RSS feed logo header graphic
Black Hat USA 2009 One-Day Training Session

July 28

CISSP® Review Seminar

Shon Harris, Logical Security

Register Button


This Logical Security course trains students in all areas of the security Common Body of Knowledge (CBK). They will learn about security policy development, secure software development procedures, network vulnerabilities, attack types and corresponding countermeasures, cryptography concepts and their uses, disaster recovery plans and procedures, risk analysis, crucial laws and regulations, forensics basics, computer crime investigation procedures, physical security, and much, much more. They will explore the contents and concepts that make up the diverse domains and learn how they work together to provide true “in-depth” defense.

The CISSP exam is rigorous, covering ten security domains essential for the protection of information systems, corporations and national infrastructures. Understanding that security is an enterprise wide problem, these domains provide the candidate with a broad understanding of the technical, managerial and human factors that must coordinate effectively to keep information and systems secure. These domains include:

  • Information Security and Risk Management
  • Access Control
  • Cryptography
  • Physical (Environmental) Security
  • Security Architecture and Design
  • Legal, Regulation Compliance, Investigations, and Telecommunications
  • Network Security
  • Business Continuity and Disaster Recovery
  • Application Security
  • Operations Security

1 Day Review Seminar

This 1-Day Review Seminar provides materials from our instructor led classroom training and Shon Harris will conduct the review session that covers topics from all 10 areas of the Common Body of Knowledge.


Shon Harris, CISSP, MCSE, is the president of Logical Security, a security consultant, a former engineer in the Air Force’s Information Warfare unit, an instructor and an author. She has authored two best selling CISSP books, was a contributing author to the book, Hacker’s Challenge, and a contributing author to the book Gray Hat Hacking. Shon has taught computer and information security to a wide range of clients, some of which have included RSA, Department of Defense, Department of Energy, National Security Agency (NSA), Bank of America, Defense Information Systems Agency (DISA), BMC, and many more.

Shon consults for several Fortune 500 companies in the U.S. Her competencies range from setting up risk management programs and developing enterprise security architectures to constructing enterprise-wide security programs that connects security and business needs in a synergist manner.

Additionally, Shon writes security articles for Information Security Magazine and Windows 2000 Magazine and other leading industry journals. She recently published the fourth edition of her first book and brought to market an innovative consulting and training model in 2008.

Shon was recognized as one of the top 25 women in the Information Security field by Information Security Magazine.

Register Button
Super Early:
Ends Mar 15
Ends May 1

Ends Jul 1

Ends Jul 22







Black Hat Webcasts

Black Hat Social

About Black Hat | Privacy Policy | Sponsorship Inquiry | DEFCON | Black Hat Main RSS Feed