Shopping Cart  [0]

Call 800.698.5501

Official (ISC)2 CISSP Certification Training Boot Camp

CISSP Training Camp
TrainingCamp Twitter Feed

Our Official (ISC)² 6-Day CISSP Certification Boot Camp is a comprehensive review of information security concepts & industry best practices merged with Training Camp's award-winning comprehensive exam preparation for CISSP.

As the creator of the only Official (ISC)² Exam Prep Boot Camp, our course features exclusive options, such as our Training Camp designed Official (ISC)² Evening Review Sessions, and Training Camp's Exam Pass Guarantee.

This cybersecurity certification is an elite way to demonstrate your knowledge, advance your career and become a member of a community of cybersecurity leaders. Join the over 40,000 CISSPs that chose Training Camp to pass the industry's premier cybersecurity exam.


CISSP Boot Camp

Duration: 6 days
Exam Voucher: Included
GI Bill Eligible: ≤ 100% of Fees

CISSP Course Options

Hosted CISSP Boot Camp Private Group Class Request
Hosted CISSP Boot Camp Live Online (ISC)² CISSP
Hosperson p Classroom Live (ISC)² CISSP

  • Only Official (ISC)² Exam Prep Boot Camp
  • Take Official CISSP Exam Through Us
  • Free Weekly Online Study Sessions
  • Training Camp Exam Pass Guarantee

  • (ISC)² Training Partner Of The Year
  • Featured on CNN, FOX News, MSNBC, Reuters
  • G.I. Bill Eligible For Up To 100% Of Fees
  • 98% Student Satisfaction Rate



  • Our 15+ year partnership with (ISC)² demonstrates Training Camp's experience and expertise delivering information security certification training across their full portfolio of certifications.

    Our programs feature unique Training Camp exclusive options that give you a comprehensive, accelerated learning program that will give you everything you need to pass the CISSP exam.

    CISSP Instructors (ISC)² Approved CISSP Certified Instructors

    CISSP Instructors Customized 100% Updated Exam Prep Study Guide

    CISSP Instructors Evening Review & Official (ISC)² Practice Exam

    CISSP Instructors Training Camp Pre-Class/Pre-Exam Prep Support

    CISSP Instructors (ISC)² Exam Voucher Disclaimer/Warning

    CISSP Instructors Exam Pass Guarantee














    Is CISSP certification right for me?


    Candidates must have a minimum of 5 years of paid full-time work experience in 2 of the 8 domains of the CISSP CBK, which covers critical topics in security today including risk management, cloud computing, mobile security, application development security, and more. Candidates may receive a one year experience waiver with a 4-year college degree or additional credential from the (ISC)² approved list.


    If you do not meet these requirements, you can still complete the CISSP exam, become an (ISC)² Associate, and continue to work toward completing the experience requirements to become fully certified. The U.S. Department of Defense Directive 8570.1 accepts a vaild (ISC)² Associate in lieu of a CISSP.




    CISSP Certification Boot Camp Course Outline

    1. Security and Risk Management
    (e.g., Security, Risk, Compliance, Law, Regulations, Business Continuity)

    • Understand and Apply Concepts of Confidentiality, Integrity, and Availability
    • Apply Security Governance Principles
    • Compliance
    • Understand Legal and Regulatory Issues that Pertain to Information Security in a Global Context
    • Develop and Implement Documented Security Policy, Standards, Procedures, and Guidelines
    • Understand Business Continuity Requirements
    • Contribute to Personnel Security Policies
    • Understand and Apply Risk Management Concepts
    • Understand and Apply Threat Modeling
    • Integrate Security Risk Considerations into Acquisitions Strategy and Practice
    • Establish and Manage Security Education, Training, and Awareness

    2. Asset Security
    (Protecting Security of Assets)

    • Classify Information and Supporting Assets
    • Determine and Maintain Ownership
    • Protect Privacy
    • Ensure Appropriate Retention
    • Determine Data Security Controls
    • Establish Handling Requirements

    3. Security Engineering
    (Engineering and Management of Security)

    • Implement and Manage an Engineering Life Cycle Using Security Design Principles
    • Understand Fundamental Concepts of Security Models
    • Select Controls and Countermeasures Based Upon Information Systems Security Standards
    • Understand the Security Capabilities of Information Systems
    • Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements
    • Assess and Mitigate Vulnerabilities in Web-based Systems
    • Assess and Mitigate Vulnerabilities in Mobile Systems
    • Assess and Mitigate Vulnerabilities in Embedded Devices and Cyber-Physical Systems
    • Apply Cryptography
    • Apply Secure Principles to Site and Facility Design
    • Design and Implement Facility Security

    4. Communications and Network Security
    (Designing and Protecting Network Security)

    • Apply Secure Design Principles to Network Architecture
    • Securing Network Components
    • Design and Establish Secure Communication Channels
    • Prevent or Mitigate Network Attacks

    5. Identity and Access Management
    (Controlling Access and Managing Identity)

    • Control Physical and Logical Access to Assets
    • Manage Identification and Authentication of People and Devices
    • Integrate Identity as a Service (IDaaS)
    • Integrate Third-Party Identity Services
    • Implement and Manage Authorization Mechanisms
    • Prevent or Mitigate Access Control Attacks
    • Manage the Identity and Access Provisioning Life Cycle

    6. Security Assessment and Testing
    (Designing, Performing, and Analyzing Security Testing)

    • Design and Validate Assessment and Test Strategies
    • Conduct Security Control Testing
    • Collect Security Process Data
    • Conduct or Facilitate Internal and Third-Party Audits

    7. Security Operations
    (e.g., Foundational Concepts, Investigations, Incident Management, Disaster Recovery)

    • Understand and Support Investigations
    • Understand Requirements for Investigation Types
    • Conduct Logging and Monitoring Activities
    • Secure the Provisioning of Resources through Configuration Management
    • Understand and Apply Foundational Security Operations Concepts
    • Employ Resource Protection Techniques
    • Conduct Incident Response
    • Operate and Maintain Preventative Measures
    • Implement and Support Patch and Vulnerability Management
    • Participate in and Understand Change Management Processes
    • Implement Recovery Strategies
    • Implement Disaster Recovery Processes
    • Test Disaster Recovery Plan
    • Participate in Business Continuity Planning
    • Implement and Manage Physical Security
    • Participate in Personnel Safety

    8. Software Development Security
    (Understanding, Applying, and Enforcing Software Security)

    • Understand and Apply Security in the Software Development Life Cycle
    • Enforce Security Controls in the Development Environment
    • Assess the Effectiveness of Software Security
    • Assess Software Acquisition Security

    Saturday Review

    • Official Training Camp Value-Add Exam Review

    Click here to view our public course schedule and receive an instant price quote.