over 18 Hours of Interactive Lessons, Available On-Demand

Taught by Shon Gerber, each course milestone contains interactive training lessons designed for On-Demand learning and busy schedules. Complete the entire curriculum in order, or re-visit training lessons as many times as you like.

CISSP Study Guide

A detailed CISSP Study Guide is included as a supplement to the course. The CISSP Study Guide summarizes each course session, focusing on key CISSP concepts from each segment.

Interactive Lessons Available On-Demand

CISSP Study Guide for each lesson




CISSP Chapter Quizzes

CISSP quizzes are provided following each interactive milestone to reinforce CISSP topics and test knowledge. Add our CISSP exam system and receive an additional discount.

Access from any mobile device

Ready to learn on the go? Use your smart phone or tablet to access all course features no matter where you are. View lessons, take quizzes, and review study guide material all from your mobile device.

Interactive chapter quizzes included

Access the course from your mobile device




Comprehensive CISSP Curriculum included with this On-Demand Certification Course

Detailed Online CISSP Course Curriculum

Developed by Shon Gerber, below is the detailed curriculum covered by this CISSP certification course. Students will come away with a thorough understanding of IT Security through the perspective of ISC2 and the CISSP Common Body of Knowledge (CBK), and will be prepared to take the CISSP exam.

CISSP Domain 01 - Security and Risk Management

Topic: Confidentiality, Integrity, and Availability
Confidentiality
Integrity
Availability
References
Topic: Security Governance
Security Governance Principles
Security Functions to Business Goals
Organizational Processes
Roles and Responsibilities
Security Control Frameworks
Due Care / Due Diligence
References
Topic: Compliance Requirements
Compliance Requirements
Contracts, Legal, Industry Standards
Privacy Requirements
References
Topic: Legal and Regulatory - Global
Legal and Regulatory - Global
Cyber Crimes and Data Breaches
Intellectual Property
Import / Export Controls
Trans-border Data Flows
Privacy
References
Topic: Professional Ethics
Professional Ethics
Topic: Security Policy, Standards, Procedures
Security Policy, Standards, Procedures
References
Topic: Business Continuity
Business Continuity
Document Scope and Plan
Business Impact Analysis
References
Topic: Personal Security Policies
Personal Security Policies
Candidate Screening / Hiring
Employment Agreements / Polices
On-boarding / Termination Process
Vendor, Consultant, Contractor
Compliance Policy Requirements
Privacy Policy Requirements
References
Topic: Apply Risk Management
Apply Risk Management
References
Topic: Threat Modeling
Threat Modeling – Concepts / Methodology
Threat Modeling – Categorizing Threats
Threat Modeling – Generic Steps
Threat Modeling – Analyzing Risk
References
Topic: Risk Management – Supply Chain
Risk Management – Hardware, Software
Risk Management – 3rd Party Evaluations
Risk Management – Minimum Security
References
Topic: Security Awareness and Training
Security Awareness and Training
Methods and Techniques
Periodic Content Reviews
Effectiveness Evaluations
References

CISSP Domain 02 - Asset Management

Topic: Identify and Classify
Data Classification
Asset Classification
References
Topic: Asset Ownership
Asset Ownership
References
Topic: Protect Privacy
Data Owners
Data Processors
Data Remanence
Data Collection
References
Topic: Asset Retention
Asset Retention
Record Retention
References
Topic: Data Security Controls
Data Security Controls
Scoping and Tailoring
Standards Selection
Data Protection Methods
References
Topic: Information / Asset Handling
Information / Asset Handling
Failure Examples
Storage Options
References

