CISSP Boot Camp: Domains 7 and 8

Master Security Operations and Software Development Security in this targeted CISSP boot camp. Aligned with the CISSP certification exam and April 2024 updates, this course gives you the depth and clarity needed to lead with confidence in two of the most technical CISSP domains.

4.7
(5,000)
43,000 Students
8+ Hours
Stage 4 - Advanced

Last update: May 2024

Audio Language: English

Subtitles/Captions: Yes

Type of Training: Online, self-paced

Focus: CISSP Training Courses, ISC2 Training Courses, Certification Courses, Cyber Security Certification Courses, Cyber Security Courses, Cyber Security Compliance Training Courses

Caption Language: English

CISSP Boot Camp: Domains 7 and 8

What You’ll Learn

This CISSP Boot Camp: Domains 7 and 8 will teach you:

  • Security operations: Manage backups, disaster recovery, and incident management.
  • Intrusion detection and prevention: Understand IDS/IPS, SIEM, SOAR, and honeypots.
  • Software development security: Implement secure SDLC, DevSecOps, and the OWASP Top 10.
  • Access and identity management: Secure systems using logical access authentication and controls.
  • Digital forensics: Apply techniques to analyze software security, disk, and network evidence.
  • Configuration and patch management: Monitor systems and reduce risk management confidentiality gaps.
  • Secure code analysis: Use SCA tools, understand code maturity models, and reporting test outputs internally.
  • CISSP exam prep: Review with quizzes, practice exams, and real-world test strategy.

Included in the CISSP Boot Camp

8 Hours of On-Demand Video

8+ Downloadable Resources

2 Homework Assignments

Access on Mobile

Certificate of Completion

Suitable for the Following Careers

Security Operations Manager

Software Security Engineer

Information Security Analyst

CISSP Certified Professional

Chief Information Security Officer

Security Consultant

Secure Software Architect

Cybersecurity Risk Manager

Course Content

Introduction

icon-yt Introduction Preview
icon-yt Introduction to this course! Preview
icon-yt Download your free study guides Preview
icon-yt General CISSP links Preview

CISSP Domain 7: Security Operations

icon-yt Domain 7 - What we will be covering Preview
icon-yt Domain 7 key concepts Preview
icon-yt Administrative personnel controls Preview
icon-yt Quiz 1: Administrative personnel controls. Preview
icon-yt Digital forensics Preview
icon-yt Spinning disk forensics Preview
icon-yt Network and Software forensics Preview
icon-yt Quiz 2: Digital forensics. Spinning disk forensics. Network and Software forensics. Preview
icon-yt Incident Management definitions Preview
icon-yt Incident Management - part 1 Preview
icon-yt Incident Management - part 2 Preview
icon-yt Quiz 3: Incident Management Preview
icon-yt Intrusion detection and prevention systems Preview
icon-yt Quiz 4: Intrusion detection and prevention systems. Preview
icon-yt SIEM and SOAR systems Preview
icon-yt Quiz 5: SIEM and SOAR systems Preview
icon-yt Application positive-listing Preview
icon-yt Honeynets and Honeypots Preview
icon-yt Quiz 6: Application positive listing. Honeynets and Honeypots Preview
icon-yt Configuration Management Preview
icon-yt Patch Management Preview
icon-yt Change management Preview
icon-yt 0-day attacks Preview
icon-yt Quiz 7: Configuration Management. Patch Management. Change management. 0-day attacks Preview
icon-yt Backups Preview
icon-yt RAID (Redundant Array of Independent Disks) Preview
icon-yt Redundancy Preview
icon-yt Quiz 8: Redundancy. Backups. RAID (Redundant Array of Independent Disks). Preview
icon-yt BCP and DRP - Part 1 Preview
icon-yt BCP and DRP - Part 2 Preview
icon-yt Warfare, terrorism, sabotage, and ransomware Preview
icon-yt Personnel Preview
icon-yt DRP basics Preview
icon-yt Developing our BCP and DRP Preview
icon-yt BIA (Business Impact Analysis) Preview
icon-yt Quiz 9: BCP and DRP. BIA (Business Impact Analysis). Preview
icon-yt Supply and infrastructure redundancy Preview
icon-yt Quiz 10: Supply and infrastructure redundancy. Preview
icon-yt Disaster Recovery sites Preview
icon-yt Other BCP sub plans Preview
icon-yt Employee redundancy Preview
icon-yt Testing the Plans - Part 1 Preview
icon-yt Testing the Plans - Part 2 Preview
icon-yt After a disruption Preview
icon-yt Quiz 11: DR sites. Employee redundancy. Testing the Plans. After a disruption Preview
icon-yt What we covered in Domain 7 Preview
icon-yt Practice Test 1: Domain 7 - 30 practice questions Preview
icon-yt Domain 7 links Preview

