CISSP Official ISC2 Bootcamp — Academic Syllabus (40 Hours)
Course Title: CISSP Certification Preparation Program
Course Format: Instructor-Led Bootcamp (Online)
Course Duration: 40 Academic Hours (10 Sessions × 4 Hours)
Instructor: Omri Sagron, CISSP — Official ISC2 Authorized Instructor
Institution: Cyber School
Accreditation Context: Aligned with ISC2 CISSP CBK (7th Edition)
Link to Syllabus: https://gamma.app/docs/CISSP-Official-ISC-Bootcamp-Syllabus-fcj4y5x5oafm7uz
1. Course Description
The CISSP Certification Preparation Program is an intensive, graduate-level cybersecurity leadership course designed to prepare learners for the Certified Information Systems Security Professional (CISSP) examination administered by ISC2.
The course provides a comprehensive and rigorous exploration of the eight domains of the CISSP Common Body of Knowledge (CBK), integrating theoretical foundations, applied scenarios, case-study analysis, and executive-level decision-making.
Students develop the ability to analyze complex cybersecurity environments, design enterprise security architectures, evaluate risk, manage governance frameworks, and lead organizational security programs. The curriculum emphasizes real-world application, industry standards, and preparation for high-stakes certification.
2. Course Rationale
Cybersecurity leadership requires mastery of interdisciplinary domains spanning technical, managerial, operational, legal, and strategic competencies.
The CISSP credential is globally regarded as the benchmark for senior cybersecurity professionals.
This course enables learners to:
- Build deep conceptual understanding across all CBK domains
- Strengthen analytical and decision-making capabilities
- Apply security principles to real organizational scenarios
- Prepare methodically for the adaptive CISSP examination
- Demonstrate readiness for leadership roles in cybersecurity
3. Course Learning Outcomes
By the end of the course, learners will be able to:
Knowledge & Understanding
- Explain the theoretical concepts, frameworks, and standards that constitute the CISSP CBK.
- Evaluate governance, risk, and compliance structures in enterprise environments.
- Describe the principles of secure architecture, engineering, and cryptography.
- Analyze network and communication security requirements for modern infrastructures.
- Assess identity and access management strategies across hybrid environments.
- Evaluate security assessment methodologies and continuous monitoring processes.
- Demonstrate understanding of security operations, incident response, and forensics.
- Explain secure software development practices and application security controls.
Skills & Application
- Apply security principles to case studies and organizational scenarios.
- Analyze risk-based decisions using CISSP exam reasoning methodology.
- Develop security architectures that align with enterprise risk strategies.
- Evaluate test scenarios, identify vulnerabilities, and propose mitigations.
Professional & Ethical Competencies
- Integrate ethical considerations and professional conduct according to ISC2 Code of Ethics.
- Demonstrate readiness for the CISSP exam by completing full-length simulations.
4. Target Audience
- Cybersecurity professionals
- IT managers, architects, engineers
- SOC/IR analysts
- Governance, Risk & Compliance (GRC) professionals
- Senior technical staff preparing for CISSP
- Professionals transitioning into cybersecurity leadership roles
5. Prerequisites
Recommended (not mandatory):
- 3–5 years of cumulative paid cybersecurity experience
- Familiarity with enterprise networks, systems, and security practices
- Basic understanding of risk management
- English proficiency (textbook and exam language)
6. Instructional Methods
The instructional philosophy is grounded in active learning, applied problem-solving, and scenario-based reasoning.
