CISSP Training Boot Camp

Class available live online

This next-gen virtual CISSP boot camp is the gold standard for cyber security training. Over the course of five days, our expert instructors will cover everything you need to know from the latest (ISC)² CBK on enterprise infosec initiatives, governance policy, and overseeing day-to-day operations. You’ll leave class fully equipped to pass the CISSP exam on your first try — guaranteed. White glove service included.

5 Day Course
Exam-Pass Guarantee
Exam Voucher Included
40 PDUs
Award-Winning Instructors
Industry-Leading Courseware

Next-Gen Online CISSP Boot Camp

CISSP Training Boot Camp

Our CISSP training boot camp is an intense and interactive experience, validating your ability to manage a top-notch security program. Whether you are looking to elevate your career as a security analyst or meet U.S. Department of Defense requirements under Directive 8570.01-M, this training course will get you there.

Key Features of CISSP Training Exam Pass Guarantee

Exam Pass Guarantee

5 Days of Virtual Training
Exam Voucher Included
Award-Winning Instructors
Accredited Training Organization

UPCOMING COURSES

Early Registration: 9+ Weeks Prior to Start Date
General Registration: 2 - 9 Weeks Prior to Start Date
Late Registration: Fewer than 2 Weeks Prior to Start Date

  • Live Instructor?
  • Live Online?
  • Guaranteed to Run?

CISSP Training Boot Camp

Live Virtual Class
July 11 - July 15, 2022 . 5 days
9:00 am - 5:00 pm

$3490


Regular Registration

CISSP Training Boot Camp

Live Virtual Class
August 22 - August 26, 2022 . 5 days
9:00 am - 5:00 pm

$3390


Early Registration

CISSP Training Boot Camp

Live Virtual Class
October 3 - October 7, 2022 . 5 days
9:00 am - 5:00 pm

$3390


Early Registration

Meet Our CISSP Boot Camp Instructors

Need training for a group?

FREQUENTLY ASKED QUESTIONS

Effective May 1, 2021, the CISSP certification domains are being refreshed to reflect the latest in cyber security. This involves a slight decrease in emphasis on communication and network security, and a slight increase in emphasis on software development security.

While the six primary domains will remain intact, there will be new and updated subdomains that cover a variety of pertinent concepts including: supply chain risk management (SCRM), end-of-life/end-of-support asset retention, facility security controls, and several others. For a complete breakdown on how the certification will change, see the official (ISC)² announcement.

Join us on April 5 for our live, online CISSP certification class before the update. Otherwise, we look forward to helping you pass the brand new exam after May 1!

Yes. You will receive an official certification exam voucher. This is included in the cost of our training course. From there, you will be able to sign up for your preferred testing date and location.

This course covers a wide range of critical security domains such as security operations, engineering, assessment/testing, and much more. You can find detailed information on the curriculum in the syllabus section below. We’ll also make sure you’re completely prepared to pass the CISSP certification exam so you can walk away with this industry-leading security credential.

Candidates for the CISSP certification must have a minimum of 5 years cumulative, paid, full-time work experience in 2 or more of the 8 domains of the CISSP CBK. Earning a 4-year college degree (or regional equivalent) or additional credentials from the (ISC)² approved list will satisfy 1 year of the required experience.

A candidate that doesn’t have the required experience to become a CISSP may become an Associate of (ISC)² by successfully passing the CISSP examination. The Associate of (ISC)² will then have 6 years to earn the 5 years required experience.

CISSP certification is widely regarded as the gold standard of information security competence. By earning this credential, you are demonstrating that you are an experienced cybersecurity professional who is capable of excelling in a variety of advanced security roles.

More and more of the world’s top organizations are seeking this qualification, and they’re willing to pay for those who have it. You’ll have the opportunity to make a real difference in the InfoSec world.

This is a 5-day class.

Short answer: Yes. CISSP certification will qualify you for IAM Level 3. If you’re looking for more detail on DoD 8570 and the various training options for compliance, check out our DoD 8570 overview.

