CISSP Training Course

Officially Accredited Boot Camp

The Gold Standard in CyberSecurity Training

Our 5-day CISSP Boot Camp aligns to the CISSP domains outlined for the exam. You’ll leave class with the skills necessary to lead enterprise cyber security initiatives, design and implement governance policy, and oversee your team’s day-to-day operations – all in accordance with the official (ISC)² CISSP Common Body of Knowledge (CBK).


Live Instructor


Our most interactive learning mode provides maximum face to face interaction

From $3390

Live Online


Attend a course delivered by a live instructor from the comfort of your home or office

From $3390


Group Training


Get your whole team certified. Our world-class instructors can deliver interactive group training on-site or virtually.


(ISC)² CISSP Training

Our CISSP boot camp is an intense and interactive experience, validating your ability to manage a top-notch security program. Whether you are looking to elevate your career as a security analyst or meet U.S. Department of Defense requirements under Directive 8570.01-M, this class will grant you the skills you need.


Early Registration: 9+ Weeks Prior to Start Date
General Registration: 2 - 9 Weeks Prior to Start Date
Late Registration: Fewer than 2 Weeks Prior to Start Date

  • Live Instructor?
  • Live Online?
  • Guaranteed to Run?

CISSP Bootcamp Training Course
Live Virtual Class
February 22 - February 26, 2021 . 5 days
9:00 am - 5:00 pm


Regular Registration

CISSP Bootcamp Training Course
Live Virtual Class
April 5 - April 9, 2021 . 5 days
9:00 am - 5:00 pm


Early Registration

CISSP Bootcamp Training Course
Live Virtual Class
May 17 - May 21, 2021 . 5 days
9:00 am - 5:00 pm


Early Registration

Need training for a group?


Yes. You will receive an official certification exam voucher. This is included in the cost of our training course. From there, you will be able to sign up for your preferred testing date and location.

This course covers a wide range of critical security domains such as security operations, engineering, assessment/testing, and much more. You can find detailed information on the curriculum in the syllabus section below. We’ll also make sure you’re completely prepared to pass the CISSP certification exam so you can walk away with this industry-leading security credential.

Candidates for the CISSP certification must have a minimum of 5 years cumulative, paid, full-time work experience in 2 or more of the 8 domains of the CISSP CBK. Earning a 4-year college degree (or regional equivalent) or additional credentials from the (ISC)² approved list will satisfy 1 year of the required experience.

A candidate that doesn’t have the required experience to become a CISSP may become an Associate of (ISC)² by successfully passing the CISSP examination. The Associate of (ISC)² will then have 6 years to earn the 5 years required experience.

CISSP certification is widely regarded as the gold standard of information security competence. By earning this credential, you are demonstrating that you are an experienced cybersecurity professional who is capable of excelling in a variety of advanced security roles.

More and more of the world’s top organizations are seeking this qualification, and they’re willing to pay for those who have it. You’ll have the opportunity to make a real difference in the InfoSec world.

This is a 5-day class.

Short answer: Yes. CISSP certification will qualify you for IAM Level 3. If you’re looking for more detail on DoD 8570 and the various training options for compliance, check out our DoD 8570 overview.

A few days before class, you will receive an email with details on how to access our virtual training room, and physical courseware will be delivered to your shipping address.

Our virtual classes are instructed in a way that mirrors the experience you would get from an in-person course. As such, we believe in and use lots of interactive learning techniques with no more than 20 minutes of lecture at a time. That way, students remain fully engaged and the information sticks! Our virtual training courses are packed with interactive whiteboards, breakout rooms, virtual sticky note walls, and more to help ensure your success on the exam.

Individuals who hold the PMP certification will earn 40 PDUs through the course.

Bagels. Unlimited bagels. Also, you’ll be given the latest course book, a CISSP practice exam, training exercises, group activities, informative class discussions, and an official certification exam voucher.

Experienced IT professionals with at least 5 years of security experience who want to learn advanced security topics, anyone whose current position includes information security-related responsibilities, or anyone interested in taking the CISSP exam.

The CISSP designation is an advanced credential that recognizes years of subject-matter expertise.

The Security+ certification, while highly respected in its own right, is designed for earlier stage information security professionals. It is an excellent differentiator for entry-level practitioners. If you think you may need a more foundational course, try Security+.

The CISSP exam uses Computerized Adaptive Testing (CAT) for all English exams. CISSP exams in all other languages are administered as linear, fixed-form exams.

Length of exam: 3 hours
Number of questions: 100 – 150
Passing grade: 700 out of 1000 points

Our CISSP training course comes with an Exam Pass Guarantee: If you fail the exam on the first attempt, you can retake our training course at no cost (travel expenses not included). If the course version has changed since you took the course, you can attend the CISSP Bootcamp for only the cost of new materials. However, most candidates are in great shape after our 5-day course.

If you don’t pass the exam on your first attempt, you may retest after 30 test-free days. If you don’t pass the exam on your second attempt, you may retest after 60 test-free days from your most recent exam attempt. And finally, if you don’t pass the exam on your third attempt (and for all subsequent retakes), you may retest after 90 test-free days from your most recent exam attempt.

Additionally, you may only attempt a particular (ISC)² exam as many as four times during a 12-month period.

