Back to Course

ISC2 CISSP Certificate Bootcamp

0% Complete
0/0 Steps
  1. About Cyber School
  2. About ISC2
  3. The CISSP Certificate
  4. Syllabus | CISSP Prep Bootcamp
  5. Instructor Led Sessions

    CISSP Orientation + Exam Overview + Sample Test
    3 Topics
    |
    1 Quiz
  6. Domain 1 — Security & Risk Management
    2 Topics
  7. Domain 2 — Asset Security
    2 Topics
  8. Domain 3 — Security Architecture & Engineering
    2 Topics
  9. Domain 4 — Communication & Network Security
    2 Topics
  10. Domain 5 — Identity & Access Management (IAM)
    2 Topics
  11. Domain 6 — Security Assessment & Testing
    2 Topics
  12. Domain 7 — Security Operations
    2 Topics
  13. Domain 8 — Software Development Security
    2 Topics
  14. Final Exam Strategy + Full Simulation
    2 Topics
Lesson 4 of 14
In Progress

Syllabus | CISSP Prep Bootcamp

omri sagron 11/12/2025

CISSP Official ISC2 Bootcamp — Academic Syllabus (40 Hours)

Course Title: CISSP Certification Preparation Program
Course Format: Instructor-Led Bootcamp (Online)
Course Duration: 40 Academic Hours (10 Sessions × 4 Hours)
Instructor: Omri Sagron, CISSP — Official ISC2 Authorized Instructor
Institution: Cyber School
Accreditation Context: Aligned with ISC2 CISSP CBK (7th Edition)

Link to Syllabus: https://gamma.app/docs/CISSP-Official-ISC-Bootcamp-Syllabus-fcj4y5x5oafm7uz


1. Course Description

The CISSP Certification Preparation Program is an intensive, graduate-level cybersecurity leadership course designed to prepare learners for the Certified Information Systems Security Professional (CISSP) examination administered by ISC2.
The course provides a comprehensive and rigorous exploration of the eight domains of the CISSP Common Body of Knowledge (CBK), integrating theoretical foundations, applied scenarios, case-study analysis, and executive-level decision-making.

Students develop the ability to analyze complex cybersecurity environments, design enterprise security architectures, evaluate risk, manage governance frameworks, and lead organizational security programs. The curriculum emphasizes real-world application, industry standards, and preparation for high-stakes certification.


2. Course Rationale

Cybersecurity leadership requires mastery of interdisciplinary domains spanning technical, managerial, operational, legal, and strategic competencies.
The CISSP credential is globally regarded as the benchmark for senior cybersecurity professionals.

This course enables learners to:

  • Build deep conceptual understanding across all CBK domains
  • Strengthen analytical and decision-making capabilities
  • Apply security principles to real organizational scenarios
  • Prepare methodically for the adaptive CISSP examination
  • Demonstrate readiness for leadership roles in cybersecurity

3. Course Learning Outcomes

By the end of the course, learners will be able to:

Knowledge & Understanding

  1. Explain the theoretical concepts, frameworks, and standards that constitute the CISSP CBK.
  2. Evaluate governance, risk, and compliance structures in enterprise environments.
  3. Describe the principles of secure architecture, engineering, and cryptography.
  4. Analyze network and communication security requirements for modern infrastructures.
  5. Assess identity and access management strategies across hybrid environments.
  6. Evaluate security assessment methodologies and continuous monitoring processes.
  7. Demonstrate understanding of security operations, incident response, and forensics.
  8. Explain secure software development practices and application security controls.

Skills & Application

  1. Apply security principles to case studies and organizational scenarios.
  2. Analyze risk-based decisions using CISSP exam reasoning methodology.
  3. Develop security architectures that align with enterprise risk strategies.
  4. Evaluate test scenarios, identify vulnerabilities, and propose mitigations.

Professional & Ethical Competencies

  1. Integrate ethical considerations and professional conduct according to ISC2 Code of Ethics.
  2. Demonstrate readiness for the CISSP exam by completing full-length simulations.

4. Target Audience

  • Cybersecurity professionals
  • IT managers, architects, engineers
  • SOC/IR analysts
  • Governance, Risk & Compliance (GRC) professionals
  • Senior technical staff preparing for CISSP
  • Professionals transitioning into cybersecurity leadership roles

5. Prerequisites

Recommended (not mandatory):

  • 3–5 years of cumulative paid cybersecurity experience
  • Familiarity with enterprise networks, systems, and security practices
  • Basic understanding of risk management
  • English proficiency (textbook and exam language)

6. Instructional Methods

The instructional philosophy is grounded in active learning, applied problem-solving, and scenario-based reasoning.