A few days before class, you will receive an email with details on how to access our virtual training room, and we will deliver digital courseware to you.

Our CISSP boot camp is instructed in a way that mirrors the experience you would get from an in-person course. That way, students remain fully engaged and the information sticks!

Individuals who hold the PMP certification will earn 40 PDUs through the course.

Bagels. Unlimited bagels. Also, you’ll be given the latest virtual course book, a CISSP practice exam, training exercises, group activities, informative class discussions, and an official certification exam voucher.

Experienced IT professionals with at least 5 years of security experience who want to learn advanced security topics, anyone whose current position includes information security-related responsibilities, or anyone interested in taking the CISSP exam.

The CISSP designation is an advanced credential that recognizes years of subject-matter expertise.

The Security+ certification, while highly respected in its own right, is designed for earlier stage information security professionals. It is an excellent differentiator for entry-level practitioners. If you think you may need a more foundational course, try Security+.

The CISSP exam uses Computerized Adaptive Testing (CAT) for all English exams. CISSP exams in all other languages are administered as linear, fixed-form exams.

Length of exam: 3 hours
Number of questions: 100 – 150
Passing grade: 700 out of 1000 points

Our CISSP training course comes with an Exam Pass Guarantee: If you fail the exam on the first attempt, you can retake our training course at no cost (travel expenses not included). If the course version has changed since you took the course, you can attend the CISSP Bootcamp for only the cost of new materials. However, most candidates are in great shape after our 5-day course.

If you don’t pass the exam on your first attempt, you may retest after 30 test-free days. If you don’t pass the exam on your second attempt, you may retest after 60 test-free days from your most recent exam attempt. And finally, if you don’t pass the exam on your third attempt (and for all subsequent retakes), you may retest after 90 test-free days from your most recent exam attempt.

Additionally, you may only attempt a particular (ISC)² exam as many as four times during a 12-month period.

As an (ISC)2 member or associate, you must earn CPEs to actively maintain your certification. All CPE activities must be completed or earned during the three years of each certification cycle and no later than the certification expiration date (the end of your certification cycle).

At the end of the three-year certification cycle, when both required CPE credits and Annual Maintenance Fee (AMF) payment requirements are met, your membership will renew to a new three-year certification cycle.

