Shopping Cart  [0]

Call 800.698.5501

CISSP Certification - Certified Information Systems Security Professional CISSP Training Boot Camp

CISSP Training Camp
TrainingCamp Twitter Feed
CISSP Training

Our 6 Day CISSP Certification Training Camp is the only Official (ISC)² Exam Prep Boot Camp. Our course features exclusive options, such as our Training Camp designed Official (ISC)² Evening Review Sessions, and hosting of the Official (ISC)² CISSP exam at the end of class.

Led by (ISC)² authorized instructors, our CISSP training course provides a comprehensive review of information security concepts and industry best practices, covering the 8 domains of the CISSP CBK, and Training Camp's award-winning comprehensive exam preparation best practices.

In addition to our public course schedule which offers a class almost every week, we can also offer Private Group Training with the Official (ISC)² CISSP exam hosted at any location in the world, with no student minimum number.

CISSP Boot Camp

Duration: 6 days
Exam Voucher: Included
Testing: Delivered On-Site
GI Bill Eligible: ≤ 100% of Fees
GSA Catalog: GS-02F-0044T
CISSP Certification Training Details

  • 6 Days Instruction w/ Onsite Testing
  • 100% Exam Pass Guarantee
  • Training Camp's Exam Preparation Study Guide
  • Additional Self-Paced Video Lectures
  • Official (ISC)² CISSP Study Guide 7th Edition

  • Official (ISC)² CISSP Exam Voucher
  • Official (ISC)² Training Courseware
  • Official (ISC)² Flash Cards
  • Official (ISC)² Practice Exam
  • Official (ISC)² Evening Review

  • CISSP Partner Award Winner
    Having trained and certified over 20,000 CISSPs globally, Training Camp has been awarded numerous awards from (ISC)² for over ten years. Our decade-long partnership with (ISC)² demonstrates Training Camp's experience and expertise delivering information security certification training across their full portfolio of certifications.

    CISSP Certification Leader

    Training Camp is the only approved accelerated training partner for (ISC)². We are held to the highest level of quality assurance for all of our (ISC)² program offerings.

    CISSP Instructors
    (ISC)² Approved CISSP Certified Instructors

    We utilize Authorized (ISC)² instructors who are Subject Matter Experts well-versed in accelerated learning and exam preparation during our CISSP boot camp. Their delivery accommodates every student's learning needs through individualized instruction, lab partner and group exercises, independent study, self-testing, and question/answer drills.

    CISSP Courseware
    Customized 100% Updated Exam Preparation Study Guide
    *Training Camp Exclusive Feature

    Our award-winning comprehensive exam preparation best practice guide book is designed with extensive work from (ISC)² Instructors, Training Camp Subject Matter Experts, and feedback from the contributions from (ISC)² members.

    CISSP Certification Practice Tests
    Detailed Evening Review & Official (ISC)² Practice Exam
    *Training Camp Exclusive Feature

    This zero-distraction, accelerated CISSP boot camp review includes value-added evening review sessions & official (ISC)² practice exams - representative of the actual exam questions from (ISC)², and key to CISSP preparation.

    CISSP Exam
    Hosted Onsite Official CISSP Exam
    *Training Camp Exclusive Feature

    We host the official (ISC)² CISSP exam at the end of the class for our students. These examinations are delivered at our site - with (ISC)² approval - not at 'local' testing centers that are subject to seat availability. Our goal is for students to leave class with CISSP certification.

    CISSP Candidate
    This certification is intended for professionals who have at least 5 years of recent full-time professional work experience in 2 or more of the 8 domains of the CISSP CBK and are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current information security careers.
    Training on your terms.

    Training Camp offers the full spectrum of learning [delivery] options - providing our customers with end-to-end solutions to assist in achieving education goals.

    Instructor-Led Boot Camps
    Check out our full listing of Training Camp course programs, offered at nationwide locations.

    Onsite Training [Worldwide]
    Training Camp offers Official (ISC)² CISSP training with onsite examination delivery anywhere in the world.

