CISSP Boot Camp: Domains 3 and 4

Build expertise in Security Architecture and Engineering and Communication and Network Security with this targeted CISSP boot camp. Prepare for the CISSP certification exam and develop the technical and strategic skills essential to becoming a Certified Information Systems Security Professional.

4.7
(8,400)
55,000 Students
13.5+ Hours
Stage 4 - Advanced

Last update: May 2024

Audio Language: English

Subtitles/Captions: Yes

Type of Training: Online, self-paced

Focus: CISSP Training Courses, ISC2 Training Courses, Certification Courses, Cyber Security Certification Courses, Cyber Security Courses, Cyber Security Compliance Training Courses

Caption Language: English

CISSP Boot Camp Domains 3 and 4 Featured Image

What You’ll Learn

This CISSP Boot Camp: Domains 3 and 4 will teach you:

  • Security architecture: Apply design principles, technical security controls, and defense-in-depth models.
  • Software development security: Learn secure SDLC, DevSecOps, and software security controls.
  • Access management: Implement identity and access management, including logical access authentication.
  • Security engineering: Analyze hardware architecture, virtualization, IOT, and physical site planning.
  • Cryptography: Understand symmetric, asymmetric, hashing, and quantum cryptography.
  • Network security: Explore network security identity, Wi-Fi, Bluetooth, and routing protocols.
  • Communication security: Secure data across protocols, firewalls, modems, and VPNs.
  • CISSP exam readiness: Practice with quizzes, real-world examples, and 60 practice exams questions.

Included in the CISSP Boot Camp

13.5 Hours of On-Demand Video

7 Downloadable Resources

2 Homework Assignments

Access on Mobile

Certificate of Completion

Suitable for the Following Careers

Security Engineer

Security Consultant

Information Security Analyst

Network Security Architect

CISSP Certified Professional

Security Manager

Chief Information Security Officer

Security Operations Lead

Course Content

Introduction

icon-yt Introduction Preview

Other practical information.

icon-yt Tips and tricks Preview
icon-yt Download your free study guides Preview
icon-yt General CISSP links Preview

