A personal experience of CISSP boot camp

You can spend your whole life trying to gain the width or depth of knowledge necessary to do the job competently, and every day feel you know a little less than the day before.
It's often unclear whether it is a technical field or a management one, with passionate advocates arguing both that there are too many policy wonks and it's time to get back to our technical roots, and that there are too many technical specialists who can't see the wood for the trees.
Choosing CISSP Against that background it is no wonder there is a deep cynicism of training programmes and professional qualifications in particular.
The one qualification that employers seem to value above all others is CISSP. It requires both technical understanding and business context.
Comments from industry colleagues and a quick reading of the syllabus convinced me that, whilst i'd have to call on all my experience in IT, business and risk, I would also need some form of refresher training to stand any chance of passing.
Choosing Firebrand I rapidly found that the information security training market was fragmented with no clear or consistent view of the quality of courses of training providers.
I was particularly concerned that it would be impossible to cover the CISSP syllabus in a short course.
After some months looking in detail into the options and talking with colleagues, I picked a 7 day residential intensive CISSP boot camp from training provider Firebrand, and tried to arrive with an open mind.
The Course The instructor - flown in from the US for the course - was unquestionably an expert and able to explain theory both clearly and quickly.
This was essential, as to pack the course into the week and get us prepared for an exam on day seven required an early morning start, full morning and afternoon sessions, and for many a return after dinner for more study.
We rattled through at a rate of two domains per day for the week, returning at the end of the week to those areas generating most concern.
Course materials were good, being based on ISC2′s official guide to the CISSP examination, complemented by an instructor who knew the strengths and weaknesses of the text and where to look for additional information and explanations.
Given the intensive nature of the week you do need good accommodation, excellent food, and opportunities to relax.
By day 2 I had a routine going - gym, breakfast, course, lunch, course, dinner, and back to my room to catch up on the world.
The food was excellent and there was always enough of it, although you had to order at lunchtime and it was easy to forget your choice at the end of the day.
The CISSP Exam Exam day itself was almost an anti-climax, with a fairly leisurely start.
The exam is scheduled to last 6 hours, but time is not the issue.
The issue with this exam is resilience - after about 100 questions I felt I was losing the will to live, and there are 250 in the exam.
Still though the course content and the focus of the instructor was a genuine help, and I came back time and time again to elements of the week that, by putting what you know in the context of ISC2′s requirements, helps you answer the question.
If you are going to do CISSP or a similar certification, this is the way to do it.


This Cyber News was published on securityboulevard.com. Publication date: Mon, 12 Feb 2024 01:13:04 +0000


