(ISC)2 CISSP Certification

-  6 jours seuleument
CISSP certification logo

Get CISSP certified in just six days on this accelerated course. The CISSP (certified information systems security professional) is globally recognised as the gold standard IT security certification – learn the skills you need to achieve it at twice the speed with Firebrand.

Sit the official (ISC)2 exam during this course and walk away with your CISSP certification in under one week.

Developed by (ISC)2, the world’s leading cyber security membership association, the CISSP is key for professionals aiming for senior roles in information security. With Firebrand, you’ll build the expert knowledge needed to implement and manage an enterprise security programme.

Lire la suite...

On this accelerated course, you’ll study the eight domains of the CISSP Common Body of Knowledge (CBK):

  1. Security and Risk Management
  2. Asset Security
  3. Security Architecture and Engineering
  4. Communication and Network Security
  5. Identity and Access Management (IAM)
  6. Security Assessment and Testing
  7. Security Operations
  8. Software Development Security

Strengthen your skills as a security professional – this training is ideal for security consultants, analysts, managers, auditors and architects. The CISSP certification is also highly desirable for ambitious professionals aiming to achieve Chief Information Security Officer (CISO) roles.


Train at twice the speed on this official CISSP course

Firebrand Training is an Authorised Provider of (ISC)2 training. On this accelerated course, you’ll get access to resources only available to authorised providers:

Official (ISC)2 Training Provider
  • Official CISSP certification exam included on your course
  • Expert training from authorised (ISC)2 instructors
  • Official courseware
  • Official CISSP Practice Exam and Evaluation

Benefits...

Sept raisons de faire votre formation avec Firebrand Training

  1. Vous obtiendrez votre certificat en seulement 6 jours. Avec nous, vous serez entrainé en un temps record.
  2. Notre formation est “tout inclus”. Ceci comprend tout le matériel de cours, les examens, le logement et les repas. Aucun frais supplémentaire ne vous seras demandé.
  3. Passez le une première fois ou entrainez-vous de nouveau gratuitement. C’est notre garantie. Nous sommes sûrs que vous réussirez la formation la première fois. Mais si ce n’est pas le cas, revenez durant l’année et payez uniquement pour le logement et les examens. Le reste est gratuit.
  4. Vous apprendrez plus du . Une journée de stage traditionnel commence à 9h et finit à 17h avec une longue pause déjeuner. Avec Firebrand Training vous aurez une formation de qualité avec nos instructeurs 12 heures par jour.
  5. Vous apprendrez le plus vite. C'est probable, vous aurez un style d'étude différent des autres. Nous combinons des styles visuels, auditifs et tactiles pour vous faire apprendre d’une manière qui nous assure que vous apprendrez plus rapidement et plus facilement.
  6. Vous apprendrez le avec les meilleurs. Firebrand Training est certifié avec le label Qfor, qui signifie la qualité et le professionnalisme de nos formations. Et bien d’autres titres encore, nous avons entrainé et certifié 72,589 professionnels, et sommes partenaires avec de grands noms sur le marché.
  7. Vous ferez plus qu’étudier pendant la formation . Nous utilisons des exercices de pratique pour être sûr que vous pouvez mettre en action vos connaissances dans un environnement professionnel. Nos instructeurs utilisent des simulations de la vie réelle pour garder la formation intéressante et engagée.

(ISC)2 Membership Benefits

(ISC)2 is an international, non-profit membership association built for security professionals. When you certify, you’ll become a member of (ISC)². As a member, you’ll join a global network of 125,000+ and get access to an array of exclusive resources, tools and peer-to-peer networking opportunities, conference and event discounts.

Become a member by earning one of (ISC)2’s gold standard certifications. Contact us to find out more.

Benefits of Firebrand’s official six-day CISSP training

  • (ISC)2 instructors present the Common Body of Knowledge Seminar
  • Study with (ISC)2 copyrighted training material, which is unavailable to non-partner organisations
  • Prepare for your CISSP exam with the official (ISC)2 practice exam
  • Receive a personal critique of your practice exam results to help you focus on topics where additional focus should be given
  • Study faster with accelerated training in a distraction-free environment
  • Sit your CISSP exam during your course at the Firebrand Training Centre

Benefits of CISSP certification for your company

  • Establish information security best practices within your organisation
  • Organisations employing CISSP-certified professionals have their data and systems safeguarded by the best in the business
  • Provides a business and technology orientation to risk management

Curriculum...