CISSP Domain 8: Software Development Security

icon-yt Domain 8 - What we will be covering Preview
icon-yt Designing security into our software Preview
icon-yt Programming Concepts - Part 1 Preview
icon-yt Programming Concepts - Part 2 Preview
icon-yt Quiz 12: Designing security into our software. Programming Concepts Preview
icon-yt Software development methodologies part 1 Preview
icon-yt Software development methodologies part 2 Preview
icon-yt Software development methodologies part 3 Preview
icon-yt Software development methodologies part 4 Preview
icon-yt DevOps and DevSecOps Preview
icon-yt Quiz 13: Software development methodologies DevOps and DevSecOps. Preview
icon-yt NEW 2024 SAFe - Scaled Agile Frameworks Preview
icon-yt Databases - part 1 Preview
icon-yt Databases - part 2 Preview
icon-yt Databases - part 3 Preview
icon-yt Databases - part 4 Preview
icon-yt Quiz 14: Databases Preview
icon-yt OWASP 2021 - part 1 Preview
icon-yt OWASP 2021 - part 2 Preview
icon-yt OWASP 2021 - part 3 Preview
icon-yt OWASP 2021 - part 4 Preview
icon-yt Quiz 15: OWASP Preview
icon-yt Software vulnerabilities and Attacks Preview
icon-yt Quiz 16: Software vulnerabilities and Attacks. Preview
icon-yt Maturity Models - Part 1 Preview
icon-yt Maturity Models - Part 2 Preview
icon-yt Quiz 17: Maturity Models Preview
icon-yt Buying software from other companies Preview
icon-yt Quiz 18: Buying software from other companies. Preview
icon-yt NEW 2024 SCA - Software Composition Analysis Preview
icon-yt Artificial intelligence (AI) Preview
icon-yt Quiz 19: Artificial intelligence (AI). Preview
icon-yt What we covered in Domain 8 Preview
icon-yt Practice Test 2: Domain 8 - 30 practice questions Preview
icon-yt Domain 8 links Preview

Other practical information.

Bonus lecture

Audio Version of the Training

OPEN FULL CURRICULUM

Requirements

Working knowledge of IT systems, networks, or secure development

Readiness to pass the CISSP certification and understand training materials

Interest in security strategies, SDLC, and security assessmenterstand training materials

Description of CISSP Boot Camp: Domains 7 and 8

Covering Domains 7 and 8 of the CISSP CBK, this course focuses on the operational and developmental disciplines of cyber security. Whether you're handling security operations or leading software development security initiatives, this training boot camp delivers actionable insight into what it takes to become a Certified Information Systems Security Professional.

Learn from proven frameworks, real-world examples, and a curriculum designed to meet CISSP certification requirements. You’ll explore technical security controls, BCP/DRP practices, secure coding standards, and emerging tools like Software Composition Analysis and Scaled Agile (SAFe). This course aligns with infosec’s industry leading approach to CISSP training and is packed with content to support your exam success.

  • Gain the knowledge needed to pass the CISSP exam with confidence
  • Evaluate software security risks, secure APIs, and prevent vulnerabilities
  • Apply operational controls analyze for audit readiness and compliance
  • Align skills to in-demand cyber security certifications for leadership roles
  • Understand access management security assessment techniques in development environments

This comprehensive boot camp is built for professionals ready to lead in cybersecurity, offering critical skills in security architecture, asset security, and network security while preparing you across all eight domains for the CISSP examination. Along the way, you'll gain insight into CISSP exam cost, strategies for managing risk, and best practices for enforcing security policies—all without relying on an exam pass guarantee to achieve real career opportunities.

Who Is This Course For

This course is designed for security professionals, engineers, developers, and aspiring CISSP holders seeking mastery in Domains 7 and 8. Ideal for those managing secure development environments, overseeing operations, or preparing for one of the most in-demand certifications in the cyber security industry.

Course Instructor

Thor Pedersen

Thor Pedersen is an IT, Cyber Security, and Project Management instructor who teaches both online and in person through his training company, Thor Teaches. He has helped many people achieve their goals and pass certifications. Thor's CISSP courses are the highest rated, with over 20,000 students and 2,600 reviews.

Thor holds multiple certifications, including CISSP, PMP, CEH, SCP, CompTIA Security+, CCNA/CCNP Routing & Switching, CCNA Security, CCENT, and 4011 INFOSEC Professional. He has a passion for learning and is always expanding his training offerings.

Thor is dedicated to helping students succeed and encourages questions and feedback through the course Q&A page or direct messages. His approach to teaching is fueled by a love of IT and continuous growth in the field.

Read More

Read Less

Testimonials

Anonymous

Mark T.

These courses are invaluable. This series gave me everything I needed to become CISSP certified.

Anonymous

Shelley M.

Great course to finish off the set. Thank you Thor!

Anonymous

Daniel K.

As one of the newer security analysts on my team, I needed a course that would boost my confidence and reinforce my practical knowledge. This boot camp connected theory with real operations work—exactly what I needed.

Show More

Show Less

Frequently Asked Questions

Students Who Took This Course Also Liked

Guarantee Your Cyber Security Career with the StationX Master’s Program!

Get real work experience and a job guarantee in the StationX Master’s Program. Dive into tailored training, mentorship, and community support that accelerates your career.

  • Job Guarantee & Real Work Experience: Launch your cybersecurity career with guaranteed placement and hands-on experience within our Master’s Program.
  • 30,000+ Courses and Labs: Hands-on, comprehensive training covering all the skills you need to excel in any role in the field.
  • Pass Certification Exams: Resources and exam simulations that help you succeed with confidence.
  • Mentorship and Career Coaching: Personalized advice, resume help, and interview coaching to boost your career.
  • Community Access: Engage with a thriving community of peers and professionals for ongoing support.
  • Advanced Training for Real-World Skills: Courses and simulations designed for real job scenarios.
  • Exclusive Events and Networking: Join events and exclusive networking opportunities to expand your connections.

TAKE THE NEXT STEP IN YOUR CAREER TODAY!

>

StationX Accelerator Pro

Enter your name and email below, and we’ll swiftly get you all the exciting details about our exclusive StationX Accelerator Pro Program. Stay tuned for more!

StationX Accelerator Premium

Enter your name and email below, and we’ll swiftly get you all the exciting details about our exclusive StationX Accelerator Premium Program. Stay tuned for more!

StationX Master's Program

Enter your name and email below, and we’ll swiftly get you all the exciting details about our exclusive StationX Master’s Program. Stay tuned for more!