CISSP Training Course

Officially Accredited Bootcamp

Course Overview

Our 5-day CISSP Boot Camp provides everything you'll need to be prepped and ready to pass the CISSP exam. You’ll leave class with the skills necessary to lead enterprise CyberSecurity initiatives, design and implement governance policy, and oversee your team’s day-to-day operations – all in accordance with the gold standard: The CISSP Common Body of Knowledge (CBK).

PERSONAL

Live Instructor

 

Our most interactive learning mode provides maximum face to face interaction

From $3590

Live Online

 

Attend a course delivered by a live instructor from the comfort of your home or office

From $3590

BUSINESS

Group Training

 

Bring this course on site to deliver interactive training for your whole team

 

UPCOMING COURSES

Early Registration: 9+ Weeks Prior to Start Date
General Registration: 2 - 9 Weeks Prior to Start Date
Late Registration: Fewer than 2 Weeks Prior to Start Date

  • Live Instructor?
  • Live Online?
  • Guaranteed to Run?

CISSP Bootcamp Training Course
Washington, DC - Beyond20 DC Office
January 28 - February 1, 2019 . 5 days
9:00 am - 5:00 pm

$3790


Late Registration

CISSP Bootcamp Training Course
Washington, DC - Beyond20 DC Office
March 4 - March 8, 2019 . 5 days
9:00 am - 5:00 pm

$3690


Regular Registration

CISSP Bootcamp Training Course
Washington, DC - Beyond20 DC Office
March 4 - March 8, 2019 . 5 days
9:00 am - 5:00 pm

$3690


Regular Registration

Why Beyond20

How We Teach

People learn differently, so we use a variety of methods to teach concepts throughout the course. In addition to exam preparation and practice quizzes, you'll engage in round-table discussions, group exercises, and games designed to give practical context to the concepts. We take this approach not only because it's more interesting and fun than simply memorizing vocabulary, but because it works.

All of our trainers are full-time Beyond20 staff

No temporary workers or subcontractors here. Our trainers are working consultants who implement best practice processes and tools when they're not in the classroom. You might say we practice what we preach. It's a great system, when you think about it - we're better consultants because we know these concepts inside and out, and we're better trainers because we get to put the theory into practice in the real world.

We don't just teach to the exam (though we certainly do that), we also give you practical and personalized tools you can take back to work.

We're a Registered Education Provider with PMI, so if you're PMP Certified, the course will earn you PDUs!

Industry-Leading Course Materials

All of our courseware is reviewed multiple times a year to ensure it's up to date, in line with best practice standards, and effective! We incorporate feedback from students to constantly improve our course books, in-class activities, and (sorry) homework. The goal is to provide you with the tools to not only get you through class and pass the exam, but also to have a reliable reference when you get back to the office.

All of our instructors are experienced practitioners with real world ITIL implementation expertise. (Real experience, too. Like, former-CIO-level experience.)

We're a US-based organization with offices in DC, Phoenix, and San Diego.

