Information Security Training Courses Icon

The Official CISSP Certification Boot Camp

5 Days Classroom Session   |  
5 Days Live Online
Classroom Registration
Group Rate:
(per registrant, 2 or more)
GSA Individual:
Live Online Registration
Live Online:
Private Onsite Package

This course can be tailored to your needs for private, onsite delivery at your location.

Request a Private Onsite Price Quote

Professional Credits


ASPE is an IIBA Endorsed Education Provider of business analysis training. Select Project Delivery courses offer IIBA continuing development units (CDU) in accordance with IIBA standards.


NASBA continuing professional education credits (CPE) assist Certified Public Accountants in reaching their continuing education requirements.

This course offers 35.00 NASBA CPEs.


Select courses offer Leadership (PDU-L), Strategic (PDU-S) and Technical PMI professional development units that vary according to certification. Technical PDUs are available in the following types: ACP, PBA, PfMP, PMP/PgMP, RMP, and SP.


The CISSP certification has become the de facto standard of information security credentials. Long sought after in America and growing in Europe, the CISSP is a sweeping security management credential that establishes your literacy and credibility as an information security professional. With hacks and attacks on the rise everywhere you look, never has the investment in security certification been more worth it for the enterprise. With CISSP credential holders earning salary averages of $114k or more, the credential is well worth it to the individual practitioner as well.

Led by real-world experts in information security who are authorized (ISC)² instructors, the Official (ISC)² CISSP Certification Boot Camp is the most comprehensive review of information security concepts and industry best practices. This course covers the ten domains of the CISSP CBK (Common Body of Knowledge). This training course reviews and refreshes your information security knowledge and helps identify the areas you need to study for the CISSP exam.

Identify the purpose, benefits, and process of information classification and how it is used for Access Control policies and identifying the process for assessing the effectiveness of implemented controls.
Master basic understanding of telecommunication and network security concepts.
Learn the required components for minimizing security risks, securing channels of communication, and techniques for preventing and detecting network-based attacks.
Apply the Information Security Governance and Risk Management framework including the policies, concepts, principles, structures and standards that are established for the protection of information assets, and how to assess the effectiveness of that prote
Navigate the details of Software Development Security, including the activities and processes pertaining to the planning, programming, and management of software and systems that manage software including ways to secure applications through design and con
Work with Cryptography concepts, including application of public and private algorithms, distribution management, methods of attack, and the application, development, and use of digital signatures for authenticity and electronic transactions, and nonrepud
Use the Security Architecture and Design concepts focusing on the architecture of security systems that provide for the availability, integrity, and confidentiality of organizational assets.
Master key terms and processes of Security Operations and how to protect and control information processing assets in a centralized or distributed environment – use daily tasks required to keep security services operating reliably and efficiently.
Identify and apply the Business Continuity and Disaster Recovery Planning requirements necessary to develop the preparation, processes, and practices necessary to ensure the preservation of the business in case of major disruptions to normal business oper
Evaluate the physical, environmental, and procedural risks that might be present in a facility, organization, or structure where information systems are stored and managed.
Upcoming Dates and Locations
Guaranteed To Run
Dec 4, 2017 – Dec 8, 2017    10:30am – 6:30pm Live Online Register
Course Outline

Domain 1 - Access Control

  • Introduction to Access Control
  • Access Control Key Concepts, Methodologies, and Techniques
  • System Logging and Monitoring
  • Access Control Attacks and Threats
  • Access Control Effectiveness
  • Identify and Access Provisioning Lifecycle

Domain 2 - Telecommunications and Network Security

  • Introduction to Telecommunications and Network Security
  • Network Models and System Architecture
  • The Network and IT Security
  • Understanding the Attack
  • Tools and Tasks in Network Security
  • Layer 1: Physical Layer
  • Layer 2: Data-link  Layer
  • Layer 3: Network Layer
  • Layer 4: Transport Layer
  • Layer 5: Session Layer
  • Layer 6: Presentation Layer
  • Layer 7: Application Layer

Domain 3 - Information Security Governance and Risk Management

  • Introduction to Information Security Governance and Risk Management
  • Information Security Governance
  • The Risk Management Process
  • Ethical Considerations in Information Security

Domain 4 - Software development Security

  • System Life Cycle Security
  • Systems Development Methodologies
  • Security Issues with Programming Languages
  • Assessing the Effectiveness of Software Security
  • Security Controls
  • Database Security
  • Application and Database Security Issues

Domain 5 - Cryptography

  • Key Concepts and Common Terminology Used in Cryptography
  • Historical Aspect of Cryptography
  • Uses of Cryptography
  • The Cryptographic Life Cycle
  • Methods of Cryptography
  • The Different Encryption Systems
  • Algorithm Concepts
  • Methods of Cryptanalytic Attacks
  • Maintaining Network Security
  • Maintaining Application Security
  • Information Hiding Alternatives

Domain 6 - Security Architecture and Design

  • Key Concepts and Definitions
  • Types of Security Models
  • Components of an Architecture
  • Basic Principles of System Design
  • Evaluation Models of Information Systems
  • Common Security Frameworks
  • Vulnerabilities and Threats

Domain 6 - Security Architecture and Design

  • Key Concepts and Definitions
  • Types of Security Models
  • Components of an Architecture
  • Basic Principles of System Design
  • Evaluation Models of Information Systems
  • Common Security Frameworks
  • Vulnerabilities and Threats

Domain 7 - Security Operations

  • Security Concepts and Activities
  • Protection of Resources
  • Preventive Measures
  • Change Management and Configuration Management
  • System Resilience and Fault Tolerance Requirements 

Domain 8 - Business Continuity and Disaster Recovery Planning

  • Processes Required for Planning the Project
  • Defining the Organization
  • Plan Implementation 

Domain 9 - Legal, regulations, Investigations, and Compliance

  • The Major Legal Systems in Information Security
  • International Law in Information Security
  • Supporting the Investigation
  • The Forensic Investigation
  • Hardware/Embedded Device Analysis
  • Compliance Processes and Procedures
  • Ensure Security in Contractual Agreements and Procurement Processes  

Domain 10 - Physical (Environmental) Security

  • Definitions and Key Concepts
  • Site and Facility Design Considerations
  • Implementation and Operation of Perimeter Security
  • Implementation and Operation of Internal Security
  • Implementation and Operation of Facilities Security
  • Equipment Protection
  • Personnel Privacy and Safety  
Who should attend
  • CISO
  • Director
  • Manager
  • Supervisor
  • Analyst
  • Cryptographer
  • Cyber Architect
  • Information Assurance Engineer
  • Investigator
  • Computer Scientist
  • Program Manager
  • Project or Team Lead
  • CIO
  • CTO
Bonus Materials

No exam voucher is included with this course, but ASPE can optionally provide one for additional fee.


The CISSP certification course is for students who have at least four years of recent full-time security professional work experience in two or more of the ten domains of the (ISC)² Certified Information System Security Professional® (CISSP) Common Body of Knowledge® (CBK). The CISSP CBK defines the work experience in architecture, design, management, risk, and controls that assure the security of a business environment.

Download the brochure