    Self-Paced Online
    Learn CISSP at your own pace, at home, on mobile, anywhere you have access to the internet and a web browser.

    CISSP Course Outline

    1. Security and Risk Management
    (e.g., Security, Risk, Compliance, Law, Regulations, Business Continuity)

    • Understand and Apply Concepts of Confidentiality, Integrity, and Availability
    • Apply Security Governance Principles
    • Compliance
    • Understand Legal and Regulatory Issues that Pertain to Information Security in a Global Context
    • Develop and Implement Documented Security Policy, Standards, Procedures, and Guidelines
    • Understand Business Continuity Requirements
    • Contribute to Personnel Security Policies
    • Understand and Apply Risk Management Concepts
    • Understand and Apply Threat Modeling
    • Integrate Security Risk Considerations into Acquisitions Strategy and Practice
    • Establish and Manage Security Education, Training, and Awareness

    2. Asset Security
    (Protecting Security of Assets)

    • Classify Information and Supporting Assets
    • Determine and Maintain Ownership
    • Protect Privacy
    • Ensure Appropriate Retention
    • Determine Data Security Controls
    • Establish Handling Requirements

    3. Security Engineering
    (Engineering and Management of Security)

    • Implement and Manage an Engineering Life Cycle Using Security Design Principles
    • Understand Fundamental Concepts of Security Models
    • Select Controls and Countermeasures Based Upon Information Systems Security Standards
    • Understand the Security Capabilities of Information Systems
    • Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements
    • Assess and Mitigate Vulnerabilities in Web-based Systems
    • Assess and Mitigate Vulnerabilities in Mobile Systems
    • Assess and Mitigate Vulnerabilities in Embedded Devices and Cyber-Physical Systems
    • Apply Cryptography
    • Apply Secure Principles to Site and Facility Design
    • Design and Implement Facility Security

    4. Communications and Network Security
    (Designing and Protecting Network Security)

    • Apply Secure Design Principles to Network Architecture
    • Securing Network Components
    • Design and Establish Secure Communication Channels
    • Prevent or Mitigate Network Attacks

    5. Identity and Access Management
    (Controlling Access and Managing Identity)

    • Control Physical and Logical Access to Assets
    • Manage Identification and Authentication of People and Devices
    • Integrate Identity as a Service (IDaaS)
    • Integrate Third-Party Identity Services
    • Implement and Manage Authorization Mechanisms
    • Prevent or Mitigate Access Control Attacks
    • Manage the Identity and Access Provisioning Life Cycle

    6. Security Assessment and Testing
    (Designing, Performing, and Analyzing Security Testing)

    • Design and Validate Assessment and Test Strategies
    • Conduct Security Control Testing
    • Collect Security Process Data
    • Conduct or Facilitate Internal and Third-Party Audits

    7. Security Operations
    (e.g., Foundational Concepts, Investigations, Incident Management, Disaster Recovery)

    • Understand and Support Investigations
    • Understand Requirements for Investigation Types
    • Conduct Logging and Monitoring Activities
    • Secure the Provisioning of Resources through Configuration Management
    • Understand and Apply Foundational Security Operations Concepts
    • Employ Resource Protection Techniques
    • Conduct Incident Response
    • Operate and Maintain Preventative Measures
    • Implement and Support Patch and Vulnerability Management
    • Participate in and Understand Change Management Processes
    • Implement Recovery Strategies
    • Implement Disaster Recovery Processes
    • Test Disaster Recovery Plan
    • Participate in Business Continuity Planning
    • Implement and Manage Physical Security
    • Participate in Personnel Safety

    8. Software Development Security
    (Understanding, Applying, and Enforcing Software Security)

    • Understand and Apply Security in the Software Development Life Cycle
    • Enforce Security Controls in the Development Environment
    • Assess the Effectiveness of Software Security
    • Assess Software Acquisition Security

    Saturday Review

    • Official Training Camp Value-Add Exam Review
    • Official CISSP Certification Exam (Onsite)

    Click here to view our online course schedule and receive an instant price quote.