Site Logo

Hello, you are using an old browser that's unsafe and no longer supported. Please consider updating your browser to a newer version, or downloading a modern browser.

(ISC)² Official CISSP Certification Boot Camp

Duration

6 Days

Official (ISC)² CISSP Exam Prep Boot Camp

(ISC)² Training Partner of the Year

(ISC)² CISSP Exam Pass Guaranteed

Our Official (ISC)² CISSP Certification Boot Camp is a comprehensive review of Cyber security & industry best practices merged with Training Camp’s award-winning comprehensive exam preparation for the rigorous CISSP adaptive exam.

Our CISSP Boot Camp represents the culmination of hundreds of hours of instructional design, thousands of hours of exam-focused instruction, and tens of thousands of efficiently and effectively skilled, certified students.

Upon completion of the course, students are offered to attend (as many times as desired) our ongoing live, online full-day exam preparation review sessions prior to taking the examination. We are so confident in our course, we offer the industry’s best “CISSP Free-Retake Guarantee.”

Public CISSP Course Schedule

Our customers understand that developing a well-trained team is a critical investment toward success. We are proud to offer a wide range of courses aimed at getting our customers skilled, certified, and back to work fast.

Click to View

CISSP Team Training

Our enterprise team can create a CISSP training solution that best fits your organization’s specific requirements. We can accommodate courses for as few as five to as many as thousands of team members spread across the globe.

Learn More

If you are an experienced, high-achieving information security professional, involved in designing, developing and managing the overall security posture of an organization, from cybersecurity strategy to hands-on implementation, the CISSP is the right choice for you.

The CISSP is ideal for experienced security practitioners, managers and executives interested in proving their knowledge across a wide array of security practices and principles

  • Manage security and risk
  • Secure assets
  • Design security framework
  • Secure communication and networks
  • Securely develop software

Upon completion of the course, students are offered to attend (as many times as desired) our ongoing live, online full-day exam preparation review sessions prior to taking the examination. We are so confident in our course, we offer the industry’s best “CISSP Free-Retake Guarantee.”

In our experience, students that are not stressed with the financial burden of having to potentially pay for a second exam are much more likely to pass the CISSP exam on the first try.

Unofficial training providers may say they include the exam voucher, but this is neither true nor ethical. (ISC)² and (ISC)² Official Training Providers, such as Training Camp are the only authorized organizations with the ability to offer vouchers for our exams. Unauthorized companies do not have the access required to purchase CISSP exam vouchers. An authorized organization will never ask for a candidate’s Pearson VUE credentials.

Make sure you or your employees do not provide them to an unauthorized company. This puts them at risk and violates the terms of the (ISC)² Non Disclosure Agreement, which could result in losing their (ISC)² certification, being suspended indefinitely from retaking the exam, and losing the money you’ve paid for the exam. This warning is shown clearly when enrolling for any CISSP exam date. By going through official channels for exam vouchers, they – and your organization – eliminate these risks

Back to Tabs

Our program combines (ISC)² Official CISSP Courseware and our (ISC)² CISSP courseware, which keeps immediate pace with advancements in exam content by incorporating feedback from our thousands of (ISC)² certified alumni students. They are reviewed every 30 days to ensure all information reflects the most current updates. Relying on traditional CISSP books or externally sourced materials do not offer this advantage.

Exam: CISSP
Length of exam: 4 hours –
Number of items: 125 – 175
Item format: Multiple choice and advanced innovative items
Passing grade: 700 out of 1000 points

Beginning June 1, 2022, the CISSP exam in the Computerized Adaptive Testing (CAT) format will contain 50 pretest (unscored) items, which will increase the minimum and maximum number of items you will need to respond to from 100-150 to 125-175 items during your exam. To allow for these additional items, the maximum exam administration time will increase from three to four hours.

We utilize Authorized (ISC)² instructors who are Subject Matter Experts well-versed in accelerated learning and exam preparation during our CISSP boot camp. Their delivery accommodates every student’s learning needs through individualized instruction, lab partner and group exercises, independent study, self-testing, and question/answer drills.

Our accelerated (ISC)² CISSP training includes next-gen educational content covered in value-added evening review sessions with updated practice exam review drills – representative of the actual exam and lab sim questions delivered during your official (ISC)² CISSP certification exam.

Upon completion of the course, students are offered to attend (as many times as desired) our ongoing live, online full-day exam preparation review sessions prior to taking the examination. We are so confident in our course, we offer the industry’s best guarantee.

Our exam support team will help you get ready for your CISSP certification training. From exam registration, to understanding all the steps needed for certification, they will answer any questions you make have to make sure you are building momentum towards CISSP certification success.

It is very important to stay up to date in this industry. CEUs are required to keep your certifications current. If you want to maintain your professional certified status, we are here to help keep your certifications current.

Back to Tabs

SECURITY AND RISK MANAGEMENT

•Understand, adhere to, and promote professional ethics
•Understand and apply security concepts
•Evaluate and apply security governance principles
•Determine compliance and other requirements
•Understand legal and regulatory issues that pertain to information security in a holistic context
•Understand requirements for investigation types (i.e., administrative, criminal, civil, regulatory, industry standards)
•Develop, document, and implement security policy, standards, procedures, and guidelines
•Identify, analyze, and prioritize Business Continuity (BC) requirements
•Contribute to and enforce personnel security policies and procedures
•Understand and apply risk management concepts
•Understand and apply threat modeling concepts and methodologies
•Apply Supply Chain Risk Management (SCRM) concepts
•Establish and maintain a security awareness, education, and training program

Activity: National and Regional Examples.