Methods include:
- Live lectures
- Case studies
- Real-world examples from enterprise environments
- Facilitated group discussions
- Domain-based practice questions
- Full exam simulations
- Whiteboard modeling and architecture mapping
- Breakout room collaborative analysis
7. Course Structure — Detailed Weekly Sessions (10 Sessions × 4 Hours)
Session 1 — Course Orientation, CISSP Exam Overview & Diagnostic Assessment
Topics:
- Course introduction & expectations
- Overview of ISC2 and CISSP certification
- CAT exam structure and adaptive scoring
- Professional ethics and code of conduct
- Introduction to the CISSP CBK
- Leadership mindset for certification success
- Review of pre-study plan & materials
- Diagnostic sample test (15–20 questions)
- Group reasoning debrief
Learning Outcomes:
- Understand exam format and requirements
- Develop confidence in interpreting CISSP-style questions
- Build foundation for domain-level instruction
Session 2 — Domain 1: Security & Risk Management
Topics:
- CIA triad and extended attributes
- Governance frameworks (NIST, ISO, COBIT)
- Security policies and program management
- Risk management methodologies
- Legal, regulatory, and privacy requirements
- Due care, due diligence
- Business continuity fundamentals
- Ethics in security leadership
Learning Outcomes:
- Apply risk concepts to organizational scenarios
- Interpret governance and compliance requirements
Session 3 — Domain 2: Asset Security
Topics:
- Information classification
- Data life cycle
- Ownership and stewardship roles
- Data retention & destruction
- Data remanence
- Privacy and data-handling requirements
Learning Outcomes:
- Design appropriate controls based on classification
- Analyze risks related to data storage and transmission
Session 4 — Domain 3: Security Architecture & Engineering
Topics:
- Secure design principles
- Security models (Bell-LaPadula, Biba, Clark-Wilson)
- Evaluation frameworks (Common Criteria)
- Architecture security (cloud, virtualization, OT/ICS, IoT)
- Cryptographic concepts
- Hardware/firmware protections
Learning Outcomes:
- Evaluate enterprise architecture using security engineering principles
- Apply cryptographic controls appropriately
Session 5 — Domain 4: Communication & Network Security
Topics:
- Network architectures (OSI/TCP-IP)
- Secure protocol analysis
- Firewalls, IDS/IPS, segmentation
- Network attacks and defenses
- Wireless security standards
- VPN and secure tunneling
Learning Outcomes:
- Analyze secure network architecture designs
- Identify and mitigate network-level threats
Session 6 — Domain 5: Identity & Access Management
Topics:
- Identity lifecycle (JML)
- Authentication mechanisms
- Authorization models (RBAC, ABAC, MAC/DAC)
- Federation protocols (SAML, OAuth, OIDC)
- SSO, MFA
- Privileged access management
Learning Outcomes:
- Evaluate and design identity and access control systems
Session 7 — Domain 6: Security Assessment & Testing
Topics:
- Audit strategies
- Testing methodologies (SAST, DAST, IAST, SCA)
- Vulnerability scanning
- Penetration testing lifecycle
- Log reviews and monitoring
- Continuity testing
- Performance metrics (KPI, KRI)
Learning Outcomes:
- Apply assessment methodologies to real scenarios
- Interpret test results to improve security posture
Session 8 — Domain 7: Security Operations
Topics:
- Incident response (NIST 800-61)
- Forensics principles
- Operational logging & SIEM
- Egress monitoring
- Configuration & change management
- Malware analysis
- Physical security controls
- Insider threat programs
- BCP/DR program execution
Learning Outcomes:
- Lead incident response and operational security programs
Session 9 — Domain 8: Software Development Security
Topics:
- SDLC models (Waterfall, Agile, DevOps, DevSecOps)
- Secure coding principles
- Application security testing
- CI/CD pipeline risks
- API security
- Database security concepts
- Software maturity models (SAMM, BSIMM)
Learning Outcomes:
- Evaluate secure coding practices and software lifecycle risks
Session 10 — Final CISSP Exam Strategy + Full Simulation
Topics:
- Constructing an effective post-course study plan
- Time management during the CAT exam
- Exam traps and distractor patterns
- High-value CISSP concepts
- 25–50 question full simulation
- Personalized readiness assessment
- Preparing for endorsement & ISC2 membership
Learning Outcomes:
- Demonstrate exam readiness
- Develop a structured study roadmap
8. Assessment & Evaluation
This is a preparation course; however, to measure progress:
Formative Assessments
- Diagnostic exam (Session 1)
- Domain quizzes (Sessions 2–9)
- Case study analysis
- Breakout group discussions
Summative Assessment
- Final simulation exam (Session 10)
- Personalized study report
9. Required Materials
- CISSP Official ISC2 Textbook – 7th Edition (VitalSource eBook)
- Access to official ISC2 CISSP Study Plan
- Access to instructor-provided supplemental materials
- Stable internet, webcam, and microphone
10. Academic Policies
Attendance
Active participation in all sessions is expected.
Two or more absences may impede certification readiness.
Engagement
Learners are expected to participate in discussions, case studies, and breakout activities.
Academic Integrity
All learners must adhere to the ISC2 Code of Ethics:
- Protect society
- Act honorably
- Provide competent service
- Advance and protect the profession
Accessibility
Accommodations are available on request.
11. Instructor Information
Omri Sagron, CISSP
ISC2 Authorized Instructor
Head of Cyber Security, Cyber School

LinkedIn Profile
Omri Sagron, CISSP – LinkedIn LinkedIn+1
https://il.linkedin.com/in/omri-sagron-cissp-24508331
Background & Professional Experience
Omri Sagron is a seasoned cybersecurity professional with extensive experience in enterprise-security, risk advisory, architecture and training. His profile highlights several roles and credentials:
- He holds the ISC² CISSP® certification.
