Shopping Cart  [0]

Call 800.698.5501

CISSP Certification - Certified Information Systems Security Professional CISSP Training Boot Camp

CISSP Training Camp
TrainingCamp Twitter Feed
CISSP Training

Our Official 6 Day CISSP Certification Training Camp is the first and only official (ISC)² boot camp course that gets you certified before you leave. Our program always delivers the most up-to-date, authorized content and is backed by our certification guarantee.

The Six (6) Day CISSP Training Camp gets you trained, certified, and back to work with the skills necessary to protect your organizations from hackers, attackers, and security threats. Our program includes an exam voucher and delivery at our facility's testing center on the last day of class.

In addition to our public course schedule which offers a class almost every week, we offer a private, on-site version of the course which includes mobile testing and an (ISC)² proctor at a customer location.


CISSP Boot Camp

Duration: 6 days (8AM to 8PM)
Exam Voucher: Included
Testing: Delivered On-Site
GI Bill Eligible: ≤ 100% of Fees
GSA Catalog: GS-02F-0044T
CISSP Certification Training Details

  • 6 Days Instruction w/ Onsite Testing
  • Official (ISC)² v13 Courseware Guidebook
  • Proprietary Exam Preparation Courseware
  • Authorized (ISC)² Instructors
  • Comprehensive Online Self-Study Materials
  • Official CISSP Practice Tests

  • CISSP Exam Voucher - Included
  • Exam Delivered - Day 6
  • Time Limit - 6 Hours
  • Questions - 250
  • Passing Score - 700
  • Maintenance - 120 CPEs (3yr)


  • CISSP Partner Award Winner
    Having trained and certified over 20,000 CISSPs globally, Training Camp has been named as “Highest Performing Affiliate of the Year” by (ISC)². Our decade-long partnership with (ISC)² demonstrates Training Camp's experience and expertise delivering information security certification training across their full portfolio of certifications.

    CISSP Certification Leader

    Training Camp is the only approved accelerated training partner for (ISC)². We are held to the highest level of quality assurance for all of our (ISC)² program offerings.


    CISSP Courseware
    Customized 100% Updated Official (ISC)² v13 Courseware

    Courseware designed from the extensive work from (ISC)² Instructors, Training Camp Subject Matter Experts, and feedback from the contributions from (ISC)² members.

    CISSP Instructors
    (ISC)² Approved CISSP Certified Instructors

    We utilize Authorized (ISC)² instructors who are Subject Matter Experts well-versed in accelerated learning and exam preparation during our CISSP boot camp. Their delivery accommodates every student's learning needs through individualized instruction, lab partner and group exercises, independent study, self-testing, and question/answer drills.


    CISSP Certification Practice Tests
    Detailed Evening Review & Official (ISC)² Practice Exam

    This zero-distraction, accelerated CISSP boot camp review includes value-added evening review sessions & official (ISC)² practice exams - representative of the actual exam questions from (ISC)².


    CISSP Exam
    Hosted Onsite Official CISSP Exam

    We host the official (ISC)² CISSP exam at the end of the class for our students. These examinations are delivered at our site - with (ISC)² approval - not at 'local' testing centers that are subject to seat availability. This is a perk of being a student with the leading Official (ISC)² Training Provider.


    CISSP Candidate
    If you plan to build a career in information security, then this credential should be your next career goal. It is the credential for professionals who develop policies and procedures in information security. A CISSP is an information assurance professional who defines the architecture, design, management and/or controls that assure the security of business environments.