Cyber News related to A personal experience of CISSP boot camp

A personal experience of CISSP boot camp - You can spend your whole life trying to gain the width or depth of knowledge necessary to do the job competently, and every day feel you know a little less than the day before. It's often unclear whether it is a technical field or a management one, ...
9 months ago Securityboulevard.com
Should I get CISSP Certified? - CISSP's reputation as a certification is for being 'a mile wide and an inch deep'. That's a limitation too - CISSP means you understand something, but not that you know how to do it. But the exam is a six-hour marathon consisting of a vast array of ...
9 months ago Securityboulevard.com
Develop Valuable Security and Risk Management Skills for Just $30 - With cyberthreats and cyberattacks always on the rise, developing security and risk management skills could be one of the best moves for your business or career. We may be compensated by vendors who appear on this page through methods such as ...
10 months ago Techrepublic.com
Critical 'LogoFAIL' Bugs Offer Secure Boot Bypass for Millions of PCs - Researchers have uncovered "LogoFAIL," a set of critical vulnerabilities present in the Unified Extensible Firmware Interface ecosystem for PCs. Exploitation of the vulnerabilities nullify essential endpoint security measures and provide attackers ...
11 months ago Darkreading.com
Top 10 CISSP Stress-Busting Study Tips & Tricks - A little stress can actually help you focus and do better. Don't let it stop you from registering and sitting for your CISSP exam. CISSP certification is a smart investment in your future. As cybersecurity's premier credential, it consistently ranks ...
11 months ago Cybersecurity-insiders.com
So You Want to be a Leader in Cybersecurity? Follow this Path - Effective cybersecurity leadership is vital for organizations worldwide. Cybersecurity leaders embed security across operations, rapidly respond to threats and advise senior leaders. They stay in front of cybersecurity trends from a technical ...
10 months ago Cybersecurity-insiders.com
Privacy Policy 2024 - Personal information is any information that identifies you or would enable someone to contact you, which may include your name, email address, phone number and other non-public information that is associated with such information. Information We ...
11 months ago Bitsight.com
Week in review: Veeam fixes RCE flaw in backup management platform, Patch Tuesday forecast - Veeam fixes RCE flaw in backup management platformVeeam has patched a high-severity vulnerability in Veeam Service Provider Console and is urging customers to implement the patch. May 2024 Patch Tuesday forecast: A reminder of recent threats and ...
6 months ago Helpnetsecurity.com
CVE-2022-27632 - Cross-site request forgery (CSRF) vulnerability in Rebooter(WATCH BOOT nino RPC-M2C [End of Sale] all firmware versions, WATCH BOOT light RPC-M5C [End of Sale] all firmware versions, WATCH BOOT L-zero RPC-M4L [End of Sale] all firmware versions, ...
2 years ago
CVE-2022-28717 - Cross-site scripting vulnerability in Rebooter(WATCH BOOT nino RPC-M2C [End of Sale] all firmware versions, WATCH BOOT light RPC-M5C [End of Sale] all firmware versions, WATCH BOOT L-zero RPC-M4L [End of Sale] all firmware versions, WATCH BOOT mini ...
2 years ago
Linux Distros Hit by RCE Vulnerability in Shim Bootloader - Linux shim, a small piece of code that many major Linux distros use during the secure boot process, has a remote code execution vulnerability in it that gives attackers a way to take complete control of affected systems. All Linux distributions that ...
9 months ago Darkreading.com
LogoFail vulnerability affects many Windows and Linux devices - Many commercial computers are vulnerable to a set of vulnerabilities that exploit flaws in the processing of startup logos during boot. ADVERTISEMENT. Security researchers at Binarly have disclosed security vulnerabilities in system firmware used by ...
11 months ago Ghacks.net
CVSS 9.8 Bootkit Bug in shim.efi - A Microsoft researcher found it-and it's somehow Microsoft's fault. A critical vulnerability in most Linux distributions now has a patch ready. Enterprise users especially need this if booting using HTTP or PXE. So go get it. In today's SB Blogwatch, ...
9 months ago Securityboulevard.com
Data De-Identification: Balancing Privacy, Efficacy & Cybersecurity - COMMENTARY. Global data privacy laws were created to address growing consumer concerns about individual privacy. These laws include several best practices for businesses about storing and using consumers' personal data so that the exposure of ...
11 months ago Darkreading.com
CVE-2024-35803 - In the Linux kernel, the following vulnerability has been resolved: x86/efistub: Call mixed mode boot services on the firmware's stack Normally, the EFI stub calls into the EFI boot services using the stack that was live when the stub was entered. ...
6 months ago Tenable.com
What we learned over coffee at the year's biggest healthcare event - Healthcare organizations are dedicated to providing exceptional care, prioritizing the patient's satisfaction and experience through a patient-centered approach. This approach ensures patients are firmly at the center of their care and engaged in ...
6 months ago Feedpress.me
Just about every Windows and Linux device vulnerable to new LogoFAIL firmware attack - Hundreds of Windows and Linux computer models from virtually all hardware makers are vulnerable to a new attack that executes malicious firmware early in the boot-up sequence, a feat that allows infections that are nearly impossible to detect or ...
11 months ago Arstechnica.com
CVE-2022-23005 - Western Digital has identified a weakness in the UFS standard that could result in a security vulnerability. This vulnerability may exist in some systems where the Host boot ROM code implements the UFS Boot feature to boot from UFS compliant storage ...
1 year ago
Embracing Sustainability: Embark on the Journey to a More Sustainable Future! - Sustainability isn't just about protecting the planet for future generations. It's also about preserving the delicate balance that allows life to thrive today and tomorrow. In a world where environmental concerns are growing more urgent with each ...
11 months ago Feedpress.me
Week in review: New Black Basta's social engineering campaign, passing the CISSP exam in 6 weeks - Black Basta target orgs with new social engineering campaignBlack Basta, one of the most prolific ransomware-as-a-service operators, is trying out a combination of email DDoS and vishing to get employees to download remote access tools. Cybersecurity ...
6 months ago Helpnetsecurity.com
Invitation to All CISSPISSMP and CISSP Certificate Owners Read the Blog - The cybersecurity industry is constantly evolving, so it is important to make sure certifications are up to date and relevant. To do this, we need the help of cybersecurity professionals who hold certifications in the field. We are looking into ...
1 year ago Blog.isc2.org
Shim Bug Uncovered: A Ten-Year Security Breach in Linux Boot Loaders - In the dynamic realm of cybersecurity, discovering a significant flaw in every Linux boot loader signed in the past decade has underscored the pervasive nature of potential threats. This blog explores the intricacies of the Shim bug, its implications ...
9 months ago Cysecurity.news
UEFI Failing: What to Know About LogoFAIL Attacks - Security researchers, known for their inquisitive and unconventional methods, have recently scrutinized UEFI, revealing significant vulnerabilities called LogoFAIL vulnerabilities. These experts, who investigate systems to uncover unusual ways to ...
10 months ago Securityboulevard.com
The Rise of Digital Customer Experience - Digital customer experience is a hot topic these days. In all seriousness, digital customer experience is one of the most important differentiators for your business. At its core, DCX is about the customer journey-a guided path for your customers to ...
11 months ago Feedpress.me
Join Customer Experience for Cisco Live EMEA Demos - In her blog, Countdown to Cisco Live EMEA, Adele Trombetta, SVP, Cisco Customer Experience EMEA, mentioned how excited she is for Cisco Live EMEA in just a little more than a week, and I agree. I want to go a little deeper and give you some more ...
9 months ago Feedpress.me

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)