COURSE SYLLABUS

  • Understand and Apply Concepts of Confidentiality, Integrity, and Availability
  • Apply Security Governance Principles
  • Develop and Implement Documented Security Policy, Standards, Procedures, and Guidelines
  • Understand and Apply Threat Modeling
  • Integrate Security Risk Considerations into Acquisition
  • Contribute to Personnel Security Policies 
  • Security Governance 
  • Understand and Apply Risk Management Concepts 
  • Establish and Manage Information Security Education, Training, and Awareness 
  • Manage the Security Functions
  • Planning for Business Continuity
  • Project Scope and Planning
  • Business Impact Assessment
  • Continuity Planning
  • BCP Documentation
  • Categories of Laws
  • Laws
  • Compliance
  • Contracting and Procurement
  • Classifying and Labeling Assets
  • ID Data Roles
  • Protecting Privacy
  • Historical Milestones in Cryptography
  • Cryptographic Basics
  • Modern Cryptography
  • Symmetric Cryptography
  • Cryptographic Life Cycle
  • Asymmetric Cryptography
  • Hash Functions
  • Digital Signatures
  • Public Key Infrastructure
  • Asymmetric Key Management
  • Applied Cryptography
  • Cryptography Attacks
  • Implement and Manage Engineering Processes Using Secure Design Principles 
  • Understand the Fundamental Concepts of Security Models  
  • Select Controls and Countermeasures Based on Systems Security Evaluation Models 
  • Understand Security Capabilities of Information Systems
  • Assess and Mitigate Security Vulnerabilities
  • Client Based
  • Server Based
  • Database Security
  • Distributed Systems
  • Industrial Control Systems
  • Assess and Mitigate Vulnerabilities in Embedded Devices and Cyber-Physical Systems
  • Essential Security Protection Mechanisms
  • Common Architecture Flaws and Security Issues
  • Apply Secure Principles to Site and Facility Design
  • Design and Implement Physical Security
  • Implement and Manage Physical Security
  • OSI Model
  • TCP/IP Model
  • Converged Protocols
  • Wireless Networks
  • General Wi-Fi Security Procedure
  • Cabling, Wireless, Topology, and Communications Technology
  • Network and Protocol Security Mechanisms
  • Secure Voice Communications
  • Multimedia Collaboration
  • Manage Email Security Remote Access Security Management
  • Virtual Private Network
  • Virtualization
  • Network Address Translation
  • Switching Technologies
  • WAN Technologies
  • Miscellaneous Security Control Characteristics
  • Security Boundaries
  • Prevent or Mitigate Network Attacks
  • Controlling Access to Assets 
  • Comparing Identification and Authentication 
  • Implementing Identity Management 
  • Managing the Identity and Access Provisioning Life Cycle
  • Comparing Access Control Models 
  • Understanding Access Control Attacks
  • Building a Security Assessment and Testing Program  
  • Performing Vulnerability Assessments 
  • Testing Your Software 
  • Implementing Security Management Processes
  • Applying Security Operations Concepts
  • Provisioning and Managing Resources
  • Managing Configuration
  • Managing Change
  • Managing Patches and reducing Vulnerabilities
  • Managing Incident Response
  • Implementing Preventative Measures
  • Logging, Monitoring, and Auditing
  • The Nature of Disaster
  • Understand System Resiliencies and Fault tolerance
  • Recovery Strategy
  • Recovery Plan Development
  • Training, Awareness, and Documentation
  • Testing and Maintenance
  • Investigations
  • Major Categories of Computer Crime
  • Incident Handling
  • Ethics
  • Introducing Systems Development Controls
  • Establishing Databases and Data Warehouses
  • Storing Data and Information
  • Understanding Knowledge Based Systems
  • Malicious Code Password Attacks
  • Application Attacks
  • Web Application Security
  • Reconnaissance Attacks
  • Masquerade Attacks

FREQUENTLY ASKED QUESTIONS

This highly-rated CISSP® boot camp is designed to train and prepare you for the Certified Information Systems Security Professional (CISSP) certification exam, the premier security certification created and administered by the International Systems Security Certification Consortium (ISC)².

The broad spectrum of topics included in the CISSP Common Body of Knowledge (CBK) ensure its relevancy across all disciplines in the field of information security. Successful candidates are competent in the following 8 domains:

• Security and Risk Management
• Asset Security
• Security Architecture and Engineering
• Communication and Network Security
• Identity and Access Management (IAM)
• Security Assessment and Testing
• Security Operations
• Software Development Security

Candidates must have a minimum of 5 years cumulative paid full-time work experience in 2 or more of the 8 domains of the CISSP CBK. Earning a 4-year college degree or regional equivalent or an additional credential from the (ISC)² approved list will satisfy 1 year of the required experience. Education credit will only satisfy 1 year of experience. A candidate that doesn’t have the required experience to become a CISSP may become an Associate of (ISC)² by successfully passing the CISSP examination. The Associate of (ISC)² will then have 6 years to earn the 5 years required experience.

It is a 5-day class.

Individuals who hold the PMP certification will earn 40 PDUs through the course.

Course book, practice exams, exercises, group activities, group discussions, and the CISSP Certification exam voucher.

Experienced IT professionals with at least 5 years of security experience that want to learn advanced security topics, anyone interested in taking the CISSP exam, or anyone whose current position includes information security-related responsibilities.

The CISSP exam uses Computerized Adaptive Testing (CAT) for all English exams. CISSP exams in all other languages are administered as linear, fixed-form exams. Length of exam: 3 hours Number of questions: 100 - 150 Passing grade: 700 out of 1000 points

If you do not pass the exam on your first attempt, you will be able to reschedule after 30 days. The exam can be taken up to 3 times in a 12-month period. We guarantee you’ll pass and will pay for one exam retake. Contact us to find out more about our Exam Pass Guarantee.

As an (ISC)2 member or associate, you must earn CPEs to actively maintain your certification. All CPE activities must be completed or earned during the three years of each certification cycle and no later than the certification expiration date (the end of your certification cycle).

At the end of the three-year certification cycle, when both required CPE credits and Annual Maintenance Fee (AMF) payment requirements are met, your membership will renew to a new threeyear certification cycle.

Need training for a group?

Related Resources