CISSP Certification Fast Track

Fast track you CISSP Certification course, everything you need to get you ready for the exam

What you'll learn

  • Prepare for the of the 2021 Certified Information Systems Security Processionals (CISSP) exam
  • Full understanding of the objectives that relate to Domain 1 (Security and Risk Management) of the CISSP exam
  • Full understanding of the objectives that relate to Domain 2 (Asset Security) of the CISSP exam
  • Full understanding of the objectives that relate to Domain 3 (Security Architecture and Engineering) of the CISSP exam
  • Full understanding of the objectives that relate to Domain 4 (Communication and Network Security) of the CISSP exam
  • Full understanding of the objectives that relate to Domain 5 (Identity and Access Management) of the CISSP exam
  • Full understanding of the objectives that relate to Domain 6 (Security Assessment and Testing) of the CISSP exam
  • Full understanding of the objectives that relate to Domain 7 (Security Operations) of the CISSP exam
  • Full understanding of the objectives that relate to Domain 8 (Software Development Security) of the CISSP exam
  • Security management perspectives from the view of a Chief Information Security Officer (CISO)
  • How to begin on the CISSP certification journey along with practical real-world experiences providing knowledge and context
  • Learn the benefits and rewards for gaining your CISSP certification, and what it will provide to your career

Requirements

  • Desire to pass the Information Systems Security Professional CISSP Certification Exam and not sure how to do it
  • Desire to gain more insight and knowledge around IT, Information, and Cyber Security from a management/senior leader perspective


In this CISSP video training course, I will provide you the knowledge, experience and practical skills you need to pass the CISSP certification. In addition, you will get my years of experience (Over 18 years) as I translate CISSP training requirements into real-world examples.

Included in this course:

CISSP Domain 1 Videos

  • 13 Sections - 31 Videos
  • 10 CISSP practice questions

CISSP Domain 2 Videos

  • 5 Sections - 9 Videos
  • 10 CISSP practice questions

CISSP Domain 3 Videos

  • 11 Sections - 16 Videos
  • 10 CISSP practice questions

CISSP Domain 4 Videos

  • 3 Sections - 7 Videos
  • 10 CISSP practice questions

CISSP Domain 5 Videos

  • Full CISSP Domain 5 Videos
  • 10 CISSP practice questions

CISSP Domain 6 Videos

  • Full CISSP Domain 6 Videos
  • 10 CISSP practice questions

CISSP Domain 7 Videos

  • Full CISSP Domain 7 Videos
  • 10 CISSP practice questions

CISSP Domain 8 Videos

  • Full CISSP Domain 8 Videos
  • 10 CISSP practice questions


The curriculum in this course covers the content that will be on the most current CISSP exam (April 2021). Each objective that is required for the CISSP exam will be covered in varying degrees of complexity and competency. The next upgrade to the CISSP curriculum/exam will occur in 2023.

In Domain 1 we will cover:

  • Introduction
  • Understand and apply concepts of confidentiality, integrity and availability
  • Evaluate and apply security governance principles
  • Determine compliance requirements
  • Understand legal and regulatory issues that pertain to information security in a global context
  • Understand, adhere to, and promote professional ethics
  • Develop, document, and implement security policy, standards, procedures, and guidelines
  • Identify, analyze, and prioritize Business Continuity (BC) requirement
  • Contribute to and enforce personnel security policies and procedures
  • Understand and apply risk management concepts
  • Understand and apply threat modeling concepts and methodologies
  • Apply risk-based management concepts to the supply chain
  • Establish and maintain a security awareness, education, and training program

In Domain 2 we will cover:

  • Identify and classify information and assets
  • Determine and maintain information and asset ownership
  • Protect privacy
  • Ensure appropriate asset retention
  • Determine data security controls
  • Establish information and asset handling requirements

In Domain 3 we will cover:

  • Implementation and management of engineering processes using secure design principles
  • Understanding of the fundamental concepts of security models
  • Selection of controls based upon systems security requirements
  • Security capabilities of information systems
  • Assessment and mitigation of vulnerabilities within a security architecture
  • Assessment and mitigation in web-based systems
  • Assessment and mitigation in mobile-based systems
  • Assessment and mitigation in embedded devices
  • Apply cryptographic methods
  • Application of security principles to sites and facility design
  • Implementation of site and facility security controls

In Domain 4 we will cover:

  • Implement secure design principles in network architectures
  • Secure network components
  • Implement secure communication channels according to design

In Domain 5 we will cover:

  • Control Physical and Logical Access to Assets
  • Manage Identification and Authentication of People, Devices, and Services
  • Integrate Identity as a Third-party Service
  • Implement and Manage Authorization Mechanisms
  • Manage the Identity and Access Provisioning Lifecycle

In Domain 6 we will cover:

  • Design and Validate Assessment, Test, and Audit Strategies
  • Conduct Security Control Testing
  • Collect Security Process Data (e.g., Technical and Administrative)
  • Analyze Test Output and Generate Report
  • Conduct or Facilitate Security Audits

In Domain 7 we will cover:

  • Understand and Support Investigations
  • Understand Requirements for Investigation Types
  • Conduct Logging and Monitoring Activities
  • Securely Provisioning Resources
  • Understand and Apply Foundational Security Ops Concepts
  • Apply Resource Protection Techniques
  • Conduct Incident Management
  • Operate and Maintain Detective and Preventative Measures
  • Implement and Support Patch and Vulnerability Management
  • Understand and Participate in Change Management Processes
  • Implement Recovery Strategies
  • Implement Disaster Recovery (DR) Processes
  • Test Disaster Recovery Plans (DRP)
  • Participate in Business Continuity (BC) Planning and Exercises
  • Implement and Manage Physical Security
  • Address Personnel Safety and Security Concerns

In Domain 8 we will cover:

  • Design and Validate Assessment, Test, and Audit Strategies
  • Conduct Security Control Testing
  • Collect Security Process Data (e.g., Technical and Administrative)
  • Analyze Test Output and Generate Report
  • Conduct or Facilitate Security Audits


Notes / Disclaimers:


  • In order for you to pass the CISSP test you need to have the substantial knowledge through experience and knowledge.
  • The test was originally written in English, but there are other language versions available
  • Answering the questions you need to consider the "perfect world" scenario and that work around options may be technically correct, but they may not meet (ISC)2 point of view
  • You need to be able to spot the keywords (DR, BCP, Policy, Standards, etc.) as well as the indicators (First, Best, Last, Least, Most)
  • Understand and answer every question from the Manager, CISO, or Risk Advisers Point of View (PoV). Answering the questions from a CIO or technical perspective will place your thinking too high or down in the weeds too far.
  • Understand that you are to answer the questions based on being proactive within your environment. Enable a Vulnerability Management Program before you have vulnerability issues.
  • The English version of the CISSP exam, utilizes the Computerized Adaptive Testing (CAT) format and is 3 hours long with 100-150 questions
  • Most people studying for CISSP certification will various media sources, test banks, and various books to enhance their test taking experience.
  • Don’t rely on one source to teach you all that you need to know for the CISSP….Invest in multiple training opportunities. The future payoff is worth the time and energy.


Who this course is for:

  • Individuals who are preparing for the ISC2 CISSP Certification Exam
  • Individuals wanting lean and gain knowledge on the CISSP certification
  • People wanting to grow their IT Security and Cyber Security knowledge
  • New and experienced IT Security professionals
  • Anyone wanting to break into IT Security
  • Students wanting to learn and grow their understanding on the CISSP Domain curriculum


Your Instructor


Shon Gerber
Shon Gerber

Shon Gerber, Chief Information Security Officer (CISO), CISSP Trainer and Cybersecurity Expert

Shon Gerber, owner of "Reduce Cyber Risk” – Providing Cybersecurity Insight and Direction for Businesses of all Sizes.

Background:

Chief Information Security Officer

I am currently working as the CISO for a privately held global manufacturing company that deals with a wide range of security challenges from manufacturing to strong online web presence.

Security Operations Center – Supervisor

I have worked as a supervisor within a Security Operations Center of one of the largest privately held companies in the world. Each day my team worked to protect our company from hackers attempting to gain access to our various computer systems on a global basis.

Senior Security Architect

I worked for an IT service provider as a Senior Security Architect serving a diverse customer base with business customers from medium to large companies. Each of these companies had varying levels of cyber security requests and regulatory requirements. During that period I provided numerous levels of security consulting practices ranging from web applications to recommendations around secure coding practices.

U.S. Air Force Red Team Commander

I worked for 11 years as a member of the US Air Force Red Team (Aggressors) targeting government and military installations from both a cyber and physical security perspective. We focused our efforts on network and physical penetration testing providing gap and remediation training to US military installations.