    CISSP Domains
    10 Domains of CBK

    CISSP Course Outline

    Domain 1: Access Control

    • Module 1: Introduction to Access Control
    • Module 2: Access Control Key Concepts, Methodologies, and Techniques
    • Module 3: System Logging and Monitoring
    • Module 4: Access Control Attacks and Threats
    • Module 5: Access Control Effectiveness
    • Module 6: Identify and Access Provisioning Lifecycle
    • Official Training Camp Value-Add Exam Review

    Domain 2: Telecommunications and Network Security

    • Module 1: Introduction to Telecommunications and Network Security
    • Module 2: Network Models and System Architecture
    • Module 3: The Network and IT Security
    • Module 4: Understanding the Attack
    • Module 5: Tools and Tasks in Network Security
    • Module 6: Layer 1: Physical Layer
    • Module 7: Layer 2: Data-link  Layer
    • Module 8: Layer 3: Network Layer
    • Module 9: Layer 4: Transport Layer
    • Module 10: Layer 5: Session Layer
    • Module 11: Layer 6: Presentation Layer
    • Module 12: Layer 7: Application Layer
    • Official Training Camp Value-Add Exam Review

    Domain 3: Information Security Governance and Risk Management

    • Module 1: Introduction to Information Security Governance and Risk Management
    • Module 2: Information Security Governance
    • Module 3: The Risk Management Process
    • Module 4: Ethical Considerations in Information Security
    • Official Training Camp Value-Add Exam Review

    Domain 4: Software development Security

    • Module 1: System Life Cycle Security
    • Module 2: Systems Development Methodologies
    • Module 3: Security Issues with Programming Languages
    • Module 4: Assessing the Effectiveness of Software Security
    • Module 5: Security Controls
    • Module 6: Database Security
    • Module 7: Application and Database Security Issues
    • Official Training Camp Value-Add Exam Review

    Domain 5: Cryptography

    • Module 1: Key Concepts and Common Terminology Used in Cryptography
    • Module 2: Historical Aspect of Cryptography
    • Module 3: Uses of Cryptography
    • Module 4: The Cryptographic Life Cycle
    • Module 5: Methods of Cryptography
    • Module 6: The Different Encryption Systems
    • Module 7: Algorithm Concepts
    • Module 8: Methods of Cryptanalytic Attacks
    • Module 9: Maintaining Network Security
    • Module 10: Maintaining Application Security
    • Module 11: Information Hiding Alternatives
    • Official Training Camp Value-Add Exam Review

    Domain 6: Security Architecture and Design

    • Module 1: Key Concepts and Definitions
    • Module 2: Types of Security Models
    • Module 3: Components of an Architecture
    • Module 4: Basic Principles of System Design
    • Module 5: Evaluation Models of Information Systems
    • Module 6: Common Security Frameworks
    • Module 7: Vulnerabilities and Threats
    • Official Training Camp Value-Add Exam Review

    Domain 7: Security Operations

    • Module 1: Security Concepts and Activities
    • Module 2: Protection of Resources
    • Module 3: Preventive Measures
    • Module 4: Change Management and Configuration Management
    • Module 5: System Resilience and Fault Tolerance Requirements 
    • Official Training Camp Value-Add Exam Review

    Domain 8: Business Continuity and Disaster Recovery Planning

    • Module 1: Processes Required for Planning the Project
    • Module 2: Defining the Organization
    • Module 3: Plan Implementation 
    • Official Training Camp Value-Add Exam Review

    Domain 9: Legal, regulations, Investigations, and Compliance

    • Module 1: The Major Legal Systems in Information Security
    • Module 2: International Law in Information Security
    • Module 3: Supporting the Investigation
    • Module 4: The Forensic Investigation
    • Module 5: Hardware/Embedded Device Analysis
    • Module 6: Compliance Processes and Procedures
    • Module 7: Ensure Security in Contractual Agreements and Procurement Processes 
    • Official Training Camp Value-Add Exam Review

    Domain 10: Physical (Environmental) Security

    • Module 1: Definitions and Key Concepts
    • Module 2: Site and Facility Design Considerations
    • Module 3: Implementation and Operation of Perimeter Security
    • Module 4: Implementation and Operation of Internal Security
    • Module 5: Implementation and Operation of Facilities Security
    • Module 6: Equipment Protection
    • Module 7: Personnel Privacy and Safety
    • Official Training Camp Value-Add Exam Review

    Click here to view our online course schedule and receive an instant price quote.