COURSE SYLLABUS

  • Understand and Apply Concepts of Confidentiality, Integrity, and Availability
  • Apply Security Governance Principles
  • Develop and Implement Documented Security Policy, Standards, Procedures, and Guidelines
  • Understand and Apply Threat Modeling
  • Integrate Security Risk Considerations into Acquisition
  • Contribute to Personnel Security Policies 
  • Security Governance 
  • Understand and Apply Risk Management Concepts 
  • Establish and Manage Information Security Education, Training, and Awareness 
  • Manage the Security Functions
  • Planning for Business Continuity
  • Project Scope and Planning
  • Business Impact Assessment
  • Continuity Planning
  • BCP Documentation
  • Categories of Laws
  • Laws
  • Compliance
  • Contracting and Procurement
  • Classifying and Labeling Assets
  • ID Data Roles
  • Protecting Privacy
  • Historical Milestones in Cryptography
  • Cryptographic Basics
  • Modern Cryptography
  • Symmetric Cryptography
  • Cryptographic Life Cycle
  • Asymmetric Cryptography
  • Hash Functions
  • Digital Signatures
  • Public Key Infrastructure
  • Asymmetric Key Management
  • Applied Cryptography
  • Cryptography Attacks
  • Implement and Manage Engineering Processes Using Secure Design Principles 
  • Understand the Fundamental Concepts of Security Models  
  • Select Controls and Countermeasures Based on Systems Security Evaluation Models 
  • Understand Security Capabilities of Information Systems
  • Assess and Mitigate Security Vulnerabilities
  • Client Based
  • Server Based
  • Database Security
  • Distributed Systems
  • Industrial Control Systems
  • Assess and Mitigate Vulnerabilities in Embedded Devices and Cyber-Physical Systems
  • Essential Security Protection Mechanisms
  • Common Architecture Flaws and Security Issues
  • Apply Secure Principles to Site and Facility Design
  • Design and Implement Physical Security
  • Implement and Manage Physical Security
  • OSI Model
  • TCP/IP Model
  • Converged Protocols
  • Wireless Networks
  • General Wi-Fi Security Procedure
  • Cabling, Wireless, Topology, and Communications Technology
  • Network and Protocol Security Mechanisms
  • Secure Voice Communications
  • Multimedia Collaboration
  • Manage Email Security Remote Access Security Management
  • Virtual Private Network
  • Virtualization
  • Network Address Translation
  • Switching Technologies
  • WAN Technologies
  • Miscellaneous Security Control Characteristics
  • Security Boundaries
  • Prevent or Mitigate Network Attacks
  • Controlling Access to Assets 
  • Comparing Identification and Authentication 
  • Implementing Identity Management 
  • Managing the Identity and Access Provisioning Life Cycle
  • Comparing Access Control Models 
  • Understanding Access Control Attacks
  • Building a Security Assessment and Testing Program  
  • Performing Vulnerability Assessments 
  • Testing Your Software 
  • Implementing Security Management Processes
  • Applying Security Operations Concepts
  • Provisioning and Managing Resources
  • Managing Configuration
  • Managing Change
  • Managing Patches and reducing Vulnerabilities
  • Managing Incident Response
  • Implementing Preventative Measures
  • Logging, Monitoring, and Auditing
  • The Nature of Disaster
  • Understand System Resiliencies and Fault tolerance
  • Recovery Strategy
  • Recovery Plan Development
  • Training, Awareness, and Documentation
  • Testing and Maintenance
  • Investigations
  • Major Categories of Computer Crime
  • Incident Handling
  • Ethics
  • Introducing Systems Development Controls
  • Establishing Databases and Data Warehouses
  • Storing Data and Information
  • Understanding Knowledge Based Systems
  • Malicious Code Password Attacks
  • Application Attacks
  • Web Application Security
  • Reconnaissance Attacks
  • Masquerade Attacks

Why Beyond20

Subject Matter Expertise

We understand that your goal is to learn effectively and get certified in one shot. After all, CISSP certification training can be a substantial investment. As such, it’s critical to us that you learn from someone who will help you retain key concepts and get you across the finish line efficiently.

But at the same time, who wants to take a boring class? If we’re going to spend a lot of time looking at screens, the material should at least be engaging. That’s why we’re hyper-focused on bringing variety to your virtual boot camp experience. People learn differently, so we use several methods to teach concepts throughout the day.

White Glove Service

We all know that bad customer service is one of the most frustrating things there is. That’s why we’ve endeavored to create the kind of boot camp that we would want for ourselves.

We're a US-based organization with offices in DC, Phoenix, and San Diego. Come through! Otherwise, we'll be happy to meet you virtually.

Rest assured: At Beyond20, our instructors are some of the world’s best. Not only does our training staff have decades of experience leading real-world cyber security initiatives, but in many cases, we are the official authors of authoritative publications (e.g., ITIL). Working with Beyond20 means learning from the top subject matter experts out there. It means training and taking your CISSP exam with confidence.

Next-Gen Virtual Boot Camp

Depending on the course, this can include interactive whiteboards, breakout rooms, virtual sticky note walls, and more. We take this approach not only because it's more fun than simply memorizing terms, but because it works. For the CISSP boot camp specifically, we include a session review after each day's lecture.

From the instant that you first reach out to us with a quick question, to that glorious moment when you learn you’ve earned the CISSP certification, our job is to make sure that every interaction you have with us is a positive one. If you look at our hundreds of Google-verified reviews, you’ll see that we take it seriously! Beyond20 is not a risky choice.

If you're PMP-certified, our courses will earn you PDUs!

Related Resources