ASSET SECURITY

•Identify and classify information and assets
•Establish information and asset handling requirements
•Provision resources securely
•Manage data lifecycle
•Ensure appropriate asset retention (e.g., End-of-Life (EOL), End-of-Support (EOS))
•Determine data security controls and compliance requirements

Discussion: Information Asset Inventory

SECURITY ARCHITECTURE AND ENGINEERING

•Research, implement and manage engineering processes using secure design principles
•Understand the fundamental concepts of security models (e.g., Biba, Star Model, Bell-LaPadula)
•Select controls based upon systems security requirements
•Understand security capabilities of Information Systems (IS) (e.g., memory protection, Trusted Platform Module (TPM), encryption/decryption)
•Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements
•Select and determine cryptographic solutions
•Understand methods of cryptanalytic attacks
•Apply security principles to site and facility design
•Design site and facility security controls

Discussion: Industrial Control Systems.
Activity: Understanding the Workings of a Certificate
Activity: Management Checklist for Cryptographic Health and Readiness

COMMUNICATION AND NETWORK SECURITY

•Assess and implement secure design principles in network architectures
•Secure network components
•Implement secure communication channels according to design

Activity: NAC Implementations
Discussion: Remote Access

IDENTITY AND ACCESS MANAGEMENT (IAM)

•Control physical and logical access to assets
•Manage identification and authentication of people, devices, and services
•Federated identity with a third-party service
•Implement and manage authorization mechanisms
•Manage the identity and access provisioning lifecycle
•Implement authentication systems

Activity: Federated Identity Management
Discussion: OAuth vs. OpenID Connect

SECURITY ASSESSMENT AND TESTING

•Design and validate assessment, test, and audit strategies
•Conduct security control testing
•Collect security process data (e.g., technical and administrative)
•Analyze test output and generate report
•Conduct or facilitate security audits

Discussion:Ethical Penetration Testing

SECURITY OPERATIONS

•Understand and comply with investigations
•Conduct logging and monitoring activities
•Perform Configuration Management (CM) (e.g., provisioning, baselining, automation)
•Apply foundational security operations concepts
•Apply resource protection
•Conduct incident management
•Operate and maintain detective and preventative measures
•Implement and support patch and vulnerability management
•Understand and participate in change management processes
•Implement recovery strategies
•Implement Disaster Recovery (DR) processes
•Test Disaster Recovery Plans (DRP)
•Participate in Business Continuity (BC) planning and exercises
•Implement and manage physical security
•Address personnel safety and security concerns

Discussion: Crime Prevention through Environmental Design

SOFTWARE DEVELOPMENT SECURITY

•Understand and integrate security in the Software Development Life Cycle (SDLC)
•Identify and apply security controls in software development ecosystems
•Assess the effectiveness of software security
•Assess security impact of acquired software
•Define and apply secure code

Discussion: Comparing Risk to Business Needs
Activity: Threat Mapping: Applying the OWASP
Activity: Threat Mapping: Applying Taxonomies

  • CISSP Exam Structure
  • Exam Registration Process
  • Time Management
  • Topics and Concepts
  • CISSP Certification Question Structure
  • Vendor Interpretation Techniques
Back to Tabs

(ISC)² Official CISSP Course Features

PREMIER CISSP CERTIFICATION TRAINING STATUS

View CISSP Course Pricing & Guaranteed To Run Schedule

(ISC)² CISSP Exam Experts

Award Winning Official (ISC)² CISSP Courseware

paper small icon

(ISC)² CISSP Exam Prep Review Sessions

CISSP Exam Pass Guarantee

GI Bill Eligible for up to 100% of CISSP Fees

98% Student Satisfaction Rate

certificate small

Take Official (ISC)² CISSP Exams Though Us

Real World CISSP Exam Lab Examples

CISSP Boot Camp Testimonials

Rich Klein

ASRC

The Training Camp CISSP guide was 100% to my CISSP exam

Charles H. Schall

Afforda Merchant Services

I just received my CISSP! The training, experience, and environment was all outstanding.

Christo Roberts

Akamai

Training Camp was exactly what I needed to get my CISSP. It was so intimidating at first but they got me across the finish line after a 1-week boot camp with the test at the end.

Dorothy Sheckler

Chandler Co.

I like the program they put together to help people get their CISSP

Tammi Purdy

DG Solutions

If it wasn’t for Training Camp I would not have gotten my CISSP. I loved their program!

Brian Nienhouse

CyberArk Software

The course was extremely helpful in preparing for the CISSP. The instructor was highly knowledgeable and had many helpful examples and tips for success.

Valerie I. Barlow

Infinity Investment

CISSP Training program they have impressed me on multiple levels. They are the best by far!

Kasey Hadley

Excellent course and outstanding work and teaching by the instructor. I would recommend Training Camp to anyone seeking CISSP certification.

Matt Accord

Glaizer

I failed my first CISSP exam when I studied alone. Than I took the boot camp with Training Camp and passed. Happy to say I now have my CISSP Certification.. woohoo!!

Jia Hedman

Leidos

CISSP instructor Ross Everett-knowledgeable, thorough and very easily understood. The location of class room was great in the metro D.C. Area. Hotel package was a fantastic deal. Going to return for cloud certs in no time.

DoD Group Training
DoD Group Training

Group CISSP Training

Are several of your team members interested in CISSP certification?  Our enterprise solutions specialists will create a package of training that fits your organization’s specific training needs. We can accommodate group training packages for as few as five to as many as thousands of team members spread across the globe.

Learn More

CISSP Practice Test

Test your knowledge and skills with our free online practice test.

Take the Quiz

Featured on

Let’s Get Started, Together

Get skilled, get certified. We offer a wide range of solutions trusted by thousands of organizations. Fill out a contact form and one of our Enterprise Solutions experts will contact you to discuss the best training solutions for your team. You can also e-mail our team directly at: [email protected]

Get Pricing & Schedule