Shopping Cart  [0]

Call 800.698.5501

CISSP Certification - Certified Information Systems Security Professional CISSP Training Boot Camp

CISSP Training Camp
TrainingCamp Twitter Feed
CISSP Training

Our Official 6 Day CISSP Certification Training Camp is the first and only official (ISC)² boot camp course that gets you certified before you leave. Our program always delivers the most up-to-date, authorized content and is backed by our certification guarantee.

The Six (6) Day CISSP Training Camp gets you trained, certified, and back to work with the skills necessary to protect your organizations from hackers, attackers, and security threats. Our program includes an exam voucher and delivery at our facility's testing center on the last day of class.

In addition to our public course schedule which offers a class almost every week, we offer a private, on-site version of the course which includes mobile testing and an (ISC)² proctor at a customer location.


CISSP Boot Camp

Duration: 6 days (8AM to 8PM)
Exam Voucher: Included
Testing: Delivered On-Site
GI Bill Eligible: ≤ 100% of Fees
GSA Catalog: GS-02F-0044T
CISSP Certification Training Details

  • 6 Days Instruction w/ Onsite Testing
  • Official (ISC)² v13 Courseware Guidebook
  • Proprietary Exam Preparation Courseware
  • Authorized (ISC)² Instructors
  • Comprehensive Online Self-Study Materials
  • 100% Up-to-Date Exam Prep

  • CISSP Exam Voucher - Included
  • Exam Delivered - Day 6
  • 100% Certification Guarantee
  • G.I. Bill Approved
  • Official CISSP Practice Tests
  • Hotel/Travel Options Available


  • CISSP Partner Award Winner
    Having trained and certified over 20,000 CISSPs globally, Training Camp has been named as “Highest Performing Affiliate of the Year” by (ISC)². Our decade-long partnership with (ISC)² demonstrates Training Camp's experience and expertise delivering information security certification training across their full portfolio of certifications.

    CISSP Certification Leader

    Training Camp is the only approved accelerated training partner for (ISC)². We are held to the highest level of quality assurance for all of our (ISC)² program offerings.


    CISSP Courseware
    Customized 100% Updated Official (ISC)² v13 Courseware

    Courseware designed from the extensive work from (ISC)² Instructors, Training Camp Subject Matter Experts, and feedback from the contributions from (ISC)² members.

    CISSP Instructors
    (ISC)² Approved CISSP Certified Instructors

    We utilize Authorized (ISC)² instructors who are Subject Matter Experts well-versed in accelerated learning and exam preparation during our CISSP boot camp. Their delivery accommodates every student's learning needs through individualized instruction, lab partner and group exercises, independent study, self-testing, and question/answer drills.


    CISSP Certification Practice Tests
    Detailed Evening Review & Official (ISC)² Practice Exam

    This zero-distraction, accelerated CISSP boot camp review includes value-added evening review sessions & official (ISC)² practice exams - representative of the actual exam questions from (ISC)², and key to CISSP preparation.


    CISSP Exam
    Hosted Onsite Official CISSP Exam

    We host the official (ISC)² CISSP exam at the end of the class for our students. These examinations are delivered at our site - with (ISC)² approval - not at 'local' testing centers that are subject to seat availability. This is a perk of being a student with the leading Official (ISC)² Training Provider. Our goal is for students to leave class with CISSP certification.


    CISSP Candidate
    If you plan to build a career in information security, then this credential should be your next career goal. It is the credential for professionals who develop policies and procedures in information security. The Certified Information Systems Security Professional certification is an information assurance professional who defines the architecture, design, management and/or controls that assure the security of business environments.

    Effective April 15, 2015, the CISSP exam will be based on a new exam blueprint and all Official 6 Day CISSP Certification Training Camps will reflect this change.
    Training on your terms.

    Training Camp offers the full spectrum of learning [delivery] options - providing our customers with end-to-end solutions to assist in achieving education goals.


    Instructor-Led Boot Camps Our most popular courses are offered regularly as public training camps. These in-person classes feature hands-on training led by certified instructors. With public course dates in classroom locations around the world, we have many options for you to choose from.


    Onsite Training [Worldwide]
    Sometimes the best option is to bring teams together for private, instructor-led courses at a location most convenient to you. Training Camp offers our Official CISSP training with mobile testing for onsite examination delivery anywhere in the world, a Training Camp only option.