CISSP Domain 3: Security Architecture and Engineering

icon-yt Domain 3 - What we will be covering Preview
icon-yt Security models and concepts - Introduction Preview
icon-yt Security models and concepts - Part 1 Preview
icon-yt Security models and concepts- Part 2 Preview
icon-yt Security evaluation models Preview
icon-yt Secure design principles Preview
icon-yt Secure system design concepts Preview
icon-yt Quiz 1: Security evaluation models. Secure design principles. Secure system design conce Preview
icon-yt New 2024 - Managing the information system lifecycle Preview
icon-yt New 2024 - SASE - Secure Access Service Edge Preview
icon-yt Hardware architecture- Part 1 Preview
icon-yt Hardware architecture- Part 2 Preview
icon-yt Hardware architecture - Part 3 Preview
icon-yt Secure operating systems and software architecture Preview
icon-yt Quiz 2: Hardware architecture. Secure operating systems and software architecture. Preview
icon-yt Virtualization, Cloud, and Distributed Computing- Part 1 Preview
icon-yt Virtualization, Cloud, and Distributed Computing- Part 2 Preview
icon-yt Virtualization, Cloud, and Distributed Computing- Part 3 Preview
icon-yt Virtualization, Cloud, and Distributed Computing - Part 4 Preview
icon-yt Virtualization, Cloud, and Distributed Computing - Part 5 Preview
icon-yt IOT (Internet Of Things) Preview
icon-yt Quiz 3: Virtualization, Cloud, and Distributed Computing IOT (Internet Of Things). Preview
icon-yt Emanations and Covert Channels Preview
icon-yt Quiz 4: Emanations and Covert Channels Preview
icon-yt Malware- Part 1 Preview
icon-yt Malware- Part 2 Preview
icon-yt Web architecture and attacks Preview
icon-yt Quiz 5: Malware. Web architecture and attacks. Preview
icon-yt Database security Preview
icon-yt Mobile device security Preview
icon-yt Industrial Control Systems Preview
icon-yt Quiz 6: Database security. Mobile device security. Industrial Control Systems. Preview
icon-yt Introduction to Cryptography- Part 1 Preview
icon-yt Introduction to Cryptography- Part 2 Preview
icon-yt The history of Cryptography- Part 1 Preview
icon-yt The history of Cryptography- Part 2 Preview
icon-yt Quiz 7: Introduction to Cryptography / History Preview
icon-yt The encryption we use today Preview
icon-yt Symmetric encryption- Part 1 Preview
icon-yt Symmetric encryption- Part 2 Preview
icon-yt Quiz 8: Symmetric encryption Preview
icon-yt Asymmetric encryption- Part 1 Preview
icon-yt Asymmetric encryption- Part 2 Preview
icon-yt Quiz 9: Asymmetric encryption Preview
icon-yt Hashing- Part 1 Preview
icon-yt Hashing- Part 2 Preview
icon-yt New 2024 - Quantum Cryptography and Key Distribution Preview
icon-yt Attacks on our cryptography- Part 1 Preview
icon-yt Attacks on our cryptography- Part 2 Preview
icon-yt Attacks on our cryptography- Part 3 Preview
icon-yt Digital signatures Preview
icon-yt Quiz 10: Hashing, Attacks on our cryptography, Digital signatures. Preview
icon-yt MAC, HMAC, SSL, and TLS Preview
icon-yt IPSec and PGP Preview
icon-yt Quiz 11: MAC, HMAC, SSL, and TLS. IPSec and PGP. Preview
icon-yt Physical security- Part 1 Preview
icon-yt Physical security- Part 2 Preview
icon-yt Physical security- Part 3 Preview
icon-yt Physical security- Part 4 Preview
icon-yt Physical security- Part 5 Preview
icon-yt Physical security- Part 6 Preview
icon-yt Physical Security Preview
icon-yt Site selection- Part 1 Preview
icon-yt Site selection- Part 2 Preview
icon-yt Quiz 12: Physical security - Site selection Preview
icon-yt Media storage Preview
icon-yt Asset tracking and hardware hardening Preview
icon-yt Quiz 13: Media storage. Asset tracking and hardware hardening. Preview
icon-yt Electricity Preview
icon-yt Quiz 14: Electricity. Preview
icon-yt Fire suppression and hot and cold aisles Preview
icon-yt Heat, Flame, Particle, and Smoke Detectors Preview
icon-yt Fire suppression- Part 1 Preview
icon-yt Fire suppression- Part 2 Preview
icon-yt Quiz 15: Fire suppression & hot and cold aisles. Fire suppression. Heat, Flame, Particle Preview
icon-yt Personnel safety. Preview
icon-yt Quiz 16: Personnel safety. Preview
icon-yt Domain 3 - What we covered Preview
icon-yt (Bonus) Domain 3 - 30 practice questions. Preview
icon-yt Domain 3 Links Preview

CISSP Domain 4: Communications and Network Security

Section 5: Bonus lectures.

Audio Version of the Training

OPEN FULL CURRICULUM

Requirements

Basic knowledge of IT infrastructure and cybersecurity

Familiarity with core risk management and access management principles

A degree or equivalent experience (as outlined in CISSP certification requirements)

Description of CISSP Boot Camp: Domains 3 and 4

This training boot camp focuses on Domains 3 and 4 of the CISSP CBK—Security Architecture and Engineering and Communication and Network Security. You’ll explore the technical foundations every systems security professional (CISSP) needs to defend assets, analyze threats, and engineer secure systems at scale.

