Shopping Cart  [0]

Call 800.698.5501

ISSAP Certification - Information Systems Security Architecture Professional (ISSAP)Boot Camp - Training Camp

ISSAP Certification Training
TrainingCamp Twitter Feed
ISSAP Certification Training

Our 5-day (ISC)² ISSAP Boot Camp is designed for CISSPs who specialize in designing security solutions and providing management with risk-based guidance to meet organizational needs. This concentration is fundamentally the consultative and analytical process of information security.

During this course you will take the following Official (ISC)² exam onsite during the class, validating that you have the skills and knowledge:

    Questions: 125; Time: 3 Hours

To qualify for the CISSP-ISSAP certification, you must have at least two years of cumulative paid, full-time professional work experience in the area of architecture, maintain your CISSP credential in good standing, and pass the ISSAP examination.


Duration: 5 days (8AM to 8PM)
Exam Vouchers: Included
Testing: Delivered On-Site
GSA Catalog: GS-02F-0044T
ISSAP Certification Training Details

  • 5 Days Hands-On Instruction
  • Official ISSAP Courseware
  • Proprietary Exam Preparation Study Guide
  • Authorized (ISC)² Instructors
  • Comprehensive Online Self-Study Materials
  • 100% Up-to-Date Exam Prep

  • ISSAP Exam Voucher - Included
  • Exam Delivered - Day 5
  • 100% Certification Guarantee
  • Extensive Architecture Review
  • Official ISSAP Practice Tests
  • Hotel/Travel Options Available

  • ISSAP Certification Training Leader

    Having trained and certified over 20,000 CISSPs globally, Training Camp has been named as “Highest Performing Affiliate of the Year” by (ISC)². Our decade-long partnership with (ISC)² demonstrates Training Camp's experience and expertise delivering information security certification training across their full portfolio of certifications.

    As the creator of the only Official ISSAP Boot Camp Program, our goal is to get established professionals the knowledge needed for ISSAP certification success.

    ISSAP Courseware
    Customized 100% Updated Official (ISC)² Courseware

    Courseware designed from the extensive work from (ISC)² Instructors, Training Camp Subject Matter Experts, and feedback from the contributions from (ISC)² members.

    ISSAP Instructors
    (ISC)² Approved ISSAP Certified Instructors

    We utilize Authorized (ISC)² instructors who are Subject Matter Experts well-versed in accelerated learning and exam preparation during our ISSAP Boot Camp. Their delivery accommodates every student's learning needs through individualized instruction, lab partner and group exercises, independent study, self-testing, and question/answer drills.

    FExam Practice Tests
    Detailed Evening Review & Official (ISC)² Practice Exam

    This zero-distraction, accelerated ISSAP boot camp review includes value-added evening review sessions & official (ISC)² practice exams - representative of the actual exam questions from (ISC)², and key to ISSAP preparation.

    ISSAP Exam
    Hosted Onsite Official ISSAP Exam

    We host the official (ISC)² ISSAP exam at the end of the class for our students. These examinations are delivered at our site - with (ISC)² approval - not at 'local' testing centers that are subject to seat availability. This is a perk of being a student with the leading Official (ISC)² Training Provider. Our goal is for students to leave class with ISSAP certification.

    ISSAP Candidate
    CISSP®-ISSAP® requires a candidate to demonstrate two years of professional experience in the area of architecture and is an appropriate credential for Chief Security Architects and Analysts who may typically work as independent consultants or in similar capacities.

    The architect plays a key role within the information security department with responsibilities that functionally fit between the C-suite and upper managerial level and the implementation of the security program. The candidate would generally develop, design, or analyze the overall security plan. Although this role may typically be tied closely to technology, it may be fundamentally closer to the consultative and analytical process of information security.

    Training on your terms.

    Training Camp offers the full spectrum of learning [delivery] options - providing our customers with end-to-end solutions to assist in achieving education goals.

    Instructor-Led Boot Camps Our most popular courses are offered regularly as public training camps. These in-person classes feature hands-on training led by certified instructors. With public course dates in classroom locations around the world, we have many options for you to choose from.

    Private Events [Worldwide]
    Sometimes the best option is to bring teams together for private, instructor-led courses at a location most convenient to you. Programs can employ either off-the-shelf or customized curriculum. Mobile testing for onsite examination delivery is offered as an option for most classes.

    Self-Paced Online
    We can deliver all aspects of our online training to your employees over an LAN or through a private labeled portal via the web. We can set up a custom LMS system for one employee or thousands of employees; our solution is truly built custom for your requirements.

    ISSAP Certification Course Outline

    Domain 1: Security Architecture Analysis

    • Module 1: Approach to Security Architecture
    • Module 2: Conducting the Requirements Analysis
    • Module 3: Designing the Security Model
    • Module 4: Conduct Design Verification and Validation

    Domain 2: Communication and Network Security

    • Module 1: The Communication Architecture
    • Module 2: The Network Architecture
    • Module 3: Protecting the Communications and Networks
    • Module 4: Security Design Considerations and Associated Risks

    Domain 3: Physical Security Considerations

    • Module 1: Assessing the Physical Security Requirements
    • Module 2: Integration of Physical Products and Systems
    • Module 3: Solution Evaluation

    Domain 4: Cryptography

    • Module 1: Cryptography Requirements
    • Module 2: Design Considerations and Constraints
    • Module 3: Key Management Life Cycle
    • Module 4: Integrated Solutions
    • Module 5: Identity System Integration

    Domain 5: Technology-Related Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)

    • Module 1: Business Impact Analysis (BIA) Requirements
    • Module 2: What are the Strategies for Availability and Recovery?
    • Module 3: Designing the Continuity Recovery Solution

    Domain 6: Access Control Systems and Methodology

    • Module 1: Access Control Key Concepts, Methodologies, and Techniques
    • Module 2: Architecture of Identity and Access Management