O'Reilly logo
live online training icon Live Online training

CISSP Exam Preparation: Practicing the CISO Skill Set Using Case-based Learning

Dean Bushmiller

CISSP is the gold standard of vendor neutral cybersecurity certification. Every job that touches a computer has a cybersecurity component. Every business owner must make informed decisions and choices in cybersecurity computing. If your organization is subject to PCI, GDPR, HIPAA, SOX, ISO 27001, or others, you need the CISSP to understand cybersecurity from a management viewpoint.

Many people think the CISSP exam is about technology and security; it is not. It is about managing the people with technology and security functions. It is about thinking the CISSP way; a unique skill.

Each one of the 8 CISSP domains represent an entire life’s work. You must build a system to prepare for the exam. Everyone tries to brute-force the exam, but most fail because it requires finesse, a CISSP management way of thinking, and a clear study plan. This course starts with one view across all domains and one practice.

This course is the second in a series of four courses on CISSP exam preparation. Each of the four courses explores the exam through a different lens, cultivating a skill that will improve your overall performance on the exam. Taking all four courses will cover 80% of the exam topics, and will enable you to complete the exam in only 100 questions.

  1. CISSP Exam Preparation: Building a Practice of Mapping Threats to Controls
  2. CISSP Exam Preparation: Practicing the CISO Skill Set Using Case-based Learning
  3. CISSP Exam Preparation: Deploying a Security Engineering Practice for the 8 Domains
  4. CISSP Exam Preparation: Applying Cybersecurity Best Practices in Every Domain

As a CISSP you are faced with other organization’s problems from the press and asked how to solve that problem in your organization; this ability will be sharpened in case-based analysis.

We will learn the skill of breaking down a real-world case into problems and solutions. We will place ourselves in the CISO seat for every case. We will learn to write eye-opening statements that enlist the business leaders in business-security situations.

What you'll learn-and how you can apply it

By the end of this live, hands-on, online course, you’ll understand:

  • Process articles via case-based best practices
  • Be able to process 15-20% of all cybersecurity business questions
  • Recognize what a CISSP exam question is asking
  • How to be a true security professional
  • How to manage your organization’s cybersecurity

And you’ll be able to:

  • Avoid cybersecurity technical brute-force traps
  • Build a plan for growing your managerial decision making process
  • Write CISSP case solutions

This training course is for you because...

  • You need the CISSP
  • You need a plan to prepare for CISSP certification
  • You are moving from a security support role to a management position
  • You are a security designer, administrator, or engineer
  • You are maintaining your CPE/CEU’s for your profession
  • You are a Security Consultant, Analyst, Manager or Auditor.

Prerequisites

  • An understanding of (ISC)2‘s CISSP requirements of certification
  • As per CISSP exam requirements:
  • 4-6 years experience in information system security
  • 1-2 years experience in each domain of the CISSP

Recommended follow-up

Common misunderstandings

  • Anecdotal experience of 2-3 exam takers leads exam candidates down the wrong path
  • Many students with 10-20 years of cybersecurity experience fail the exam because they rely on experience.
  • Many people fail the exam and think that past experience with the exam will help them pass the next time.

About your instructor

  • Dean Bushmiller has been teaching the CISSP for 15 years. Dean Bushmiller knows the easiest ways for you to keep the CISSP way of thinking in your head. His life-time instructor approval rating is over 90%. He is a leader of cybersecurity subject matter experts. He has been teaching cybersecurity continuously online since 2007. He has over 1000 hours of recorded cybersecurity training.

    Dean has built CISSP mindmap workbooks since 2010 and hosts a free weekly discussion on cybersecurity topics PDIH Preventing-Deer-In-Headlights which can be found at ExpandingSecurity.com

    He has held the following certifications: CISSP, CFR, CVLP, CEH, ISSMP, CRISC, ISSAP, CCSK, CCSP, Exin Cloud, CHFI, CASP, GSEC, CCNA, MCSE 2K Charter, MCDBA, MCSA, MCP, MCT, CISM, PLCOP, PLA, PLCT, AWR-138-W, Cloud+, CEI, LPIC-1, Security+

    Outlets for his training include: SANS, FED-VTE, Software Engineering Institute - Carnegie Mellon University, (ISC)2, and Expanding Security.

    Though Dean is non-military, he has had the honor to train the U.S. military since 1999. In recognition for outstanding service in the Information Assurance field, he has received 8 mission coins.

Schedule

The timeframes are only estimates and may vary according to how the class is progressing

Day 1 (240 minutes)

  • Presentation: Why you should listen to me (5m)
  • Exercise: Quick navigation of shared content on safari (5m)
  • Shared reading lists
  • Presentation: Case process (10m)
  • CISO thinking is a skill, a struggle, and a practice
  • Rules of participation
  • Roles of participation
  • Question & Answer (5m)
  • Pomodoro-break & prepare for next section (5m)
  • Presentation: How a business problem is broken down the CISSP way (20m)
  • Terms, Knowledge assumptions, Conflicts, Decision makers, Problems, Solutions, Outcomes
  • How this makes you a great CISSP exam taker
  • How this makes you a candidate for CISO
  • Question & Answer (5m)
  • Pomodoro-break & prepare for next section (5m)
  • Presentation: Specific Sample case reading(10m)
  • Activites(15m)
  • Given a case
  • Place it in a domain
  • Find a Glossary
  • Find a NIST-SP or ISO doc

  • Pomodoro-break & prepare for next section (5m)

  • Presentation: Specific Sample Case (10m)
  • Activites(15m)
  • Given a case, Place it, Terms, Knowledge assumptions, Conflicts
  • How voting works & how we narrow the topic
  • Pomodoro-break & prepare for next section (5m)
  • Presentation: Putting yourself in the CISO seat for all cases (10m)
  • You are management; Not the customer, supplier, 3rd party
  • Enlist business to help solve the problem
  • The No, No’s of cases
  • Business, Risk, Outcomes, potential losses
  • Pomodoro-break & prepare for next section (5m)
  • Activites(25m)
  • 3 Sentences
  • Given cases write top Business Problems & Solutions
  • Pomodoro-break & prepare for next section (5m)
  • Activites(25m)
  • Next case all in private chat with correct tags
  • Presentation: Let us improve process (5m)
  • Preparation for Next session (10m)
  • List of domains and subtopics to choose from
  • Choose great 8
  • Download the chosen cases
  • Q&A (5m)

Day 2 (240 minutes)

  • We execute some or all of the activities detailed in section labeled “Activities # 1” below a total of 8 times. Each time we are choosing a different domain or subtopic from the list determined by the students in the polling from Session 1.
  • Presentation: Review of first session (5m)
  • Based upon ranking in session 1
  • Voting
  • Activites(25m) 1 of 8 from session voting 1
  • State background information
  • Post your case problems
  • Vote on top 3 problems - poll
  • Evaluate and critique other problems
  • Solve only top three
  • Pomodoro-break & prepare for next section (5m)
  • Activites(25m) #2
  • Pomodoro-break & prepare for next section (5m)
  • Activites(25m) #3
  • Pomodoro-break & prepare for next section (5m)
  • Activites(25m) #4
  • Pomodoro-break & prepare for next section (10m)
  • Activites(25m) #5
  • Pomodoro-break & prepare for next section (5m)
  • Activites(25m) #6
  • Pomodoro-break & prepare for next section (5m)
  • Activites(25m) #7 (if time allows)
  • Pomodoro-break & prepare for next section (5m)
  • Activites(10m) #8 (if time allows)
  • Q&A (?m)
  • EVALUATION (2m)