Home / Courses / IT Security / CISSP Exam Certification Boot Camp

Popular Courses

CISSP Exam Certification Boot Camp

The CISSP® CBK® is often referred to as a mile wide and an inch deep. It is a very difficult exam that requires you to learn about ten different domains of expertise. Our courseware is extensive and challenging but is designed to give you the maximum help to prepare for the exam. Attendees should plan for long days. If you wish to pass the exam on the first try, we recommend doing some quiz questions at home each evening after class and whenever you have some free time such as lunch, breaks, etc...

In order to achieve success, please dedicate the full week to your CISSP® studies and avoid any disruption, your hard work will reap benefits later on. The class delivery is aligned 1 week before ISC2® exam scheduled in Canada. This will allow you to further study the domains that you have not been exposed to in the past and master them before writing the exam. It is not an easy exam and only a mix of study, experience, and quality training will allow you to pass the first time. After seeing what is included in the whole CBK®, you will be glad you kept some days available to review between the end of class and your exam.

• Detailed student workbooks that include:
o 10 modules covering the 10 CBK® domains with tips and tricks on how to remember information.
o Graphics and pictures that enhance the understanding of complex concepts.
o Large student manual with explanation and detailed notes under most of the slides.
o Summaries and review questions at the end of each domain.

• Emails which include resources and tools prior to taking course
• A final practice exam of 280 questions delivered on the final day (day 6) of class
• Practice exams at the end of each of the domains
• Two CISSP® Exam Cram review booklet covering the 10 domains of the CBK®
• Access to the CCCure online quiz engine with more than 2000 practice questions
• Mentoring by Clement Dupuis before, during, and after class.

We will assist you until you have succeeded with and passed your exam, this is our mission.

This course is ideal for anyone who has a desire to learn more about computer security and who wishes to have a holistic view of security. It is a must for anyone in a supervisory role or any system and network admin who must protect the critical assets of your company.

• Managers
• Network Admin
• System administrators
• Network architects
• Firewall engineers
• Security testers
• Anyone who is involved in protecting your company assets
Every student will receive a certificate of completion on the last day of class. The class entitles you to a grand total of 48 CPE`s

A 92% passing rate is no easy feat, lots of people ask us why our passing rates are so high? Students trained by Clement Dupuis have been highly successful in passing the CISSP® exam.
There are many reasons for this:
1. The way we organize our class to make sure you pass the CISSP® exam
2. Material is developed to cover exactly what you need to know and NOTHING ELSE.
3. The associated resources in our material
4. The Quality of our instructors. Let me repeat this: The quality of our Instructors

There are three things required to pass the CISSP® exam.
1. Intimate Knowledge of the CBK®
2. Thinking the way ISC2® want you to think
3. Knowing the secrets of taking the exam

The intimate knowledge of the CBK® counts for about 85 % of what is needed in order to get certified. If you are only studying the books and manuals, you are not going to reach success, without guidance you will study what is not important and fail the exam, there is just too much to study, most people who do self study end up into a never ending study program due to the fact the exam is 20 miles wide.

The exam is difficult and our quiz engine not only gives you the correct answer to the questions but also goes deep into the problem and explains to you why the answer which we tell you is the MOST correct answer. We will help you focus on the Key Points required to pass and keep you focused on WHAT YOU NEED TO KNOW.

• A very thorough and challenging question bank:
• We provide a question bank of 2000+ exam questions with detailed answers.
The detailed answer goes deep into the problem and explains why this is a correct answer.
• Access to www.cccure.org internal exam question bank.
• Internal discussion group

• Introduction
• Security Management Practices
• Management Responsibilities
• Security Policies and their supporting counterparts
• Information Classification
• Roles and Responsibilities
• Risk Management
• Security Awareness
• Access Control
• Identification, authentication, authorization methods
• Authentication methods, models and technologies
• Discretionary, mandatory and non-discretionary access control
• Accountability, monitoring and auditing practices
• Possible threats to access control practices and technologies

• Security Architecture
• Computer architecture
• Components within an operating system
• OSI Model
• Trusted computing base and security mechanisms
• Different security models used in software development
• Security criteria and ratings
• Certification and accreditation processes
• Continuity of Operations
• Business Continuity Planning
• Disaster Recovery Planning
• Possible Threats
• Business Impact Analysis
• Roles and Responsibilities
• Backups and Off-site Facilities

• Cryptography
• History of cryptography
• Cryptography components and their relationships
• Government involvement in cryptography
• Symmetric and asymmetric key cryptosystems
• Public key infrastructure (PKI) concepts and mechanisms
• Hashing algorithms and uses
• Types of attacks on cryptosystems
• Physical Security
• Administrative, technical and physical controls pertaining to physical security
• Facility location, construction and management
• Physical security risks, threats and countermeasures
• Electrical issues and countermeasures
• Fire prevention, detection and suppression
• Authenticating individuals and intrusion detection


• Telecom, Network & Internet Security
• TCP/IP Suite
• Cabling and data transmission types
• LAN and WAN technologies
• Network devices and service
• Telecommunication protocols and devices
• Remote access methods and technologies
• Law, Investigations, Ethics
• Ethics for security professionals
• Best practices for security professionals
• Computer crimes and computer laws
• Motivations and profiles of attackers
• Computer crime investigation process and evidence collection
• Incident handling procedures
• Different types of evidence
• Computer crime legislation

• Applications Security
• Different types of software controls and implementation
• Database concepts and security issues
• Data warehousing and data mining
• Software life cycle development processes
• Change control concepts
• Object-oriented programming components
• Expert systems and artificial intelligence
• Operations Security
• Operations responsibilities
• Configuration management
• Media access protection
• System recovery
• Facsimile security
• Intrusion detection systems
• Attack types

Review and Final preparation exam (over 280 questions)
This exam validates retention by students and identifies your weak areas.

Course Registration


6 days


Course Outline