CISSP Domain 03 - Security Architecture and Engineering

Topic: Engineering Processes and Secure Design
Engineering Processes and Secure Design
Closed / Open Systems
Closed / Open Source Code
Techniques / Confinement
Bounds
Process Isolation
Controls / MAC and DAC
References
Topic: Concepts of Security Models
Concepts of Security Models
Security Perimeter
Reference Monitors / Security Kernels
Various Models
References
Topic: Controls Based on Security Requirements
Controls Based on Security Requirements
Rainbow Series
TCSEC
ITSEC / Common Criteria
Common Criteria
References
Topic: Security Capabilities of Information Systems
Security Capabilities of Information Systems
Virtualization
Trusted Platform Module
References
Topic: Assess / Mitigate Vulnerabilities
Assess / Mitigate Vulnerabilities
Local Caches
Server-Based Systems
Database Systems
Industrial Control Systems
Cloud-Based Systems
Distributed Systems
Internet of Things
References
Topic: Assess / Mitigate Vulnerabilities (Web)
Assess / Mitigate Vulnerabilities (Web)
References
Topic: Assess / Mitigate Vulnerabilities (Mobile)
Assess / Mitigate Vulnerabilities (Mobile)
Device Security
Application Security
References
Topic: Assess / Mitigate Vulnerabilities (Embedded)
Assess / Mitigate Vulnerabilities (Embedded)
Embedded / Static Systems
Securing Embedded / Static Systems
References
Topic: Apply Cryptography
Apply Cryptography
Cryptographic Life Cycle
Cryptographic Methods
Symmetric Key
Asymmetric Key
Elliptic Curve
Public Key Infrastructure
Certificates
Key Management
Digital Signatures
Integrity - Hashing
Cryptanalytic Attacks
Digital Rights Management (DRM)
References
Topic: Site / Facility Security Principles
Site / Facility Security Principles
References
Topic: Site / Facility Security Controls
Site / Facility Security Controls
Server Rooms / Data Centers
Media Storage Facilities
Evidence Storage
Restricted and Work Area Security
Utilities and HVAC
Environmental Issues
Fire Prevention, Detection, and Suppression
Fire Extinguishers / Detection
Water Suppression / Gas Discharge
References

CISSP Domain 04 - Communication and Network Security

Topic: Secure Design and Network Architecture
Secure Design and Network Architecture
OSI Model
Encapsulation / Decapsulation
Physical / Data Link Layers
Network Layer
Transport Layer
Session Layer
Presentation Layer
Application Layer
IP Networking
TCP/IP
SYN / ACK / TCP
IP Classes
Multilayer Protocols
Converged Protocols
Wireless Networks
Secure SSID
Secure Encryption Protocols
References
Topic: Secure Network Components
Operation of Hardware
Firewalls
Firewall Inspection
Transmission Media
Baseband / Broadband
Twisted Pair
Network Access Controls
Network Access Controls - Concepts
Endpoint Security
Distribution Networks
References
Topic: Secure Communication Design
Voice
PBX Fraud
Multimedia Collaboration
Remote Meeting
Securing Email
Remote Access
Remote Authentication
Virtualized Networks
VPN Protocols
References

CISSP Domain 05 - Identity and Access Management

Topic: Physical and Logical Access
Information
Access Control Process
Logical and Technical Access Controls
Systems
Devices
Facilities
References
Topic: Manage Identification / Authentication
Identity Implementation
Single / Multi-factor Authentication
Service Authentication
Accountability
Session Management
Registration / Proofing Identity
Federated Identity Management
Common Language
Credential Management Systems
CyberArk
References
Topic: Integrate Identity as a Third-Party Service
On-Premise
Cloud
Federated
References
Topic: Implement and Manage Authorization
Role-Based Access
Upsides / Downsides
Rule-Based Access
Mandatory Access
Discretionary Access
Attribute-based Access
References
Topic: Manage Identity / Access Lifecycle
Account Review
System Access Review
Provisioning
References

CISSP Domain 06 - Security Assessment and Testing

Topic: Assessment, Test, and Audit Strategies
Assessment, Test, and Audit Strategies
Security Assessment / Testing
Security Assessments
External / Third Party
Auditing Standards
References
Topic: Security Control Testing
Vulnerability Assessment
Vulnerability Scans
Network Vulnerability Scans
Web Vulnerability Scans
Penetration Testing
Testing Options
Log Reviews
Synthetic Transaction
Code Review / Testing
Testing Options (cont.)
Misuse Case Testing
Test Coverage Analysis
Interface Testing
References
Topic: Security Process Data
Account Management
Management Review
Performance and Risk Indicators
Backup Verification
Training and Awareness
References
Topic: Analyze Test Output / Generate Reports
Analyze Test Output / Generate Reports
External Scan Report
References
Topic: Conduct / Facilitate Security Audit
Internal Aspects
External / 3rd Party Aspect
References