Methods include:

  • Live lectures
  • Case studies
  • Real-world examples from enterprise environments
  • Facilitated group discussions
  • Domain-based practice questions
  • Full exam simulations
  • Whiteboard modeling and architecture mapping
  • Breakout room collaborative analysis

7. Course Structure — Detailed Weekly Sessions (10 Sessions × 4 Hours)


Session 1 — Course Orientation, CISSP Exam Overview & Diagnostic Assessment

Topics:

  • Course introduction & expectations
  • Overview of ISC2 and CISSP certification
  • CAT exam structure and adaptive scoring
  • Professional ethics and code of conduct
  • Introduction to the CISSP CBK
  • Leadership mindset for certification success
  • Review of pre-study plan & materials
  • Diagnostic sample test (15–20 questions)
  • Group reasoning debrief

Learning Outcomes:

  • Understand exam format and requirements
  • Develop confidence in interpreting CISSP-style questions
  • Build foundation for domain-level instruction

Session 2 — Domain 1: Security & Risk Management

Topics:

  • CIA triad and extended attributes
  • Governance frameworks (NIST, ISO, COBIT)
  • Security policies and program management
  • Risk management methodologies
  • Legal, regulatory, and privacy requirements
  • Due care, due diligence
  • Business continuity fundamentals
  • Ethics in security leadership

Learning Outcomes:

  • Apply risk concepts to organizational scenarios
  • Interpret governance and compliance requirements

Session 3 — Domain 2: Asset Security

Topics:

  • Information classification
  • Data life cycle
  • Ownership and stewardship roles
  • Data retention & destruction
  • Data remanence
  • Privacy and data-handling requirements

Learning Outcomes:

  • Design appropriate controls based on classification
  • Analyze risks related to data storage and transmission

Session 4 — Domain 3: Security Architecture & Engineering

Topics:

  • Secure design principles
  • Security models (Bell-LaPadula, Biba, Clark-Wilson)
  • Evaluation frameworks (Common Criteria)
  • Architecture security (cloud, virtualization, OT/ICS, IoT)
  • Cryptographic concepts
  • Hardware/firmware protections

Learning Outcomes:

  • Evaluate enterprise architecture using security engineering principles
  • Apply cryptographic controls appropriately

Session 5 — Domain 4: Communication & Network Security

Topics:

  • Network architectures (OSI/TCP-IP)
  • Secure protocol analysis
  • Firewalls, IDS/IPS, segmentation
  • Network attacks and defenses
  • Wireless security standards
  • VPN and secure tunneling

Learning Outcomes:

  • Analyze secure network architecture designs
  • Identify and mitigate network-level threats

Session 6 — Domain 5: Identity & Access Management

Topics:

  • Identity lifecycle (JML)
  • Authentication mechanisms
  • Authorization models (RBAC, ABAC, MAC/DAC)
  • Federation protocols (SAML, OAuth, OIDC)
  • SSO, MFA
  • Privileged access management

Learning Outcomes:

  • Evaluate and design identity and access control systems

Session 7 — Domain 6: Security Assessment & Testing

Topics:

  • Audit strategies
  • Testing methodologies (SAST, DAST, IAST, SCA)
  • Vulnerability scanning
  • Penetration testing lifecycle
  • Log reviews and monitoring
  • Continuity testing
  • Performance metrics (KPI, KRI)

Learning Outcomes:

  • Apply assessment methodologies to real scenarios
  • Interpret test results to improve security posture

Session 8 — Domain 7: Security Operations

Topics:

  • Incident response (NIST 800-61)
  • Forensics principles
  • Operational logging & SIEM
  • Egress monitoring
  • Configuration & change management
  • Malware analysis
  • Physical security controls
  • Insider threat programs
  • BCP/DR program execution

Learning Outcomes:

  • Lead incident response and operational security programs

Session 9 — Domain 8: Software Development Security

Topics:

  • SDLC models (Waterfall, Agile, DevOps, DevSecOps)
  • Secure coding principles
  • Application security testing
  • CI/CD pipeline risks
  • API security
  • Database security concepts
  • Software maturity models (SAMM, BSIMM)

Learning Outcomes:

  • Evaluate secure coding practices and software lifecycle risks

Session 10 — Final CISSP Exam Strategy + Full Simulation

Topics:

  • Constructing an effective post-course study plan
  • Time management during the CAT exam
  • Exam traps and distractor patterns
  • High-value CISSP concepts
  • 25–50 question full simulation
  • Personalized readiness assessment
  • Preparing for endorsement & ISC2 membership

Learning Outcomes:

  • Demonstrate exam readiness
  • Develop a structured study roadmap

8. Assessment & Evaluation

This is a preparation course; however, to measure progress:

Formative Assessments

  • Diagnostic exam (Session 1)
  • Domain quizzes (Sessions 2–9)
  • Case study analysis
  • Breakout group discussions

Summative Assessment

  • Final simulation exam (Session 10)
  • Personalized study report

9. Required Materials

  • CISSP Official ISC2 Textbook – 7th Edition (VitalSource eBook)
  • Access to official ISC2 CISSP Study Plan
  • Access to instructor-provided supplemental materials
  • Stable internet, webcam, and microphone

10. Academic Policies

Attendance

Active participation in all sessions is expected.
Two or more absences may impede certification readiness.

Engagement

Learners are expected to participate in discussions, case studies, and breakout activities.

Academic Integrity

All learners must adhere to the ISC2 Code of Ethics:

  • Protect society
  • Act honorably
  • Provide competent service
  • Advance and protect the profession

Accessibility

Accommodations are available on request.


