merger merger

Welcome to your new course portal!

On October 15th, moved to - which means you can now find all your favourite courses right here. Don't worry - you can still do all the things that you could do before.

All you need to do is search.

Show as: Mobile

Information Security Bootcamp

ACI Learning
Course summary
5 days
Abuja, London, Paris
Professional Training

Information Security Bootcamp

Information Security Bootcamp

Preparation for Common Body of Knowledge and ISC2 CISSP exam

This class is primarily aimed at helping Information Security Practitioners prepare for the CISSP CBK exam. In addition, the class is extremely useful for anyone preparing for CISM, CISA, or other formal exams in Information Security or IT Controls. It is also relevant to audit staff who validate and verify their core IT systems and any risk-related personnel who rely on IT for maintaining their corporate and customer systems.

Increasing reports of targeted hacker attacks. Data leakage in all directions. Viruses, worms, and other forms of computer crime. Heightened attention to corporate governance. Today’s organizations are under increasing pressure to ensure the effectiveness of their information security efforts while using virtualization and cloud computing and as a result, information security has become a priority business issue. Yet in spite of their far-reaching strategic business implications, security threats and vulnerabilities are still often misunderstood and underestimated by line and IT management. To further add to the confusion, this vital function is often viewed mostly as a technology issue.

In this intense information-packed five-day seminar, attendees will cover all aspects of the ISC2 Common Body of Knowledge (CBK) in conjunction with evaluating methods and tools required for essential elements needed to construct or audit a comprehensive information security framework. You will gain a business-oriented, architectural perspective that defines how to organize and oversee a risk-based enterprise information security program, blending both theories and best management practices with key physical and information technology safeguards. We will cover Security and Risk Management; Asset Security; Security Engineering; Communications and Network Security; Identity and Access Management; Security Assessment and Testing; Security Operations; and Software Development Security.

To ensure that you gain proper familiarity with industry best practices, legislation, and professional standards for information security, key references and yardsticks for the material you will learn include but are not limited to: ISC2 Common Body of Knowledge (CBK), ISO-27001/27002, Payment Card Industry Data Security Standard (PCI DSS), Common Criteria, Information Technology Infrastructure Library (ITIL), and a wide array of IT and security-related publications from the Internet Engineering Task Force (IETF), Institute of Electrical and Electronics Engineers (IEEE), Federal Financial Institutions Examination Council (FFIEC), US National Institute of Standards and Technology (NIST), Defense Information Systems Agency (DISA), US National Security Agency (NSA), and leading IT suppliers.

To reinforce what you learn in the course and to aid anyone preparing for prominent information security certification examinations, you will be provided with unit and course review exercises. Come prepared for five days of intensive learning and return to your office with the foundation of knowledge and know-how needed to take the CISSP exam (or similar) but even more importantly, to help guide your organization as it develops or revises its information security program.

Suitability - Who should attend?

Information Security and IT Managers; Information Security Analysts, Security Architects, Security Administrators; System Administrators, Network Administrators, IT Auditors; Consultants; Compliance Managers; and anyone needing a “crash course” in information security concepts and practices.

Training Course Content

  • Session 1: Security and Risk Management
  • Session 2: Laws and Standards Affecting Information Security and IT Audit
  • Session 3: Security Engineering - Security Models, Mechanisms and Architectures
  • Session 4: Network Security Concepts and Solutions
  • Session 5: Cryptography
  • Session 6: Identity Management / Access Controls
  • Session 7: Software Development and Application Security
  • Session 8: Asset Security (including Physical, Human Resources and Environment)
  • Session 9: Availability (Data Recovery and Business Continuity Planning)
  • Session 10: Wrap-up Discussion (Also includes continuous unit and course review exercises.)

Provider: ACI Learning

ACI Learning

ACI Learning

At ACI Learning, we train leaders in Cybersecurity, Audit, and Information Technology. Whether you're starting your IT career, mastering your profession, or developing your team, we're with you every step of the way. We believe that training is not a...

Read more and show all courses with this provider

Request information - obligation free

Fill out your details to find out more about Information Security Bootcamp.

  Contact the provider

  Get more information

  Register your interest

Customer Outreach Award


We believe that it should be easy for you to find and compare training courses. 

Our Customer Outreach Award is presented to trusted providers who are excellent at responding to enquiries, making your search quicker, more efficient and easier, too.

Contact information for ACI Learning

ACI Learning

MIS Training Institute
30 Crown Place
EC2A 4EB London

 Show phone number

Request Information

Find out more about this Information Security Bootcamp course - simply fill out your details:


There are no reviews available yet.

Not sure where to start?
U.K. L&D Report: 2019 - Benchmark Your Workplace Learning Strategy

Are you curious about the L&D strategies of some of the U.K.'s top companies?

Find out what they're up to in's second annual U.K. L&D Report!


Learn more

Similar Courses