As an (ISC)2 member or associate, you must earn CPEs to actively maintain your certification. All CPE activities must be completed or earned during the three years of each certification cycle and no later than the certification expiration date (the end of your certification cycle).

At the end of the three-year certification cycle, when both required CPE credits and Annual Maintenance Fee (AMF) payment requirements are met, your membership will renew to a new three-year certification cycle.


  • Understand and Apply Concepts of Confidentiality, Integrity, and Availability
  • Apply Security Governance Principles
  • Develop and Implement Documented Security Policy, Standards, Procedures, and Guidelines
  • Understand and Apply Threat Modeling
  • Integrate Security Risk Considerations into Acquisition
  • Contribute to Personnel Security Policies 
  • Security Governance 
  • Understand and Apply Risk Management Concepts 
  • Establish and Manage Information Security Education, Training, and Awareness 
  • Manage the Security Functions
  • Planning for Business Continuity
  • Project Scope and Planning
  • Business Impact Assessment
  • Continuity Planning
  • BCP Documentation
  • Categories of Laws
  • Laws
  • Compliance
  • Contracting and Procurement
  • Classifying and Labeling Assets
  • ID Data Roles
  • Protecting Privacy
  • Historical Milestones in Cryptography
  • Cryptographic Basics
  • Modern Cryptography
  • Symmetric Cryptography
  • Cryptographic Life Cycle
  • Asymmetric Cryptography
  • Hash Functions
  • Digital Signatures
  • Public Key Infrastructure
  • Asymmetric Key Management
  • Applied Cryptography
  • Cryptography Attacks
  • Implement and Manage Engineering Processes Using Secure Design Principles 
  • Understand the Fundamental Concepts of Security Models  
  • Select Controls and Countermeasures Based on Systems Security Evaluation Models 
  • Understand Security Capabilities of Information Systems
  • Assess and Mitigate Security Vulnerabilities
  • Client Based
  • Server Based
  • Database Security
  • Distributed Systems
  • Industrial Control Systems
  • Assess and Mitigate Vulnerabilities in Embedded Devices and Cyber-Physical Systems
  • Essential Security Protection Mechanisms
  • Common Architecture Flaws and Security Issues
  • Apply Secure Principles to Site and Facility Design
  • Design and Implement Physical Security
  • Implement and Manage Physical Security
  • OSI Model
  • TCP/IP Model
  • Converged Protocols
  • Wireless Networks
  • General Wi-Fi Security Procedure
  • Cabling, Wireless, Topology, and Communications Technology
  • Network and Protocol Security Mechanisms
  • Secure Voice Communications
  • Multimedia Collaboration
  • Manage Email Security Remote Access Security Management
  • Virtual Private Network
  • Virtualization
  • Network Address Translation
  • Switching Technologies
  • WAN Technologies
  • Miscellaneous Security Control Characteristics
  • Security Boundaries
  • Prevent or Mitigate Network Attacks
  • Controlling Access to Assets 
  • Comparing Identification and Authentication 
  • Implementing Identity Management 
  • Managing the Identity and Access Provisioning Life Cycle
  • Comparing Access Control Models 
  • Understanding Access Control Attacks
  • Building a Security Assessment and Testing Program  
  • Performing Vulnerability Assessments 
  • Testing Your Software 
  • Implementing Security Management Processes
  • Applying Security Operations Concepts
  • Provisioning and Managing Resources
  • Managing Configuration
  • Managing Change
  • Managing Patches and reducing Vulnerabilities
  • Managing Incident Response
  • Implementing Preventative Measures
  • Logging, Monitoring, and Auditing
  • The Nature of Disaster
  • Understand System Resiliencies and Fault tolerance
  • Recovery Strategy
  • Recovery Plan Development
  • Training, Awareness, and Documentation
  • Testing and Maintenance
  • Investigations
  • Major Categories of Computer Crime
  • Incident Handling
  • Ethics
  • Introducing Systems Development Controls
  • Establishing Databases and Data Warehouses
  • Storing Data and Information
  • Understanding Knowledge Based Systems
  • Malicious Code Password Attacks
  • Application Attacks
  • Web Application Security
  • Reconnaissance Attacks
  • Masquerade Attacks

Why Beyond20

How We Teach

People learn differently, so we use a variety of methods to teach concepts throughout the course. In addition to exam preparation and practice quizzes, you'll engage in round-table discussions, group exercises, and games designed to give practical context to the concepts. We take this approach not only because it's more interesting and fun than simply memorizing vocabulary, but because it works.

All of our instructors are experienced practitioners with real world security expertise. (Real experience, too. Like, former-CIO-level experience.)

We're a US-based organization with offices in DC, Phoenix, and San Diego.

Industry-Leading Course Materials

All of our courseware is reviewed multiple times a year to ensure it's up to date, in line with best practice standards, and effective! We incorporate feedback from students to constantly improve our course books, in-class activities, and (sorry) homework. The goal is to provide you with the tools to not only get you through class and pass the exam, but also to have a reliable reference when you get back to the office.

We don't just teach to the exam (though we certainly do that), we also give you practical and personalized tools you can take back to work.

We're a Registered Education Provider with PMI, so if you're PMP Certified, the course will earn you PDUs!

Related Resources