Shopping Cart  [0]

Call 800.698.5501

Official (ISC)2 Live Online CISSP Certification Training

CISSP Training Camp
TrainingCamp Twitter Feed

(ISC)² Live Online CISSP

Our Official (ISC)² 5-Day Live Online CISSP Certification Boot Camp is a comprehensive review of information security concepts & industry best practices merged with Training Camp's award-winning comprehensive exam preparation for CISSP.

As the creator of the only Official (ISC)² Exam Prep Boot Camp, our course features exclusive options, such as our Training Camp designed Official (ISC)² Evening Review Sessions, and CISSP Exam Prep Study Guide.

Our CISSP training programs are also offered via classroom locations weekly, with onsite hosted CISSP exam:
Official (ISC)² 6-Day CISSP Certification Boot Camp

Enrollment Information

CISSP Training Pricing View Pricing
CISSP Certification Schedule Course Schedule


Duration: 5 days
Exam Voucher: Included
GI Bill Eligible: ≤ 100% of Fees
GSA Catalog: GS-02F-0044T
ISC2 training partner

Official (ISC)² Training Includes:
  • Official (ISC)² Courseware
  • Official (ISC)² Practice Exam
  • Official (ISC)² CISSP Exam Voucher
  • Official (ISC)² Education Guarantee**

  • Training Camp Exclusive Boot Camp Add-ons:
  • Official (ISC)² CBK Evening Sessions*
  • Official (ISC)² Pre-Exam Review Session*
  • Training Camp Exam Prep Study Guide*
  • Training Camp Pre-Class Prep Kit*

  • *Training Camp Exclusive Feature
    ** Students who are unsuccessful on the exam may retake this program and/or enroll in our mentoring program at no additional cost. Students must complete exam within 60 days of course completion.

    Instructor-Led Boot Camps
    Check out our full listing of Training Camp course programs, offered at nationwide locations.

    Post 9/11 G.I. Bill
    These benefits may cover up to 100% of tuition, courseware, lodging, testing and other training-related costs as well.

    Onsite Group Training
    Training Camp offers Official (ISC)² CISSP training with onsite examination delivery anywhere in the world.

    (ISC)² Exam Voucher Disclaimer/Warning

    (ISC)² and (ISC)² Official Training Providers are the only authorized organizations with the ability to offer exam vouchers for (ISC)² certification exams. Be wary of "unofficial" providers who offer exam vouchers for (ISC)² testing. Since this is the published policy of Pearson Vue and (ISC)², accepting these unapproved purchased exam vouchers can be a violation of (ISC)² Code Of Ethics.

    If you are asked for your employee's Pearson VUE log-in information to purchase exam voucher, this release of Pearson VUE credentials to unauthorized third parties is a violation of (ISC)2 Non-Disclosure Agreement. Violations of the (ISC)² Non-Disclosure Agreement may result in the immediate and permanent termination of your exam result or certification(s).


    Why Choose Training Camp for (ISC)² CISSP Training

    Training Camp has been awarded numerous awards from (ISC)² for over ten years. Our decade-long partnership with (ISC)² demonstrates Training Camp's experience and expertise delivering information security certification training across their full portfolio of certifications.

    CISSP Instructors
    (ISC)² Approved CISSP Certified Instructors

    We utilize Authorized (ISC)² instructors who are Subject Matter Experts well-versed in accelerated learning and exam preparation during our CISSP boot camp. Their delivery accommodates every student's learning needs through individualized instruction, lab partner and group exercises, independent study, self-testing, and question/answer drills.

    This global network of Authorized CISSP instructors are committed to delivering the highest standard in cyber security training. Having a direct link with (ISC)², they help build the value of Official (ISC)² training, and help our students towards CISSP certification.

    CISSP Courseware
    Customized 100% Updated Exam Preparation Study Guide
    *Training Camp Exclusive Feature

    Our award-winning comprehensive exam preparation best practice guide book is designed with extensive work from (ISC)² Instructors, Training Camp Subject Matter Experts, and feedback from the contributions from (ISC)² members.

