CISSP Training Course

Officially Accredited Bootcamp

The Gold Standard in CyberSecurity Training

Our 5-day CISSP Boot Camp provides everything you'll need to be prepped and ready to pass the CISSP exam. You’ll leave class with the skills necessary to lead enterprise CyberSecurity initiatives, design and implement governance policy, and oversee your team’s day-to-day operations – all in accordance with the (ISC)2 official CISSP Common Body of Knowledge (CBK).


Live Instructor


Our most interactive learning mode provides maximum face to face interaction

From $3390


Group Training


Bring this course on site to deliver interactive training for your whole team



Early Registration: 9+ Weeks Prior to Start Date
General Registration: 2 - 9 Weeks Prior to Start Date
Late Registration: Fewer than 2 Weeks Prior to Start Date

  • Live Instructor?
  • Live Online?
  • Guaranteed to Run?

CISSP Bootcamp Training Course
Washington, DC - Beyond20 DC Office
September 30 - October 4, 2019 . 5 days
9:00 am - 5:00 pm


Regular Registration

CISSP Bootcamp Training Course
Washington, DC - Beyond20 DC Office
October 28 - November 1, 2019 . 5 days
9:00 am - 5:00 pm


Early Registration

CISSP Bootcamp Training Course
Washington, DC - Beyond20 DC Office
December 16 - December 20, 2019 . 5 days
9:00 am - 5:00 pm


Early Registration

Need training for a group?


This highly-rated CISSP® boot camp is designed to train and prepare you for the Certified Information Systems Security Professional (CISSP) certification exam, the premier security certification created and administered by the International Systems Security Certification Consortium (ISC)².

The broad spectrum of topics included in the CISSP Common Body of Knowledge (CBK) ensure its relevancy
across all disciplines in the field of information security. Successful candidates are competent in the following
8 domains:

• Security and Risk Management

• Asset Security

• Security Architecture and Engineering

• Communication and Network Security

• Identity and Access Management (IAM)

• Security Assessment and Testing

• Security Operations

• Software Development Security

Candidates must have a minimum of 5 years cumulative paid full-time work experience in 2 or more of the 8
domains of the CISSP CBK. Earning a 4-year college degree or regional equivalent or an additional credential
from the (ISC)² approved list will satisfy 1 year of the required experience. Education credit will only satisfy 1
year of experience.

A candidate that doesn’t have the required experience to become a CISSP may become an Associate of (ISC)²
by successfully passing the CISSP examination. The Associate of (ISC)² will then have 6 years to earn the 5
years required experience.

It is a 5-day class.

Short answer: Yes. CISSP certification will qualify you for IAM Level 3. If you’re looking or more detail on DoD 8570 and the various training options for compliance, check out our DoD 8570 overview.

Individuals who hold the PMP certification will earn 40 PDUs through the course.

Course book, practice exams, exercises, group activities, group discussions, and the CISSP Certification exam voucher.

Experienced IT professionals with at least 5 years of security experience that want to learn advanced security topics, anyone interested in taking the CISSP exam, or anyone whose current position includes information security-related responsibilities.

The CISSP exam uses Computerized Adaptive Testing (CAT) for all English exams.
CISSP exams in all other languages are administered as linear, fixed-form exams.

Length of exam: 3 hours
Number of questions: 100 – 150
Passing grade: 700 out of 1000 points

If you do not pass the exam on your first attempt, you will be able to reschedule after 30 days. The exam can be taken up to 3 times in a 12-month period. We guarantee you’ll pass, but if you don’t, you’ll be invited to take the course again before your next attempt for some extra studying help and to ask your instructor any questions!

As an (ISC)2 member or associate, you must earn CPEs to actively
maintain your certification. All CPE activities must be completed
or earned during the three years of each certification cycle and
no later than the certification expiration date (the end of your
certification cycle).

At the end of the three-year certification cycle, when both
required CPE credits and Annual Maintenance Fee (AMF) payment
requirements are met, your membership will renew to a new threeyear certification cycle.


