The Official CISSP Certification Boot Camp

5 Day Classroom  •  5 Day Live Online
Adjustable to meet your needs.
Group Rate:
GSA Discount:
When training eight or more people, onsite team training offers a more affordable and convenient option.
Register Now
Request Quote

The CISSP certification has become the de facto standard of information security credentials. Long sought after in America and growing in Europe, the CISSP is a sweeping security management credential that establishes your literacy and credibility as an information security professional. With hacks and attacks on the rise everywhere you look, never has the investment in security certification been more worth it for the enterprise. With CISSP credential holders earning salary averages of $114k or more, the credential is well worth it to the individual practitioner as well.

Led by real-world experts in information security who are authorized (ISC)² instructors, the Official (ISC)² CISSP Certification Boot Camp is the most comprehensive review of information security concepts and industry best practices. This course covers the ten domains of the CISSP CBK (Common Body of Knowledge). This training course reviews and refreshes your information security knowledge and helps identify the areas you need to study for the CISSP exam.

Identify the purpose, benefits, and process of information classification and how it is used for Access Control policies and identifying the process for assessing the effectiveness of implemented controls.
Master basic understanding of telecommunication and network security concepts.
Learn the required components for minimizing security risks, securing channels of communication, and techniques for preventing and detecting network-based attacks.
Apply the Information Security Governance and Risk Management framework including the policies, concepts, principles, structures and standards that are established for the protection of information assets, and how to assess the effectiveness of that prote
Navigate the details of Software Development Security, including the activities and processes pertaining to the planning, programming, and management of software and systems that manage software including ways to secure applications through design and con
Work with Cryptography concepts, including application of public and private algorithms, distribution management, methods of attack, and the application, development, and use of digital signatures for authenticity and electronic transactions, and nonrepud
Use the Security Architecture and Design concepts focusing on the architecture of security systems that provide for the availability, integrity, and confidentiality of organizational assets.
Master key terms and processes of Security Operations and how to protect and control information processing assets in a centralized or distributed environment – use daily tasks required to keep security services operating reliably and efficiently.
Identify and apply the Business Continuity and Disaster Recovery Planning requirements necessary to develop the preparation, processes, and practices necessary to ensure the preservation of the business in case of major disruptions to normal business oper
Evaluate the physical, environmental, and procedural risks that might be present in a facility, organization, or structure where information systems are stored and managed.
Upcoming Dates and Locations
Guaranteed To Run

There aren’t any public sessions currently scheduled for this course, but if you fill out the form below, we can tell you about how we can bring this course to you!

Course Outline

Part 1: Access Control

  1. Introduction to Access Control
  2. Access Control Key Concepts, Methodologies, and Techniques
  3. System Logging and Monitoring
  4. Access Control Attacks and Threats
  5. Access Control Effectiveness
  6. Identify and Access Provisioning Lifecycle

Part 2: Telecommunications and Network Security

  1. Introduction to Telecommunications and Network Security
  2. Network Models and System Architecture
  3. The Network and IT Security
  4. Understanding the Attack
  5. Tools and Tasks in Network Security
  6. Layer 1: Physical Layer
  7. Layer 2: Data-link  Layer
  8. Layer 3: Network Layer
  9. Layer 4: Transport Layer
  10. Layer 5: Session Layer
  11. Layer 6: Presentation Layer
  12. Layer 7: Application Layer

Part 3: Information Security Governance and Risk Management

  1. Introduction to Information Security Governance and Risk Management
  2. Information Security Governance
  3. The Risk Management Process
  4. Ethical Considerations in Information Security

Part 4: Software development Security

  1. System Life Cycle Security
  2. Systems Development Methodologies
  3. Security Issues with Programming Languages
  4. Assessing the Effectiveness of Software Security
  5. Security Controls
  6. Database Security
  7. Application and Database Security Issues

Part 5: Cryptography

  1. Key Concepts and Common Terminology Used in Cryptography
  2. Historical Aspect of Cryptography
  3. Uses of Cryptography
  4. The Cryptographic Life Cycle
  5. Methods of Cryptography
  6. The Different Encryption Systems
  7. Algorithm Concepts
  8. Methods of Cryptanalytic Attacks
  9. Maintaining Network Security
  10. Maintaining Application Security
  11. Information Hiding Alternatives

Part 6: Security Architecture and Design

  1. Key Concepts and Definitions
  2. Types of Security Models
  3. Components of an Architecture
  4. Basic Principles of System Design
  5. Evaluation Models of Information Systems
  6. Common Security Frameworks
  7. Vulnerabilities and Threats

Part 7: Security Architecture and Design

  1. Key Concepts and Definitions
  2. Types of Security Models
  3. Components of an Architecture
  4. Basic Principles of System Design
  5. Evaluation Models of Information Systems
  6. Common Security Frameworks
  7. Vulnerabilities and Threats

Part 8: Security Operations

  1. Security Concepts and Activities
  2. Protection of Resources
  3. Preventive Measures
  4. Change Management and Configuration Management
  5. System Resilience and Fault Tolerance Requirements 

Part 9: Business Continuity and Disaster Recovery Planning

  1. Processes Required for Planning the Project
  2. Defining the Organization
  3. Plan Implementation 

Part 10: Legal, regulations, Investigations, and Compliance

  1. The Major Legal Systems in Information Security
  2. International Law in Information Security
  3. Supporting the Investigation
  4. The Forensic Investigation
  5. Hardware/Embedded Device Analysis
  6. Compliance Processes and Procedures
  7. Ensure Security in Contractual Agreements and Procurement Processes  

Part 11: Physical (Environmental) Security

  1. Definitions and Key Concepts
  2. Site and Facility Design Considerations
  3. Implementation and Operation of Perimeter Security
  4. Implementation and Operation of Internal Security
  5. Implementation and Operation of Facilities Security
  6. Equipment Protection
  7. Personnel Privacy and Safety  
Who should attend
  • CISO
  • Director
  • Manager
  • Supervisor
  • Analyst
  • Cryptographer
  • Cyber Architect
  • Information Assurance Engineer
  • Investigator
  • Computer Scientist
  • Program Manager
  • Project or Team Lead
  • CIO
  • CTO
Bonus Materials

No exam voucher is included with this course, but ASPE can optionally provide one for additional fee.


The CISSP Boot Camp is for students who have at least four years of recent full-time security professional work experience in two or more of the ten domains of the (ISC)² Certified Information System Security Professional® (CISSP) Common Body of Knowledge® (CBK). The CISSP CBK defines the work experience in architecture, design, management, risk, and controls that assure the security of a business environment.