CISSP® Boot Camp
Shon Harris, Logical Security
|// july 24 - 27|
USA 2010 4-day Training Session //July 24-27
This Logical Security course trains students in all areas of the security Common Body of Knowledge (CBK). They will learn about security policy development, secure software development procedures, network vulnerabilities, attack types and corresponding countermeasures, cryptography concepts and their uses, disaster recovery plans and procedures, risk analysis, crucial laws and regulations, forensics basics, computer crime investigation procedures, physical security, and much, much more. They will explore the contents and concepts that make up the diverse domains and learn how they work together to provide true “in-depth” defense.
The CISSP exam is rigorous, covering ten security domains essential for the protection of information systems, corporations and national infrastructures. Understanding that security is an enterprise wide problem, these domains provide the candidate with a broad understanding of the technical, managerial and human factors that must coordinate effectively to keep information and systems secure. These domains include:
- Access Control
- Application Security
- Business Continuity Planning and Disaster Recovery Planning
- Legal, Regulations Compliance, and Investigations
- Operations Security
- Physical (Environmental) Security
- Security Architecture and Design
- Information Security and Risk Management
- Telecommunications and Network Security
Using this course, students prepare for the exam, while at the same time obtaining essential security knowledge that can be immediately used to improve organizational security. This knowledge enhances services and products, secures business functions and infrastructures, provides better implementation processes, and can be used to restructure critical programs and procedures to help keep companies up-to-date on today’s business and security strategies, technologies, and best practices.
4-day Course Schedule
This course has been designed to provide all the materials needed for 4 full days of instructor led classroom training.
- Day 1: Information Security and Risk Management; Access Control
- Day 2: Cryptography; Physical (Environmental) Security
- Day 3: Security Architecture and Design; Legal, Regulation Compliance, Investigations, and Telecommunications and Network Security
- Day 4: Business Continuity and Disaster Recovery; Application Security; Operations Security
- Note: Logical Security will host an online webinar class to enrolled students, on August 18, 2010, if all materials does not get covered in the class at Black Hat. If this session occurs, Domains 9 and 10, will be covered at that time.
A curriculum workbook of 2,000 pages includes:
- 10 modules covering each of the 10 CBK domains
- Professionally developed graphics and 3-D animations that enhance the understanding of complex concepts
- Extensive notes accompanying each slide, including Configuration Steps, Hints, Warnings, Tips, Tables, etc.
- Quick Tip section, Summary section, Terminology section, and 20 question and answer section for each module
- Shon Harris’ CISSP® Video Seminar, over 32 hours of classroom instruction
- CISSP Boot Camp Brochure (.pdf)
Shon Harris, CISSP, MCSE, is the president of Logical Security, a security consultant, a former engineer in the Air Force’s Information Warfare unit, an instructor and an author. She has authored two best selling CISSP books, was a contributing author to the book, Hacker’s Challenge, and a contributing author to the book Gray Hat Hacking. Shon has taught computer and information security to a wide range of clients, some of which have included RSA, Department of Defense, Department of Energy, National Security Agency (NSA), Bank of America, Defense Information Systems Agency (DISA), BMC, and many more.
Shon consults for several Fortune 500 companies in the U.S. Her competencies range from setting up risk management programs and developing enterprise security architectures to constructing enterprise-wide security programs that connects security and business needs in a synergist manner.
Additionally, Shon writes security articles for Information Security Magazine and Windows 2000 Magazine and other leading industry journals. She recently published the fifth edition of her first book and brought to market an innovative consulting and training model in 2008.
Shon was recognized as one of the top 25 women in the Information Security field by Information Security Magazine.
Michael Lester, CISSP, MCSE:Messaging & Security, MCSE+I, MCSA, MCT, CCNP, CCDP, CCSE+, CCI, CCEA, CTT+, Linux+, Security+, Network+, I-net+, A+ Michael J. Lester holds a Master’s Degree in Information Systems Security from Boston University (a National Security Agency [NSA] “Center of Excellence”) as well as around 20 industry certifications including CISSP, CISA, CCE #876, Security+, MCSE:Security, CCSE+, and ITIL. He was an author for “Gray Hat Hacking: The Ethical Hacker’s Handbook 1st Edition”, McGraw Hill Publishing (ISBN # 0072257091), a book on advanced penetration testing techniques, and many other articles and presentations. He has written courseware and lectured on Microsoft security, penetration testing, Linux/UNIX security, and infrastructure security. He is the chief instructor for Shon Harris’s Logical Security LLC. (author “CISSP All in One Guide”, McGraw Hill Publishing), and he teaches and develops courses on CISSP, hacking/pen-testing, digital forensics/eDiscovery, CISA, and others. Microsoft employed Michael as a Subject Matter Expert (SME) to create and tech edit the exams for Windows Server 2008 (Longhorn) Microsoft Certified IT Professional (MCITP) certifications. In his consulting work he has worked for household name organizations including, Bridgestone/Firestone, Warner Bros., Department of Defense, Northrop Grumman, Novo Nordisk, and the U.S. House of Representatives. For these clients he has stood up entire security programs, regulatory compliance programs (OCC, SOX, HIPAA, GLBA), Payment Card Industry Data Security Standards (PCI DSS) compliance programs, and performed similar audits. He has performed vulnerability assessments and penetration tests, and is sought after for his document writing work (policies, standards, procedures, and guidelines). He also has experience implementing the ITIL, CoBIT, and ISO 17799 frameworks. He is currently authoring a book on Digital Forensics, teaching, and consulting.
Ends Apr 1
Ends May 15