  • Understand and Apply Concepts of Confidentiality, Integrity, and Availability
  • Apply Security Governance Principles
  • Develop and Implement Documented Security Policy, Standards, Procedures, and Guidelines
  • Understand and Apply Threat Modeling
  • Integrate Security Risk Considerations into Acquisition
  • Contribute to Personnel Security Policies 
  • Security Governance 
  • Understand and Apply Risk Management Concepts 
  • Establish and Manage Information Security Education, Training, and Awareness 
  • Manage the Security Functions
  • Planning for Business Continuity
  • Project Scope and Planning
  • Business Impact Assessment
  • Continuity Planning
  • BCP Documentation
  • Categories of Laws
  • Laws
  • Compliance
  • Contracting and Procurement
  • Classifying and Labeling Assets
  • ID Data Roles
  • Protecting Privacy
  • Historical Milestones in Cryptography
  • Cryptographic Basics
  • Modern Cryptography
  • Symmetric Cryptography
  • Cryptographic Life Cycle
  • Asymmetric Cryptography
  • Hash Functions
  • Digital Signatures
  • Public Key Infrastructure
  • Asymmetric Key Management
  • Applied Cryptography
  • Cryptography Attacks
  • Implement and Manage Engineering Processes Using Secure Design Principles 
  • Understand the Fundamental Concepts of Security Models  
  • Select Controls and Countermeasures Based on Systems Security Evaluation Models 
  • Understand Security Capabilities of Information Systems
  • Assess and Mitigate Security Vulnerabilities
  • Client Based
  • Server Based
  • Database Security
  • Distributed Systems
  • Industrial Control Systems
  • Assess and Mitigate Vulnerabilities in Embedded Devices and Cyber-Physical Systems
  • Essential Security Protection Mechanisms
  • Common Architecture Flaws and Security Issues
  • Apply Secure Principles to Site and Facility Design
  • Design and Implement Physical Security
  • Implement and Manage Physical Security
  • OSI Model
  • TCP/IP Model
  • Converged Protocols
  • Wireless Networks
  • General Wi-Fi Security Procedure
  • Cabling, Wireless, Topology, and Communications Technology
  • Network and Protocol Security Mechanisms
  • Secure Voice Communications
  • Multimedia Collaboration
  • Manage Email Security Remote Access Security Management
  • Virtual Private Network
  • Virtualization
  • Network Address Translation
  • Switching Technologies
  • WAN Technologies
  • Miscellaneous Security Control Characteristics
  • Security Boundaries
  • Prevent or Mitigate Network Attacks
  • Controlling Access to Assets 
  • Comparing Identification and Authentication 
  • Implementing Identity Management 
  • Managing the Identity and Access Provisioning Life Cycle
  • Comparing Access Control Models 
  • Understanding Access Control Attacks
  • Building a Security Assessment and Testing Program  
  • Performing Vulnerability Assessments 
  • Testing Your Software 
  • Implementing Security Management Processes
  • Applying Security Operations Concepts
  • Provisioning and Managing Resources
  • Managing Configuration
  • Managing Change
  • Managing Patches and reducing Vulnerabilities
  • Managing Incident Response
  • Implementing Preventative Measures
  • Logging, Monitoring, and Auditing
  • The Nature of Disaster
  • Understand System Resiliencies and Fault tolerance
  • Recovery Strategy
  • Recovery Plan Development
  • Training, Awareness, and Documentation
  • Testing and Maintenance
  • Investigations
  • Major Categories of Computer Crime
  • Incident Handling
  • Ethics
  • Introducing Systems Development Controls
  • Establishing Databases and Data Warehouses
  • Storing Data and Information
  • Understanding Knowledge Based Systems
  • Malicious Code Password Attacks
  • Application Attacks
  • Web Application Security
  • Reconnaissance Attacks
  • Masquerade Attacks

Why Beyond20

How We Teach

People learn differently, so we use a variety of methods to teach concepts throughout the course. In addition to exam preparation and practice quizzes, you'll engage in round-table discussions, group exercises, and games designed to give practical context to the concepts. We take this approach not only because it's more interesting and fun than simply memorizing vocabulary, but because it works.

All of our instructors are experienced practitioners with real world security expertise. (Real experience, too. Like, former-CIO-level experience.)

We're a US-based organization with offices in DC, Phoenix, and San Diego.

Industry-Leading Course Materials

All of our courseware is reviewed multiple times a year to ensure it's up to date, in line with best practice standards, and effective! We incorporate feedback from students to constantly improve our course books, in-class activities, and (sorry) homework. The goal is to provide you with the tools to not only get you through class and pass the exam, but also to have a reliable reference when you get back to the office.

We don't just teach to the exam (though we certainly do that), we also give you practical and personalized tools you can take back to work.

We're a Registered Education Provider with PMI, so if you're PMP Certified, the course will earn you PDUs!

Related Resources