CISSP Review Course
2024 CISSP Complete Program
Save the dates! Get the books!
Instructor-led virtual education sessions reviewing:
-
(ISC)² CISSP Official Study Guide, 9th Edition
-
(ISC)² Official Practice Tests, 3rd Edition
-
21 instructional sessions on the schedule.
Thursday evenings from 4 to 6 p.m. PST beginning April 11 and concluding on September 5.
Visual materials and technical content provided for Coaches.
Virtual Classroom
-
Keep the program instructor led as opposed to ‘distance learning’ or recorded sessions
-
The 21 Sessions will remain at two hours duration
-
The platform will be over ISSA Education Zoom
-
A moderator for each web conference session will support the Coach and students
-
Most importantly to monitor the chat window for questions from the students
-
Admin the waiting room
-
Attendance, fees, guests and auditors, audio and video control
-
-
Security includes:
-
Moderator intervention
-
Pre-registration
-
Waiting room
-
Password
-
Disable
-
file transfer
-
’join before’ host
-
‘allow removed participants to rejoin’
-
-
Fees for attendees:
Members Only
-
Members only – No Charge
-
Valid collegiate Student Body cardholders – $75
-
Sponsored Scholarships
-
-
Membership for one year of ISSA varies by chapter
-
This program is not geo-fenced
-
(ISC)² CISSP Official Study Guide and Official Practice Tests retail for about $70 for the bundle and are not provided by SV-ISSA
-
Registration will be available on the SV-ISSA Website
-
-
Maximum class size is 75; ISSA will sponsor the Zoom account
-
Horizon3.ai will be primary sponsor – other candidates to be considered
Coaches and Content:
February 20 |
SV ISSA February Chapter meeting |
Kickoff |
Rehearsal |
Leap Day |
Coaches and Moderators |
April 11 |
Chapter 1 Security Governance Through Principles and Policies |
|
April 18 |
Chapter 2 Personnel Security and Risk Management Concepts |
|
April 25 |
Chapter 3 Business Continuity Planning |
|
May 2 |
Chapter 4 Laws, Regulations, and Compliance |
|
May 9 |
Chapter 5 Protecting Security of Assets |
|
May 16 |
Chapter 6 Cryptography and Symmetric Key Algorithms |
|
May 23 |
Chapter 7 PKI and Cryptographic Applications |
|
May 30 |
Chapter 8 Principles of Security Models, Design, and Capabilities |
|
June 6 |
Chapter 9 Security Vulnerabilities, Threats, and Countermeasures |
|
June 13 |
Chapter 10 Physical Security Requirements |
|
June 20 |
Chapter 11 Secure Network Architecture and Securing Network Components |
|
June 27 |
Chapter 12 Secure Communications and Network Attacks |
|
July 11 |
Chapter 13 Managing Identity and Authentication |
|
July 18 |
Chapter 14 Controlling and Monitoring Access |
|
July 25 |
Chapter 15 Security Assessment and Testing |
|
August 1 |
Chapter 16 Managing Security Operations |
|
August 8 |
Chapter 17 Preventing and Responding to Incidents |
|
August 15 |
Chapter 18 Disaster Recovery Planning |
|
August 22 |
Chapter 19 Investigations and Ethics |
|
August 29 |
Chapter 20 Software Development Security |
|
September 5 |
Chapter 21 Malicious Code and Application Attacks |
Bonus: AI Landscape
For the hour leading up to each CISSP class session we will host a discussion charting the terrain of artificial intelligence, machine learning and their role in technology. We will be mapping and navigating the broad scope of AI, its subfields and how it fits into the overall tech landscape
Week 1 (June 29): AI vs Human Intelligence Discuss the differences between human intelligence and artificial intelligence. Explain that AI is narrow in scope and needs to be developed for specific tasks. Compare the types of machine learning algorithms used to emulate different kinds of intelligence. Highlight the opportunities and limitations of existing AI.
Week 2 (July 6): Fundamentals of AI Architecture
Review the basic components of an AI system like data pipelines, training loops, algorithms, and infrastructure. Explain the frontend, middleware, and backend in an AI architecture. Discuss how data flows through an end-to-end AI system. Provide examples of different architectural approaches for use cases like image recognition vs natural language processing.
Week 3 (July 13): Developing AI Assistants and Chatbots Explain the steps to develop an AI assistant including data collection, intent & entity recognition, dialogue management, and integration. Discuss how chatbots differ from more complex assistants. Highlight tools that can be used to build bots and share examples of popular AI assistants to analyse their capabilities and limitations. Address key challenges in creating sophisticated AI tools for fluent conversation.
Week 4 (July 20): AI in Cybersecurity Discuss how AI is being used in the field of cybersecurity, including for network monitoring, malware detection, vulnerability management, fraud prevention, and more. Explain the application of machine learning techniques in these use cases. Share examples of cybersecurity companies using AI and their approaches. Discuss the pros and cons of relying on AI for critical security operations and defense. Address concerns around adversarial attacks.
Week 5 (July 27) and onward: Additional topics Explore neural network advancements like transformers, reinforcement learning for games, computer vision applications, AI ethics and bias, AI regulation and policy issues. Discuss the latest headlines and developments in AI each week to keep students up to speed with progress in the field. Compare how different countries and organizations are investing in and deploying AI.