    Self-Paced Online
    This new online platform gives you the entire CISSP curriculum at your fingertips in a format that was designed has been built from the ground up in a training format where you can learn at your own pace, at home, on mobile, anywhere you have access to the internet and a web browser.



    CISSP Course Outline

    1. Security and Risk Management
    (e.g., Security, Risk, Compliance, Law, Regulations, Business Continuity)

    • Understand and Apply Concepts of Confidentiality, Integrity, and Availability
    • Apply Security Governance Principles
    • Compliance
    • Understand Legal and Regulatory Issues that Pertain to Information Security in a Global Context
    • Develop and Implement Documented Security Policy, Standards, Procedures, and Guidelines
    • Understand Business Continuity Requirements
    • Contribute to Personnel Security Policies
    • Understand and Apply Risk Management Concepts
    • Understand and Apply Threat Modeling
    • Integrate Security Risk Considerations into Acquisitions Strategy and Practice
    • Establish and Manage Security Education, Training, and Awareness

    2. Asset Security
    (Protecting Security of Assets)

    • Classify Information and Supporting Assets
    • Determine and Maintain Ownership
    • Protect Privacy
    • Ensure Appropriate Retention
    • Determine Data Security Controls
    • Establish Handling Requirements

    3. Security Engineering
    (Engineering and Management of Security)

    • Implement and Manage an Engineering Life Cycle Using Security Design Principles
    • Understand Fundamental Concepts of Security Models
    • Select Controls and Countermeasures Based Upon Information Systems Security Standards
    • Understand the Security Capabilities of Information Systems
    • Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements
    • Assess and Mitigate Vulnerabilities in Web-based Systems
    • Assess and Mitigate Vulnerabilities in Mobile Systems
    • Assess and Mitigate Vulnerabilities in Embedded Devices and Cyber-Physical Systems
    • Apply Cryptography
    • Apply Secure Principles to Site and Facility Design
    • Design and Implement Facility Security

    4. Communications and Network Security
    (Designing and Protecting Network Security)

    • Apply Secure Design Principles to Network Architecture
    • Securing Network Components
    • Design and Establish Secure Communication Channels
    • Prevent or Mitigate Network Attacks

    5. Identity and Access Management
    (Controlling Access and Managing Identity)

    • Control Physical and Logical Access to Assets
    • Manage Identification and Authentication of People and Devices
    • Integrate Identity as a Service (IDaaS)
    • Integrate Third-Party Identity Services
    • Implement and Manage Authorization Mechanisms
    • Prevent or Mitigate Access Control Attacks
    • Manage the Identity and Access Provisioning Life Cycle

    6. Security Assessment and Testing
    (Designing, Performing, and Analyzing Security Testing)

    • Design and Validate Assessment and Test Strategies
    • Conduct Security Control Testing
    • Collect Security Process Data
    • Conduct or Facilitate Internal and Third-Party Audits

    7. Security Operations
    (e.g., Foundational Concepts, Investigations, Incident Management, Disaster Recovery)

    • Understand and Support Investigations
    • Understand Requirements for Investigation Types
    • Conduct Logging and Monitoring Activities
    • Secure the Provisioning of Resources through Configuration Management
    • Understand and Apply Foundational Security Operations Concepts
    • Employ Resource Protection Techniques
    • Conduct Incident Response
    • Operate and Maintain Preventative Measures
    • Implement and Support Patch and Vulnerability Management
    • Participate in and Understand Change Management Processes
    • Implement Recovery Strategies
    • Implement Disaster Recovery Processes
    • Test Disaster Recovery Plan
    • Participate in Business Continuity Planning
    • Implement and Manage Physical Security
    • Participate in Personnel Safety

    8. Software Development Security
    (Understanding, Applying, and Enforcing Software Security)

    • Understand and Apply Security in the Software Development Life Cycle
    • Enforce Security Controls in the Development Environment
    • Assess the Effectiveness of Software Security
    • Assess Software Acquisition Security

    Saturday Review

    • Official Training Camp Value-Add Exam Review
    • Official CISSP Certification Exam (Onsite)

    Click here to view our online course schedule and receive an instant price quote.