    Covering the CISSP’s 8 domains, this comprehensive guide book helps to demonstrate concepts, frameworks and real-life scenarios. Mixed with Training Camp's award winning best practices and exam prep techniques, this feature has been used by the world's most experienced practitioners for CISSP certification success.

    CISSP Certification Practice Tests
    Detailed Evening Review & Official (ISC)² Practice Exam
    *Training Camp Exclusive Feature

    Our course includes value-added evening review sessions covering 100% up-to-date materials on the lastest version of the (ISC)² CISSP exam. These CISSP certification exam prep sessions are designed to take the concepts and topics from our course and foucus down the certification requirements.

    We also feature Official (ISC)² practice exams with unique practice questions, covering all of the CISSP domains. These practice exams are only offering with Official (ISC)² training and representative of the actual exam questions from (ISC)².

    CISSP Exam
    Training Camp Pre-Class Prep Kit
    *Training Camp Exclusive Feature

    As a value-add to our CISSP program, we provide the CISSP (ISC)² Official Study Guide 7th Edition ISBN-10:111904271 + CISSP Official ² Practice Tests 1st Edition ISBN-10:1119252288 book for pre-class support. We also provide 90-day access to Training Camp's Pre-Class Self-Paced Videos, to help in your study path.

    What is CISSP?

    The vendor-neutral CISSP certification is the ideal credential for those with proven deep technical and managerial competence, skills, experience, and credibility to design, engineer, implement, and manage their overall information security program to protect organizations from growing sophisticated attacks.

    Is CISSP certification right for me?

    Candidates must have a minimum of 5 years of paid full-time work experience in 2 of the 8 domains of the CISSP CBK, which covers critical topics in security today including risk management, cloud computing, mobile security, application development security, and more. Candidates may receive a one year experience waiver with a 4-year college degree or additional credential from the (ISC)² approved list.

    If you do not meet these requirements, you can still complete the CISSP exam, become an (ISC)² Associate, and continue to work toward completing the experience requirements to become fully certified. The U.S. Department of Defense Directive 8570.1 accepts a vaild (ISC)² Associate in lieu of a CISSP.

    What are the 8 CISSP domains?

    The CISSP draws from a comprehensive, up-to-date, global common body of knowledge that ensures security leaders have a deep knowledge and understanding of new threats, technologies, regulations, standards, and practices. The CISSP exam tests one's competence in the 8 domains of the CISSP CBK, which cover:

    Security and Risk Management
    Asset Security
    Security Engineering
    Communications and Network Security
    Identity and Access Management
    Security Assessment and Testing
    Security Operations
    Software Development Security

    How much salary does a CISSP make?

    Certified IT professionals will remain in high demand from private sector & U.S. government cybersecurity teams. With the experience required to earn CISSP, salaries should be over $100,000 per year as a baseline. According to a recent Washington Post report, 56% of Cyber jobs in contracting industry require CISSP.

    How long is the CISSP exam?

    The CISSP exam is a rigorous exam that includes 250 multiple-choice questions that must be completed within 6 hours.

    How is the CISSP exam graded?

    According to (ISC)², a scaled score is a different way of expressing a candidate’s achieved score in the examination without distorting the meaning of scores. In scaled score reporting, a candidate’s raw score (number of items answered correctly) is converted to a number within a predefined score range. In the case of (ISC)², all raw scores are converted to scaled scores of 0-1000. One needs roughly 700 (70%) or higher to pass the CISSP certification exam.

    Is CISSP training & certification worth the effort?

    Most CISSPs would tell you yes because the CISSP certification is the name hiring managers and others know. It verifies your expertise. Most security experts consider the CISSP “the gold standard of security credentials.”