Certifications

Certified Information Systems Security Professional (CISSP)

GIAC Legal Issues in Information Technology & Security (GLEG)

Microsoft Certified Systems Engineer (MCSE/MCSE Security)

CompTIA Networks +

CompTIA Security +

Certified HIPAA Security Specialist (CHSS)

Certified HIPAA Professional (CHP)

Adoptive Father of a very large family

Truly blessed to be the father of 7 children who have graced our family from the US, China and Uganda. My overall goal is to provide training products and materials designed for businesses to best protect their digital assets and the livelihood of the owner and employees.


Join Today & Get Access To This Course & Every Resource You Need Grow Your Cyber Skills & Advance Your Career. Beginner & Expert Training.

Course Curriculum


  Training Overview
Available in days
days after you enroll
  Domain 1. 1 Understand, adhere to and promote professional ethics
Available in days
days after you enroll
  Domain 1.4 Determine compliance and other requirements
Available in days
days after you enroll
  Domain 1.8 Identify, analyze and prioritize business continuity (BC) req
Available in days
days after you enroll
  Domain 1.11 Understand and apply threat modeling concepts and methodologies
Available in days
days after you enroll
  Domain 1.12 Apply supply chain risk management (SCRM) concepts
Available in days
days after you enroll
  Domain 1.13 Establish and maintain a security awareness, education, etc
Available in days
days after you enroll
  Domain 2.2 Establish information and asset handling requirements
Available in days
days after you enroll
  Domain 2.3 Provision Resources Securely
Available in days
days after you enroll
  Domain 2.5 Ensure Appropriate Asset Retention
Available in days
days after you enroll
  Domain 3.1 Manage Engineering Processes Using Secure Design
Available in days
days after you enroll
  Domain 3.2 Fundamental Concepts of Security Models
Available in days
days after you enroll
  Domain 3.3 Controls Based on System Security Requirements
Available in days
days after you enroll
  Domain 3.4 Understand Security Capabilities of Information Systems
Available in days
days after you enroll
  Domain 3.6 Select and Determine Cryptographic Solutions
Available in days
days after you enroll
  Domain 3.8 Apply Security Principles to Site and Facility Design
Available in days
days after you enroll
  Domain 4.1 Implement Secure Design Principles in Network Architectures
Available in days
days after you enroll
  Domain 5.1 Control Physical and Logical Access to Assets
Available in days
days after you enroll
  Domain 5.3 Federated Identity With a Third-Party Service
Available in days
days after you enroll
  Domain 5.5 Manage the Identity and Access Provisioning Life-cycle
Available in days
days after you enroll
  Domain 5.6 Implement Authentication Systems
Available in days
days after you enroll
  Domain 6.1 Design and Validate Assessment, Test, and Audit Strategies
Available in days
days after you enroll
  Domain 6.3 Collect Security Process Data (e.g. Technical and Administrative)
Available in days
days after you enroll
  Domain 6.5 Conduct or Facilitate Security Audits
Available in days
days after you enroll
  Domain 7.3 Perform Configuration Management (CM)
Available in days
days after you enroll
  Domain 7.8 Implement and Support Patch and Vulnerability Management
Available in days
days after you enroll
  Domain 7.9 Understand and Participate in Change Management Process
Available in days
days after you enroll
  Domain 7.12 Test Disaster Recovery Plans (DRP)
Available in days
days after you enroll
  Domain 7.13 Participate in Business Continuity (BC) Planning and Exercises
Available in days
days after you enroll
  Domain 7.14 Implement and Manage Physical Security
Available in days
days after you enroll
  Domain 7.15 Address Personnel Safety and Security Concerns
Available in days
days after you enroll
  Domain 8.3 Assess the Effectiveness of Software Security
Available in days
days after you enroll
  Audio Version of the Training
Available in days
days after you enroll

Frequently Asked Questions


When does the course start and finish?
The course starts now and never ends! It is a completely self-paced online course - you decide when you start and when you finish.
How long do I have access to the course?
How does lifetime access sound? After enrolling, you have unlimited access to this course for as long as you like - across any and all devices you own.
What if I am unhappy with the course?
We would never want you to be unhappy! If you are unsatisfied with your purchase, contact us in the first 30 days and we will give you a full refund.

Become A Member And Unlock Unlimited Access To This Course Plus Over 1,000+ Top Cyber Security Classes, Virtual Labs, Practice Tests, And Exam Simulations.

Designed To Help You Expand Your Skill Set And Propel Your Career Forward. Whether You're Just Starting Out Or You're An Industry Expert, There's Something Here For Everyone. Let's Grow Together!