CISSP Domain 07 - Security Operations

Topic: Investigations
Evidence Collection
Network / Software / Hardware Analysis
Reporting and Documentation
Investigative Techniques
Gathering Evidence
Digital Forensics
Chain of Custody
References
Topic: Investigation Team
Administrative Aspects
Criminal Investigations
Civil Investigations
Regulatory Investigations
References
Topic: Logging and Monitoring Activities
SIEM
Deployment
Continuous Monitoring
Egress Monitoring
Tools to Assist
References
Topic: Provisioning Resources
Asset Inventory
Asset Management
Cloud-Based Management
Configuration Management
References
Topic: Security Operations Concepts
Separation of Duties
Need to Know / Least Privilege
Separation of Privilege
Privileged Account Management
Job Rotation
Information Lifecycle
Key Phases of Data
Service Level Agreements
References
Topic: Protection Techniques
Media Management
Hardware / Software Asset Management
Software
References
Topic: Incident Management
Detection
Responsive
Reporting
Legal / Compliance
Recovery
Remediation
Lessons Learned
References
Topic: Detective / Preventative Measures
Firewalls
Intrusion Detection / Prevention
Knowledge / Behavior-Based
Network / Host-Based
Whitelisting / Blacklisting
Third-Party Security Services
Sandboxing
Honeypots/Honeynets
Anti-Malware
References
Topic: Patch and Vulnerability Management
Patch / Vulnerability Management
Patch Management
References
Topic: Change Management Processes
Change Management
Security Impact Analysis
References
Topic: Implement Recovery Strategies
Backup Storage
Recovery Site Strategies
Business / Functional Unit Priorities
Crisis Management
Multiple Processing Sites
Options
Cloud Computing
High Availability / QoS
Hard Drives / Power Sources
QoS
References
Topic: Implement Disaster Recovery
Response
Personnel
Communications
Assessment
Restoration
Training and Awareness
References
Topic: Test Disaster Recovery
Overview
Read-Through Checklists
Walk-Through (Table-Top)
Simulation Test
Parallel Test
Full Interruption
References
Topic: Implement / Manage Physical Security
Perimeter Security
Fences, Gates and Lighting
Security Dogs
Internal Security Controls
Badges / Regulatory Requirements
References
Topic: Personnel Safety / Security
Travel
Security Training and Awareness
Emergency Management
Duress
References

CISSP Domain 08 - Software Development Security

Topic: Software Development Life Cycle
Development Methodologies
Functional Requirements / Control Specifications
Design / Code Review
User Acceptance Testing / Change Management
Maturity Models
Agile / SW-CMM
Change Management
Integrated Product Team
References
Topic: Security Controls in Development
Security of Software Environments
Development Security
Secure Coding Configuration Management
Code Repositories
Best Practices
References
Topic: Assess Software Security Effectiveness
Auditing and Logging
ODBC / NoSQL
Risk Analysis / Mitigation
Development Methodology
Tracking Progress / Repeat
References
Topic: Security Impact of Acquired Software
Security Impact of Acquired Software
OWASP Key Considerations
References
Topic: Secure Coding Guidelines and Standards
Security Weaknesses / Vulnerabilities
Reconnaissance Attacks
Masquerading Attacks
API Security
Secure Coding Practices
Testing Options
References
Course Closure





CISSP Online Bootcamp from Your Computer

System Requirements

Accessing this course requires the following:


  • Computer with Internet connection
  • Web browser with Adobe Flash plug-in (provided)

Add Practice Exams and Save an Extra $10

The most advanced CISSP exam simulator available
Now only $59.00 $49.00



Laser focus your study efforts with over 1,000 professionally authored CISSP questions.


  • Access from any web browser- online testing interface mimics the real CISSP exam
  • Detailed explanations for every CISSP question
  • Reports track your CISSP knowledge and show where you need to study
  • Includes over nineteen condensed CISSP mock exams, knowledge area tests, and more