(ISC)² Exam Vouchers
(ISC)² and (ISC)² Official Training Providers are the only authorized organizations with the ability to offer exam vouchers for
(ISC)² certification exams. Be wary of "unofficial" providers who ask for your employee's Pearson VUE log-in information; release
of Pearson VUE credentials to unauthorized third parties is a violation of (ISC)2 Non-Disclosure Agreement. Violations of the (ISC)² Non-Disclosure
Agreement may result in the immediate and permanent termination of your exam result or certification(s).
Why Choose Training Camp for (ISC)² CISSP Training
Training Camp has been
awarded numerous awards from (ISC)² for over ten years. Our decade-long
partnership with (ISC)² demonstrates Training Camp's experience and expertise
delivering information security certification training across their full portfolio
of certifications. Training Camp is also the only partner that is blessed to offer the exam onsite
as part of your (ISC)2 Official Training experience.
(ISC)² Approved CISSP Certified Instructors
We utilize Authorized (ISC)² instructors who are Subject Matter Experts well-versed
in accelerated learning and exam preparation during our CISSP boot camp. Their delivery
accommodates every student's learning needs through individualized instruction,
lab partner and group exercises, independent study, self-testing, and question/answer
This global network of Authorized CISSP instructors are committed to delivering the highest standard in cyber security training. Having a direct link with (ISC)²,
they help build the value of Official
(ISC)² training, and help our students towards CISSP certification.
Customized 100% Updated Exam Preparation
*Training Camp Exclusive Feature
Our award-winning comprehensive exam preparation best practice guide book is designed with extensive work from (ISC)² Instructors, Training
Camp Subject Matter Experts, and feedback from the contributions from (ISC)²
Covering the CISSP’s 8 domains, this comprehensive guide book helps to demonstrate concepts, frameworks and real-life scenarios.
Mixed with Training Camp's award winning best practices and exam prep techniques, this feature has been used by the world's most experienced practitioners for CISSP certification success.
Detailed Evening Review & Official (ISC)² Practice Exam
*Training Camp Exclusive Feature
Our course includes value-added evening
review sessions covering 100% up-to-date materials on the lastest version of the (ISC)² CISSP exam. These CISSP certification exam prep sessions are designed
to take the concepts and topics from our course and foucus down the certification requirements.
We also feature Official (ISC)² practice exams with unique practice questions, covering all of the CISSP domains. These practice exams are
only offering with Official (ISC)² training and representative of the actual
exam questions from (ISC)².
Hosted Onsite Official CISSP Exam
*Training Camp Exclusive Feature
We host the official (ISC)² CISSP exam at the end of the class for our students.
These examinations are delivered at our site - with (ISC)² approval - not at
'local' testing centers that are subject to seat availability.
With our Official (ISC)² Pre-Exam Review Session, prior to the hosted onsite exam, you will be ready to take on the CISSP exam. Our goal
is for students to leave class with CISSP certification.
What is CISSP?
The vendor-neutral CISSP certification is the ideal credential for those with proven deep technical and managerial competence, skills, experience, and credibility to design, engineer, implement,
and manage their overall information security program to protect organizations from growing sophisticated attacks.
Is CISSP Certification Right For Me?
Candidates must have a minimum of 5 years of paid full-time work experience in 2 of the 8 domains of the CISSP CBK, which covers
critical topics in security today
including risk management, cloud computing, mobile security, application development security, and more.
Candidates may receive a one year experience waiver with a 4-year college degree or additional credential from the
(ISC)² approved list.
If you do not meet these requirements, you can still complete the CISSP exam, become an (ISC)² Associate, and continue to work toward
completing the experience requirements to become fully certified. The U.S.
Department of Defense Directive 8570.1 accepts a vaild (ISC)² Associate in lieu of a CISSP.
What Are The CISSP Domains
The CISSP draws from a comprehensive, up-to-date, global common body of knowledge that ensures security leaders have a deep knowledge and understanding of new threats, technologies, regulations,
standards, and practices. The CISSP exam tests one's competence in the 8 domains of the CISSP CBK, which cover:
Security and Risk Management
Communications and Network Security
Identity and Access Management
Security Assessment and Testing
Software Development Security
How Make Salary Does A CISSP Make?