Through real-world case studies and guided walkthroughs, you’ll master concepts like availability security governance policies, access management physical, security assessment, and network communication layers from OSI to TCP/IP. This comprehensive boot camp equips you with the cybersecurity skills and knowledge needed for exam success, without relying on gimmicks like an exam pass guarantee.

  • Apply software development security practices across application environments
  • Evaluate security architecture using industry-standard models and frameworks
  • Implement effective security strategies across network layers and communication channels
  • Understand operational controls and report test outputs internal for audit readiness
  • Prepare for the CISSP exam using professionally designed training materials
  • Plan a path toward certification with insights on exam voucher use, scheduling, and CISSP exam cost

Whether you’re managing risk, building secure networks, or leading incident response, this CISSP training gives you everything you need to succeed.

Who Is This Course For

This course is ideal for mid- to senior-level security professionals, security leaders, and CISSP holders looking to reinforce their foundation in Domains 3 and 4. It’s also perfect for those pursuing one of the most in demand cybersecurity certifications to elevate their career and secure high-level career opportunities.

Course Instructor

Thor Pedersen

Thor Pedersen is an IT, Cyber Security, and Project Management instructor who teaches both online and in person through his training company, Thor Teaches. He has helped many people achieve their goals and pass certifications. Thor's CISSP courses are the highest rated, with over 20,000 students and 2,600 reviews.

Thor holds multiple certifications, including CISSP, PMP, CEH, SCP, CompTIA Security+, CCNA/CCNP Routing & Switching, CCNA Security, CCENT, and 4011 INFOSEC Professional. He has a passion for learning and is always expanding his training offerings.

Thor is dedicated to helping students succeed and encourages questions and feedback through the course Q&A page or direct messages. His approach to teaching is fueled by a love of IT and continuous growth in the field.

Read More

Read Less

Testimonials

Anonymous

Rita P.

The Domain 3 and 4 content was spot-on. It connected theory to real scenarios in security operations and gave me the confidence to sit for the CISSP examination. The instructor’s breakdown of network protocols was incredibly helpful.

Anonymous

Marco S.

As someone without a four year college degree, I appreciated how this course explained everything in accessible terms. The focus on architecture and communication gave me a stronger foundation and opened up real career opportunities in cybersecurity.

Anonymous

Kiana D.

This boot camp is exactly what CISSP certified professionals recommend. It covered engineering and network security concepts I hadn't fully understood before. I’d recommend it to all security analysts preparing for the next level.

Show More

Show Less

Frequently Asked Questions

Students Who Took This Course Also Liked

Guarantee Your Cyber Security Career with the StationX Master’s Program!

Get real work experience and a job guarantee in the StationX Master’s Program. Dive into tailored training, mentorship, and community support that accelerates your career.

  • Job Guarantee & Real Work Experience: Launch your cybersecurity career with guaranteed placement and hands-on experience within our Master’s Program.
  • 30,000+ Courses and Labs: Hands-on, comprehensive training covering all the skills you need to excel in any role in the field.
  • Pass Certification Exams: Resources and exam simulations that help you succeed with confidence.
  • Mentorship and Career Coaching: Personalized advice, resume help, and interview coaching to boost your career.
  • Community Access: Engage with a thriving community of peers and professionals for ongoing support.
  • Advanced Training for Real-World Skills: Courses and simulations designed for real job scenarios.
  • Exclusive Events and Networking: Join events and exclusive networking opportunities to expand your connections.

TAKE THE NEXT STEP IN YOUR CAREER TODAY!

>

StationX Accelerator Pro

Enter your name and email below, and we’ll swiftly get you all the exciting details about our exclusive StationX Accelerator Pro Program. Stay tuned for more!

StationX Accelerator Premium

Enter your name and email below, and we’ll swiftly get you all the exciting details about our exclusive StationX Accelerator Premium Program. Stay tuned for more!

StationX Master's Program

Enter your name and email below, and we’ll swiftly get you all the exciting details about our exclusive StationX Master’s Program. Stay tuned for more!