Domain 1: Security and Risk Management

1.1 Understand and apply concepts of confidentiality, integrity and availability

1.2 Evaluate and apply security governance principles

  • Alignment of security function to business
  • Security control frameworks strategy, goals, mission, and objectives
  • Due care/due diligence
  • Organisational processes (e.g., acquisitions, divestitures, governance committees)
  • Organisational roles and responsibilities

1.3 Determine compliance requirements

  • Contractual, legal, industry standards, and regulatory requirements
  • Privacy requirements

1.4 Understand legal and regulatory issues that pertain to information security in a global context

  • Cyber crimes and data breaches
  • Trans-border data flow
  • Licensing and intellectual property requirements
  • Privacy
  • Import/export controls

1.5 Understand, adhere to and promote professional ethics

  • (ISC)² Code of Professional Ethics
  • Organisational code of ethics

1.6 Develop, document, and implement security policy, standards, procedures, and guidelines

1.7 Identify, analyse and prioritise Business Continuity (BC) requirements

  • Develop and document scope and plan
  • Business Impact Analysis (BIA)

1.8 Contribute to and enforce personnel security policies and procedures

  • Candidate screening and hiring
  • Compliance policy requirements
  • Employment agreements and policies
  • Privacy policy requirements
  • Onboarding and termination processes
  • Vendor, consultant, and contractor agreements and controls

1.9 Understand and apply risk management concepts

  • Identify threats and vulnerabilities
  • Security Control Assessment (SCA)
  • Risk assessment/analysis
  • Monitoring and measurement
  • Risk response
  • Asset valuation
  • Countermeasure selection and implementation
  • Reporting
  • Applicable types of controls (e.g., preventive, Continuous improvement detective, corrective)
  • Risk frameworks

1.10 Understand and apply threat modelling concepts and methodologies

  • Threat modelling methodologies
  • Threat modelling concepts

1.11 Apply risk-based management concepts to the supply chain 

  • Risks associated with hardware, software, and SERVICES            
  • Service-level requirements services
  • Third-party assessment and monitoring
  • Minimum security requirements

1.12 Establish and maintain a security awareness, education, and training program

  • Methods and techniques to present awareness and training
  • Periodic content reviews
  • Program effectiveness evaluation

Domain 2: Asset Security

2.1 Identify and classify information and assets

  • Data classification
  • Asset Classification

2.2 Determine and maintain information and asset ownership

2.3 Protect privacy

  • Data owners
  • Data remanence
  • Data processors
  • Collection limitation

2.4 Ensure appropriate asset retention

2.5 Determine data security controls

  • Understand data states
  • Standards selection
  • Scoping and tailoring
  • Data protection methods

2.6 Establish information and asset handling requirements

Domain 3: Security Architecture and Engineering

3.1 Implement and manage engineering processes using secure design principles

3.2 Understand the fundamental concepts of security models

3.3 Select controls based upon systems security requirements

3.4 Understand security capabilities of information systems (e.g., memory protection, Trusted Platform Module (TPM), encryption/decryption)

3.5 Assess and mitigate the vulnerabilities of security architectures, designs, and solution

  • Client-based systems
  • Server-based systems
  • Database systems
  • Cryptographic systems
  • Industrial Control Systems (ICS)
  • Cloud-based systems
  • Distributed systems
  • Internet of Things (IoT)

3.6 Assess and mitigate vulnerabilities in web-based systems

3.7 Assess and mitigate vulnerabilities in mobile systems

3.8 Assess and mitigate vulnerabilities in embedded devices

3.9 Apply cryptography

  • Cryptographic life cycle (e.g., key management, algorithm selection)
  • Cryptographic methods (e.g., symmetric, asymmetric, elliptic curves)
  • Public Key Infrastructure (PKI)
  • Digital signatures
  • Non-repudiation
  • Integrity (e.g., hashing)
  • Understand methods of cryptanalytic attacks
  • Digital Rights Management (DRM)
  • Key management practices

3.10 Apply security principles to site and facility design

3.11 Implement site and facility security controls

  • Wiring closets/intermediate distribution facilities
  • Server rooms/data centres
  • Media storage facilities
  • Evidence storage
  • Restricted and work area security
  • Utilities and Heating, Ventilation, and Air Conditioning (HVAC) » Environmental issues
  • Fire prevention, detection, and suppression

Domain 4: Communication and Network Security

4.1 Implement secure design principles in network architectures

  • Open System Interconnection (OSI) and Transmission Control Protocol/Internet Protocol (TCP/IP) models
  • Internet Protocol (IP) networking
  • Implications of multilayer protocols
  • Software-defined networks
  • Wireless networks
  • Converged protocols

