Having trained and certified over 20,000 CISSPs globally, Training Camp has been
named as “Highest Performing Affiliate of the Year” by (ISC)². Our decade-long partnership
with (ISC)² demonstrates Training Camp's experience and expertise delivering information
security certification training across their full portfolio of certifications.
As the creator of the only Official ISSAP Boot Camp Program, our goal is to get
established professionals the knowledge needed for ISSAP certification success.
Customized 100% Updated Official (ISC)² Courseware
Courseware designed from the extensive work from (ISC)² Instructors, Training Camp
Subject Matter Experts, and feedback from the contributions from (ISC)² members.
(ISC)² Approved ISSAP Certified Instructors
We utilize Authorized (ISC)² instructors who are Subject Matter Experts well-versed
in accelerated learning and exam preparation during our ISSAP Boot Camp. Their delivery
accommodates every student's learning needs through individualized instruction,
lab partner and group exercises, independent study, self-testing, and question/answer
Detailed Evening Review & Official (ISC)² Practice Exam
This zero-distraction, accelerated ISSAP boot camp review includes value-added evening
review sessions & official (ISC)² practice exams - representative of the actual
exam questions from (ISC)², and key to ISSAP preparation.
Hosted Onsite Official ISSAP Exam
We host the official (ISC)² ISSAP exam at the end of the class for our students.
These examinations are delivered at our site - with (ISC)² approval - not at 'local'
testing centers that are subject to seat availability. This is a perk of being a
student with the leading Official (ISC)² Training Provider. Our goal is for students
to leave class with ISSAP certification.
CISSP®-ISSAP® requires a candidate to demonstrate two years of professional experience
in the area of architecture and is an appropriate credential for Chief Security
Architects and Analysts who may typically work as independent consultants or in
The architect plays a key role within the information security
department with responsibilities that functionally fit between the C-suite and upper
managerial level and the implementation of the security program. The candidate would
generally develop, design, or analyze the overall security plan. Although this role
may typically be tied closely to technology, it may be fundamentally closer to the
consultative and analytical process of information security.
Training Camp offers the full spectrum of learning [delivery] options - providing
our customers with end-to-end solutions to assist in achieving education goals.
Domain 1: Security Architecture Analysis
- Module 1: Approach to Security Architecture
- Module 2: Conducting the Requirements Analysis
- Module 3: Designing the Security Model
- Module 4: Conduct Design Verification and Validation
Domain 2: Communication and Network Security
- Module 1: The Communication Architecture
- Module 2: The Network Architecture
- Module 3: Protecting the Communications and Networks
- Module 4: Security Design Considerations and Associated Risks
Domain 3: Physical Security Considerations
- Module 1: Assessing the Physical Security Requirements
- Module 2: Integration of Physical Products and Systems
- Module 3: Solution Evaluation
Domain 4: Cryptography
- Module 1: Cryptography Requirements
- Module 2: Design Considerations and Constraints
- Module 3: Key Management Life Cycle
- Module 4: Integrated Solutions
- Module 5: Identity System Integration
Domain 5: Technology-Related Business Continuity Planning (BCP) and Disaster Recovery
- Module 1: Business Impact Analysis (BIA) Requirements
- Module 2: What are the Strategies for Availability and Recovery?
- Module 3: Designing the Continuity Recovery Solution
Domain 6: Access Control Systems and Methodology
- Module 1: Access Control Key Concepts, Methodologies, and Techniques
- Module 2: Architecture of Identity and Access Management