- He also holds the CEH (Certified Ethical Hacker) certification.
- Currently, he served as CTO, Cyber Risk Advisory at BDO Israel.
- Based in Northern Israel, he brings local and global experience.
Key Strengths & Contributions
- Leadership & Advisory: In his role at BDO Israel, Omri led cyber risk advisory work, which likely involved large-scale enterprise assessments, governance frameworks, and strategic security architecture.
- Training & Mentoring: As the Head of Cyber School’s CISSP program (your role), he has positioned himself as an instructor who translates executive-level cybersecurity work into effective training for the exam and professional practice.
- Practical & Applied Focus: Through his background in advisory services and real-world projects, he brings direct experience of how security frameworks, risk assessments and controls operate in live environments. This bridges theory and practice—an essential component for the CISSP.
- Global Credentials & Standards: Holding CISSP and CEH, he aligns with leading industry standards and certifications, which lends credibility to his course delivery and the training program you’re building.
Why Omri Is the Ideal CISSP Instructor
- Credibility: His CISSP credential and experience in senior cyber risk advisory make him well-qualified to teach at the leadership level.
- Real-World Experience: He doesn’t just teach passively—he has been involved in real enterprise security environments, which allows for meaningful scenarios, case studies and rich discussion.
- Exam-Focused Strategy: His professional role likely required translating complex cybersecurity challenges into managed risk for clients—parallel to how CISSP questions require translation from scenario → decision.
- Regional Insight: Being based in Israel and familiar with both local and global security landscapes provides added value for learners in that region.
Instructor Bio
Omri Sagron, CISSP
Omri Sagron is a seasoned cybersecurity professional and ISC²-authorized instructor specializing in CISSP preparation and enterprise security leadership. With extensive experience as CTO of Cyber Risk Advisory at BDO Israel, Omri brings deep expertise in governance, risk, architecture, testing and operations. He holds the CISSP and CEH certifications, and is passionate about translating complex security topics into practical, career-ready teaching. As Head of Cyber School’s CISSP program, Omri guides experienced professionals toward certification and leadership roles in global cybersecurity.
Links & References
- LinkedIn: https://il.linkedin.com/in/omri-sagron-cissp-24508331 LinkedIn
- BDO Israel Cyber Risk Advisory page (for context)
- ISC² Instructor Program details: https://www.isc2.org/Training/Instructor-Programs
- Cyber School program site (in your own LMS)
About ISC2
ISC2 (International Information System Security Certification Consortium) is the world’s leading cybersecurity certification organization, serving more than 600,000+ candidates and members worldwide.
🌐 Website:
Mission:
To inspire a safe and secure cyber world by developing and validating the skills of cybersecurity professionals.
What ISC2 Provides:
- Industry-leading cybersecurity certifications
- Continuing Professional Education (CPE) system
- Global member community
- Code of Ethics
- Conferences, research, and professional development
- Advocacy for cybersecurity policy
ISC2 Membership Benefits:
- Professional recognition
- Access to exclusive research
- Discounted training
- Digital badges
- Networking events
- Continuing education opportunities
ISC2 Cybersecurity Certification Portfolio
ISC2 offers a structured portfolio of certifications aligned to expertise level:
🔵 Entry-Level Certification
ISC2 Certified in Cybersecurity (CC)
https://www.isc2.org/Certifications/CC
A foundational certification for beginners entering the field.
🟢 Associate of ISC2
https://www.isc2.org/Certifications/Associate
For candidates who pass a certification exam but have not yet met the experience requirements.
🟣 Core Professional Certifications
CISSP — Certified Information Systems Security Professional
https://www.isc2.org/Certifications/CISSP
The gold-standard leadership certification (this course).
🟠 Specialized CISSP Concentrations (for advanced professionals)
CISSP-ISSAP – Architecture
https://www.isc2.org/Certifications/CISSP-ISSAP
CISSP-ISSEP – Engineering
https://www.isc2.org/Certifications/CISSP-ISSEP
CISSP-ISSMP – Management
https://www.isc2.org/Certifications/CISSP-ISSMP
🟡 Advanced Cybersecurity Certifications
CCSP — Certified Cloud Security Professional
https://www.isc2.org/Certifications/CCSP
CSSLP — Certified Secure Software Lifecycle Professional
https://www.isc2.org/Certifications/CSSLP
🟤 Governance, Risk, and Compliance
CGRC — Certified in Governance, Risk and Compliance
https://www.isc2.org/Certifications/CGRC
⚫ Authorized Instructor Program
Your instructor (Omri Sagron) is certified under the official ISC2 Authorized Instructor Program.
https://www.isc2.org/Training/Instructor-Programs