4.2 Secure network components             

  • Operation of hardware
  • Transmission media
  • Network Access Control (NAC) devices
  • Endpoint security
  • Content-distribution networks

4.3 Implement secure communication channels according to design

  • Voice
  • Multimedia collaboration
  • Remote access
  • Data communications
  • Virtualised networks

Domain 5: Identity and Access Management (IAM)

5.1 Control physical and logical access to assets

  • Information
  • Systems
  • Devices
  • Facilities

5.2 Manage identification and authentication of people, devices, and services

  • Identity management implementation
  • Registration and proofing of identity
  • Single/multi-factor authentication
  • Federated Identity Management (FIM)
  • Accountability
  • Credential management systems
  • Session management

5.3 Integrate identity as a third-party service

  • On-premise
  • Cloud
  • Federated

5.4 Implement and manage authorisation mechanisms

  • Role Based Access Control (RBAC)
  • Discretionary Access Control (DAC)
  • Rule-based access control
  • Attribute Based Access Control (ABAC)
  • Mandatory Access Control (MAC)

5.5 Manage the identity and access provisioning lifecycle

  • User access review
  • System account access review
  • Provisioning and deprovisioning

Domain 6: Security Assessment and Testing 

6.1 Design and validate assessment, test, and audit strategies

  • Internal
  • External
  • Third-party

6.2 Conduct security control testing

  • Vulnerability assessment
  • Code review and testing
  • Penetration testing
  • Misuse case testing
  • Log reviews
  • Test coverage analysis
  • Synthetic transactions
  • Interface testing

6.3 Collect security process data (e.g., technical and administrative)

  • Account management
  • Training and awareness
  • Management review and approval
  • Disaster Recovery (DR) and Business Continuity
  • Key performance and risk indicators (BC)
  • Backup verification data

6.4 Analyse test output and generate report

6.5 Conduct or facilitate security audits

  • Internal
  • External
  • Third-party

Domain 7: Security Operations

7.1 Understand and support investigations

  • Evidence collection and handling
  • Investigative techniques
  • Reporting and documentation
  • Digital forensics tools, tactics, and procedures

7.2 Understand requirements for investigation types

  • Administrative
  • Regulatory
  • Criminal
  • Industry standards
  • Civil

7.3 Conduct logging and monitoring activities

  • Intrusion detection and prevention
  • Continuous monitoring
  • Security Information and Event Management
  • Egress monitoring (SIEM)

7.4 Securely provisioning resources

  • Asset inventory
  • Asset management
  • Configuration management

7.5 Understand and apply foundational security operations concepts

  • Need-to-know/least privileges
  • Job rotation
  • Separation of duties and responsibilities
  • Information lifecycle
  • Privileged account management
  • Service Level Agreements (SLA)

7.6 Apply resource protection techniques

  • Media management
  • Hardware and software asset management

7.7 Conduct incident management

  • Detection
  • Recovery
  • Response
  • Remediation
  • Mitigation
  • Lessons learned
  • Reporting

7.8 Operate and maintain detective and preventative measures

  • Firewalls
  • Sandboxing
  • Intrusion detection and prevention systems
  • Honeypots/honeynets
  • Whitelisting/blacklisting
  • Anti-malware
  • Third-party provided security services

7.9 Implement and support patch and vulnerability management

7.10 Understand and participate in change management processes

7.11 Implement recovery strategies

  • Backup storage strategies
  • System resilience, high availability, Quality of
  • Recovery site strategies Service (QoS), and fault tolerance
  • Multiple processing sites

7.12 Implement Disaster Recovery (DR) processes

  • Response
  • Personnel
  • Communications

7.13 Test Disaster Recovery Plans (DRP)               

  • Assessment
  • Restoration
  • Training and awareness
  • Read-through/tabletop
  • Walkthrough
  • Simulation
  • Parallel
  • Full interruption

7.14 Participate in Business Continuity (BC) planning and exercises

7.15 Implement and manage physical security

  • Perimeter security controls
  • Internal security controls

7.16 Address personnel safety and security concerns

  • Travel
  • Emergency management
  • Security training and awareness
  • Duress

Domain 8: Software Development Security

8.1 Understand and integrate security in the Software Development Life Cycle (SDLC)

  • Development methodologies
  • Change management
  • Maturity models
  • Integrated product team
  • Operation and maintenance

8.2 Identify and apply security controls in development environments

  • Security of the software environments
  • Configuration management as an aspect of secure coding
  • Security of code repositories

8.3 Assess the effectiveness of software security

  • Auditing and logging of changes
  • Risk analysis and mitigation

8.4 Assess security impact of acquired software

8.5 Define and apply secure coding guidelines and standards

  • Security weaknesses and vulnerabilities at the source-code level
  • Security of application programming interfaces
  • Secure coding practices

FAQs...