    CISSP Certification Boot Camp Course Outline

    1. Security and Risk Management
    (e.g., Security, Risk, Compliance, Law, Regulations, Business Continuity)

    • Understand and Apply Concepts of Confidentiality, Integrity, and Availability
    • Apply Security Governance Principles
    • Compliance
    • Understand Legal and Regulatory Issues that Pertain to Information Security in a Global Context
    • Develop and Implement Documented Security Policy, Standards, Procedures, and Guidelines
    • Understand Business Continuity Requirements
    • Contribute to Personnel Security Policies
    • Understand and Apply Risk Management Concepts
    • Understand and Apply Threat Modeling
    • Integrate Security Risk Considerations into Acquisitions Strategy and Practice
    • Establish and Manage Security Education, Training, and Awareness

    2. Asset Security
    (Protecting Security of Assets)

    • Classify Information and Supporting Assets
    • Determine and Maintain Ownership
    • Protect Privacy
    • Ensure Appropriate Retention
    • Determine Data Security Controls
    • Establish Handling Requirements

    3. Security Engineering
    (Engineering and Management of Security)

    • Implement and Manage an Engineering Life Cycle Using Security Design Principles
    • Understand Fundamental Concepts of Security Models
    • Select Controls and Countermeasures Based Upon Information Systems Security Standards
    • Understand the Security Capabilities of Information Systems
    • Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements
    • Assess and Mitigate Vulnerabilities in Web-based Systems
    • Assess and Mitigate Vulnerabilities in Mobile Systems
    • Assess and Mitigate Vulnerabilities in Embedded Devices and Cyber-Physical Systems
    • Apply Cryptography
    • Apply Secure Principles to Site and Facility Design
    • Design and Implement Facility Security

    4. Communications and Network Security
    (Designing and Protecting Network Security)

    • Apply Secure Design Principles to Network Architecture
    • Securing Network Components
    • Design and Establish Secure Communication Channels
    • Prevent or Mitigate Network Attacks

    5. Identity and Access Management
    (Controlling Access and Managing Identity)

    • Control Physical and Logical Access to Assets
    • Manage Identification and Authentication of People and Devices
    • Integrate Identity as a Service (IDaaS)
    • Integrate Third-Party Identity Services
    • Implement and Manage Authorization Mechanisms
    • Prevent or Mitigate Access Control Attacks
    • Manage the Identity and Access Provisioning Life Cycle

    6. Security Assessment and Testing
    (Designing, Performing, and Analyzing Security Testing)

    • Design and Validate Assessment and Test Strategies
    • Conduct Security Control Testing
    • Collect Security Process Data
    • Conduct or Facilitate Internal and Third-Party Audits

    7. Security Operations
    (e.g., Foundational Concepts, Investigations, Incident Management, Disaster Recovery)

    • Understand and Support Investigations
    • Understand Requirements for Investigation Types
    • Conduct Logging and Monitoring Activities
    • Secure the Provisioning of Resources through Configuration Management
    • Understand and Apply Foundational Security Operations Concepts
    • Employ Resource Protection Techniques
    • Conduct Incident Response
    • Operate and Maintain Preventative Measures
    • Implement and Support Patch and Vulnerability Management
    • Participate in and Understand Change Management Processes
    • Implement Recovery Strategies
    • Implement Disaster Recovery Processes
    • Test Disaster Recovery Plan
    • Participate in Business Continuity Planning
    • Implement and Manage Physical Security
    • Participate in Personnel Safety

    8. Software Development Security
    (Understanding, Applying, and Enforcing Software Security)

    • Understand and Apply Security in the Software Development Life Cycle
    • Enforce Security Controls in the Development Environment
    • Assess the Effectiveness of Software Security
    • Assess Software Acquisition Security

    Click here to view our public course schedule and receive an instant price quote.

    (ISC)2 Pearson VUE Exam Disclaimer

    (ISC)2 and (ISC)2 Official Training Providers are the only authorized organizations with the ability to offer exam vouchers for (ISC)2 certification exams. Be wary of "unofficial" providers who ask for your employee's Pearson VUE log-in information; release of Pearson VUE credentials to unauthorized third parties is a violation of (ISC)2 Non-Disclosure Agreement. Violations of the (ISC)2 Non-Disclosure Agreement may result in the immediate and permanent termination of your exam result or certification(s).