Certified IT professionals will remain in high
demand from private sector & U.S. government cybersecurity teams. With the experience required to earn CISSP, salaries should be over $100,000 per year as a baseline.
CISSP Certification Boot Camp Course Outline
1. Security and Risk Management
(e.g., Security, Risk, Compliance, Law, Regulations,
- Understand and Apply Concepts of Confidentiality, Integrity, and Availability
- Apply Security Governance Principles
- Understand Legal and Regulatory Issues that Pertain to Information Security in a
- Develop and Implement Documented Security Policy, Standards, Procedures, and Guidelines
- Understand Business Continuity Requirements
- Contribute to Personnel Security Policies
- Understand and Apply Risk Management Concepts
- Understand and Apply Threat Modeling
- Integrate Security Risk Considerations into Acquisitions Strategy and Practice
- Establish and Manage Security Education, Training, and Awareness
2. Asset Security
(Protecting Security of Assets)
- Classify Information and Supporting Assets
- Determine and Maintain Ownership
- Protect Privacy
- Ensure Appropriate Retention
- Determine Data Security Controls
- Establish Handling Requirements
3. Security Engineering
(Engineering and Management of Security)
- Implement and Manage an Engineering Life Cycle Using Security Design Principles
- Understand Fundamental Concepts of Security Models
- Select Controls and Countermeasures Based Upon Information Systems Security Standards
- Understand the Security Capabilities of Information Systems
- Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and
- Assess and Mitigate Vulnerabilities in Web-based Systems
- Assess and Mitigate Vulnerabilities in Mobile Systems
- Assess and Mitigate Vulnerabilities in Embedded Devices and Cyber-Physical Systems
- Apply Cryptography
- Apply Secure Principles to Site and Facility Design
- Design and Implement Facility Security
4. Communications and Network Security
(Designing and Protecting Network Security)
- Apply Secure Design Principles to Network Architecture
- Securing Network Components
- Design and Establish Secure Communication Channels
- Prevent or Mitigate Network Attacks
5. Identity and Access Management
(Controlling Access and Managing Identity)
- Control Physical and Logical Access to Assets
- Manage Identification and Authentication of People and Devices
- Integrate Identity as a Service (IDaaS)
- Integrate Third-Party Identity Services
- Implement and Manage Authorization Mechanisms
- Prevent or Mitigate Access Control Attacks
- Manage the Identity and Access Provisioning Life Cycle
6. Security Assessment and Testing
(Designing, Performing, and Analyzing Security Testing)
- Design and Validate Assessment and Test Strategies
- Conduct Security Control Testing
- Collect Security Process Data
- Conduct or Facilitate Internal and Third-Party Audits
7. Security Operations
(e.g., Foundational Concepts, Investigations, Incident Management, Disaster Recovery)
- Understand and Support Investigations
- Understand Requirements for Investigation Types
- Conduct Logging and Monitoring Activities
- Secure the Provisioning of Resources through Configuration Management
- Understand and Apply Foundational Security Operations Concepts
- Employ Resource Protection Techniques
- Conduct Incident Response
- Operate and Maintain Preventative Measures
- Implement and Support Patch and Vulnerability Management
- Participate in and Understand Change Management Processes
- Implement Recovery Strategies
- Implement Disaster Recovery Processes
- Test Disaster Recovery Plan
- Participate in Business Continuity Planning
- Implement and Manage Physical Security
- Participate in Personnel Safety
8. Software Development Security
(Understanding, Applying, and Enforcing Software Security)
- Understand and Apply Security in the Software Development Life Cycle
- Enforce Security Controls in the Development Environment
- Assess the Effectiveness of Software Security
- Assess Software Acquisition Security
- Official Training Camp Value-Add Exam Review
- Official CISSP Certification Exam (Onsite)
Click here to view our public course schedule and receive an instant price
(ISC)2 Pearson VUE Exam Disclaimer
(ISC)2 and (ISC)2 Official Training Providers are the only authorized organizations
with the ability to offer exam vouchers for (ISC)2 certification exams. Be wary
of "unofficial" providers who ask for your employee's Pearson VUE log-in information;
release of Pearson VUE credentials to unauthorized third parties is a violation
of (ISC)2 Non-Disclosure Agreement. Violations of the (ISC)2 Non-Disclosure Agreement
may result in the immediate and permanent termination of your exam result or certification(s).