What is a CISSP Boot Camp?

Firebrand’s CISSP Boot Camp is an accelerated course that will prepare you to take the challenging CISSP exam. Accelerated training is fast, but this is not a crash course – you’ll learn from a real-world security expert and study everything you need to know to pass the exam.

You’ll study the eight CISSP CBK (Common Body of Knowledge) domains using the most up-to-date curriculum and revision materials.

Firebrand’s CISSP bootcamp is ideal for experienced security professionals, including managers, auditors and consultants – or anyone aiming to achieve CISO roles.


Does Firebrand offer CISSP online training?

Firebrand does not provide online training for the CISSP certification. Instead, Firebrand’s CISSP course provides students with an opportunity to learn in-person from expert security instructors.


How much does CISSP training cost?

To find out the cost of this accelerated CISSP course and others, visit our prices page.


What is the CISSP CBK?

The CISSP Common Body of Knowledge (CBK) is an established information security framework covering security terminology, principles and a library of cyber security topics. It is sometimes referred to as the CISSP syllabus.

Created by (ISC)2, the CBK is used to assess a student’s level of security knowledge when preparing for and sitting the CISSP exam.

CISSPs are subject matter experts (SMEs) who work within two or more of these eight domains and possess advanced knowledge, skills, and experience gained through certification. 


What are the CISSP domains?

The CISSP exam covers 8 domains in 2018 which are:

  • Security and Risk Management
  • Asset Security
  • Security Engineering
  • Communications & Network Security
  • Identity & Access Management
  • Security Assessment & Testing
  • Security Operations
  • Software Development Security

What are the CISSP prerequisites?

To achieve this certification, you must have at least five years of cumulative, paid and full-time work experience in two or more of the eight CISSP CBK domains.

However, if you don’t meet these requirements, you can get a one-year experience waiver with:

  • A four-year college degree (or regional equivalent)
  • An approved credential from (ISC)2’s experience waiver list

You may also opt to take and sit the CISSP exam without the required experience. If you do pass the exam without the prerequisite experience, you will become an Associate of (ISC)2. You’ll then have six years to earn the work experience required, at which point you will receive your CISSP certification.


What does the CISSP exam cost in the UK?

The CISSP exam costs £560 in the UK.


How many hours is the CISSP exam?

The CISSP CAT exam duration is three hours. Exceptions can be provided to candidates with medical accommodations that are pre-approved by (ISC)2.

There is no minimum exam duration and students may proceed through the exam at their own pace.


What is the salary for a CISSP professional?

The average annual salary for professionals holding the CISSP certification is £60,000 – according to data from ITJobsWatch.

Exam Track...

On this accelerated course, you'll prepare for and sit your CISSP exam at the Firebrand Training Centre, covered by your Certification Guarantee:

  • (ISC)² CISSP exam
    • Exam length: up to three hours
    • Number of questions: 100-150
    • Format: Multiple choice and advanced innovative questions
    • Passing grade: 700 out of 1000 points
    • Content:
      • Security and Risk Management - 15%
      • Asset Security - 10%
      • Security Architecture and Engineering - 13%
      • Communication and Network Security - 14%
      • Identity and Access Management (IAM) - 13%
      • Security Assessment and Testing - 12%
      • Security Operations - 13%
      • Software Development Security - 10%
    • Language: English
    • Note: the following alternative exam languages are available in the CISSP 6 hour exam format of 250 questions - French, German, Brazilian, Portuguese, Spanish, Japanese, Simplified Chinese, Korean.

Firebrand’s Training Centres are (ISC)²-authorized Pearson VUE Select Test Centers (PVTC Selects). This means our centres meet the high security requirements for the CISSP credential, and are equipped with enhanced biometric and surveillance technology.

After passing your exam

Once you have successfully passed your certification exam, you'll receive your certificate and ID card. Upon receiving notification of your exam success, you will be required to subscribe to the (ISC)2 Code of Ethics and have your application endorsed before the credential can be awarded.

An endorsement form for this purpose must be completed and signed by an (ISC)2 certified professional who is an active member, and who can attest to your professional experience. You are required to become certified within nine months of the date of your exam.