11. Instructor Information

Omri Sagron, CISSP
ISC2 Authorized Instructor
Head of Cyber Security, Cyber School

LinkedIn Profile

Omri Sagron, CISSP – LinkedIn LinkedIn+1

https://il.linkedin.com/in/omri-sagron-cissp-24508331


Background & Professional Experience

Omri Sagron is a seasoned cybersecurity professional with extensive experience in enterprise-security, risk advisory, architecture and training. His profile highlights several roles and credentials:

  • He holds the ISC² CISSP® certification. 
  • He also holds the CEH (Certified Ethical Hacker) certification. 
  • Currently, he served as CTO, Cyber Risk Advisory at BDO Israel. 
  • Based in Northern Israel, he brings local and global experience. 

Key Strengths & Contributions

  • Leadership & Advisory: In his role at BDO Israel, Omri led cyber risk advisory work, which likely involved large-scale enterprise assessments, governance frameworks, and strategic security architecture.
  • Training & Mentoring: As the Head of Cyber School’s CISSP program (your role), he has positioned himself as an instructor who translates executive-level cybersecurity work into effective training for the exam and professional practice.
  • Practical & Applied Focus: Through his background in advisory services and real-world projects, he brings direct experience of how security frameworks, risk assessments and controls operate in live environments. This bridges theory and practice—an essential component for the CISSP.
  • Global Credentials & Standards: Holding CISSP and CEH, he aligns with leading industry standards and certifications, which lends credibility to his course delivery and the training program you’re building.

Why Omri Is the Ideal CISSP Instructor

  • Credibility: His CISSP credential and experience in senior cyber risk advisory make him well-qualified to teach at the leadership level.
  • Real-World Experience: He doesn’t just teach passively—he has been involved in real enterprise security environments, which allows for meaningful scenarios, case studies and rich discussion.
  • Exam-Focused Strategy: His professional role likely required translating complex cybersecurity challenges into managed risk for clients—parallel to how CISSP questions require translation from scenario → decision.
  • Regional Insight: Being based in Israel and familiar with both local and global security landscapes provides added value for learners in that region.

Instructor Bio

Omri Sagron, CISSP
Omri Sagron is a seasoned cybersecurity professional and ISC²-authorized instructor specializing in CISSP preparation and enterprise security leadership. With extensive experience as CTO of Cyber Risk Advisory at BDO Israel, Omri brings deep expertise in governance, risk, architecture, testing and operations. He holds the CISSP and CEH certifications, and is passionate about translating complex security topics into practical, career-ready teaching. As Head of Cyber School’s CISSP program, Omri guides experienced professionals toward certification and leadership roles in global cybersecurity.


Links & References

About ISC2

ISC2 (International Information System Security Certification Consortium) is the world’s leading cybersecurity certification organization, serving more than 600,000+ candidates and members worldwide.

🌐 Website:

https://www.isc2.org

Mission:

To inspire a safe and secure cyber world by developing and validating the skills of cybersecurity professionals.

What ISC2 Provides:

  • Industry-leading cybersecurity certifications
  • Continuing Professional Education (CPE) system
  • Global member community
  • Code of Ethics
  • Conferences, research, and professional development
  • Advocacy for cybersecurity policy

ISC2 Membership Benefits:

  • Professional recognition
  • Access to exclusive research
  • Discounted training
  • Digital badges
  • Networking events
  • Continuing education opportunities

ISC2 Cybersecurity Certification Portfolio

ISC2 offers a structured portfolio of certifications aligned to expertise level:


🔵 Entry-Level Certification

ISC2 Certified in Cybersecurity (CC)

https://www.isc2.org/Certifications/CC
A foundational certification for beginners entering the field.


🟢 Associate of ISC2

https://www.isc2.org/Certifications/Associate
For candidates who pass a certification exam but have not yet met the experience requirements.


🟣 Core Professional Certifications

CISSP — Certified Information Systems Security Professional

https://www.isc2.org/Certifications/CISSP
The gold-standard leadership certification (this course).


🟠 Specialized CISSP Concentrations (for advanced professionals)

CISSP-ISSAP – Architecture

https://www.isc2.org/Certifications/CISSP-ISSAP

CISSP-ISSEP – Engineering

https://www.isc2.org/Certifications/CISSP-ISSEP

CISSP-ISSMP – Management

https://www.isc2.org/Certifications/CISSP-ISSMP


🟡 Advanced Cybersecurity Certifications

CCSP — Certified Cloud Security Professional

https://www.isc2.org/Certifications/CCSP

CSSLP — Certified Secure Software Lifecycle Professional

https://www.isc2.org/Certifications/CSSLP


🟤 Governance, Risk, and Compliance

CGRC — Certified in Governance, Risk and Compliance

https://www.isc2.org/Certifications/CGRC


⚫ Authorized Instructor Program

Your instructor (Omri Sagron) is certified under the official ISC2 Authorized Instructor Program.
https://www.isc2.org/Training/Instructor-Programs