If you do not become certified or an Associate of (ISC)2 within 9 months of the date of your exam, you will be required to retake the exam in order to become certified. It is possible for (ISC)2 to endorse you if you cannot find a certified individual to act as one.

Maintenance Requirements

The CISSP certification has annual and three-year CPE requirements. To maintain your certification you must:

  • Earn and submit a minimum of 40 Continuing Professional Education (CPE) credits each year of the three year certification cycle
  • Gain a minimum of 120 CPE credits every three years
  • Pay the annual maintenance fee (AMF) of USD$85 each year of your three-year certification cycle
  • Fully support and abide by the (ISC)2 Code of Ethics

Please note: Passing candidates may be randomly selected and audited by (ISC)2 Member Services prior to issuance of a certification. Attaining multiple certifications may result in a candidate being audited more than once. Firebrand Training will provide support for candidates that are audited.

What's Included...

On your accelerated CISSP course, you'll get access to resources only available to authorised (ISC)2 training providers:

  • Authorised (ISC)2 instructors vetted by (ISC)2 and trained to deliver (ISC)2 certification courses
  • Official and up-to-date courseware, including "The Official (ISC)2 CISSP CBK Review Seminar - Student Handbook"
  • Official Practice Exam

Firebrand will also provide you with:

  • Personal exam-readiness evaluation
  • Supplementary material designed to further strengthen your knowledge in preparation for the exam

For this 6 day duration CISSP course, (ISC)2 recognise a maximum of 40 CPEs for an existing (ISC)2 certification holder.

Prerequisites...

To achieve this certification, you must have:

  • At least five years cumulative, paid, full-time work experience in two or more of the eight (ISC)2 CISSP Body of Knowledge (CBK) domains

If you don’t meet the work experience requirement you can get a one year experience waiver with:

  • A four-year college degree (or regional equivalent)
  • An approved credential from (ISC)2’s experience waiver list

Alternatively, you may opt to take and sit the CISSP exam without the required experience. Pass the exam and you will become an Associate of (ISC)2 – you’ll then have six years to earn the work experience required. Upon gaining the experience you will receive your full CISSP certification.

Unsure whether you meet the prerequisites?

Don’t worry - we’ll discuss your technical background, experience and qualifications to determine whether this accelerated course suits you.

Just call us on +32 (0)2 234 77 05 and speak to one of our enrolment consultants.

Firebrand is an immersive environment and requires commitment. Some prerequisites are simply guidelines; you may find your unique experience, attitude and determination enables you to succeed on your accelerated course.

Quand...

(ISC)2 Dates des cours

(ISC)2 - CISSP Boot Camp

Début

Fin

Etat

Réservez maintenant

23/9/2019 (Lundi)

28/9/2019 (Samedi)

Terminé

 

4/11/2019 (Lundi)

9/11/2019 (Samedi)

Terminé

 

2/12/2019 (Lundi)

7/12/2019 (Samedi)

Disponibilité limitée

Réservez maintenant

20/1/2020 (Lundi)

25/1/2020 (Samedi)

Ouvert

Réservez maintenant

9/3/2020 (Lundi)

14/3/2020 (Samedi)

Ouvert

Réservez maintenant

11/5/2020 (Lundi)

16/5/2020 (Samedi)

Ouvert

Réservez maintenant

Nous avons formé plus de 35 000 étudiants pendant douze ans. Voici leurs avis sur notre formation accélérée. Actuellement, 96.76% avons dit que Firebrand à dépassé leurs attentes:



"Great organisation and amazing trainer. I enjoyed it very much!"
Anonymous. (5/11/2018 à 10/11/2018)

"The trainer is a great instructor"
Anonymous. (5/11/2018 à 10/11/2018)

"Efficient, no fuss, friendly. "
Anonyme (12/8/2013 à 18/8/2013)

"Very good training with good instructor. Make sure you prepare well for this training and bring a dictionary."
R.T.. (29/10/2012 à 4/11/2012)

"Firebrand offers a very professional course, backed up by ISC² approved teachers. Our teacher gave a very clear course, supported by his anecdotes and experience. We were lucky to have a small group which allowed us to go deeper into things and to exchange points of view. The hotel in Helvoirt, despite the fact that the rooms are really small, is really well located. In the middle of the woods, it helps you concentrate on your study without having too many distractions and without the city noise. Food is really good too! ;o)"
Eric Peeters, ING Belgium. (21/5/2012 à 27/5/2012)