ISC2 CISSP® Training Boot Camp

Earning your CISSP certification requires a broad range of cybersecurity skills, from developing security policies to managing risk to understanding technical security controls. Infosec's industry-leading approach to CISSP training provides the tools you need to master this knowledge, including becoming an information systems pro.

You will leave this training with the necessary skills and best practices to effectively create and execute enterprise-wide information security strategies — and the...

6 Days
Open Enrollment
View Session Dates
Offered in partnership with your preferred school

George Mason University

Change School
Learning method

for additional information

Course code: LBC108

What you will learn

The eight CISSP domain areas:

  • Security and risk management
  • Asset security
  • Security engineering
  • Communication and network security
  • Identity and access management
  • Security assessment and testing
  • Security operations
  • Software development security

How you will benefit

  • Tools and expert instruction to increase your career opportunities as an information security analyst
  • Obtain critical skills and best practices to create and execute enterprise-wide information security strategies effectively
  • Prepare for your CISSP certification

How the course is taught

  • Live Online, Instructor-Moderated
  • 6 Days to complete Boot Camp
  • 90-day extended access to all boot camp materials
  1. Security & Risk Management
    1. Confidentiality, integrity and availability
    2. Security governance policies and their supporting counterparts
    3. Compliance
    4. Global information security
    5. Legal and regulatory policies
    6. Professional ethics
    7. Business continuity
    8. Personnel security
    9. Risk management
    10. Threat modeling
    11. Acquisition security
    12. Security awareness
  2. Asset Security
    1. Classify information
    2. Identify and document asset ownership
    3. Asset privacy concerns
    4. Asset retention policies
    5. Data security controls
    6. Handling requirements
  3. Security Engineering
    1. Secure engineering processes
    2. Review security engineering models
    3. Security architecture
    4. Web-based vulnerabilities
    5. Mobile vulnerabilities
    6. Embedded device vulnerabilities
    7. Cryptography components and their relationships
    8. Site and facility design
    9. Physical security
  4. Communication and Network Security
    1. Network architecture
    2. Network components
    3. Communication channels
    4. Handling network attacks
  5. Identity & Access Management
    1. Physical and logical access
    2. Authentication of people and devices
    3. Identity as service (cloud identity)
    4. Third-party identity
    5. Authorization mechanisms
    6. Access control attacks
    7. Provisioning life cycle
  6. Security Assessment and Testing
    1. Validate assessment
    2. Security control
    3. Management and operational controls
    4. Analyze and report test outputs
    5. Internal and third-party audits
    6. Security operations
    7. Handling investigations
    8. Investigation types
    9. Logging and monitoring
    10. Provisioning of resources
  7. Security Operations
    1. Resource protection
    2. Incident management
    3. Preventative measures
    4. Patch and vulnerability management
    5. Change management
    6. Disaster recovery
    7. Business continuity
    8. Managing physical security
    9. Personnel safety concerns
  8. Software Development Security
    1. Software development life cycle
    2. Security for development environments
    3. Software security
    4. Purchased software risk

Boot camp

Boot camps are led by instructors that have years of industry experience and are recognized as experts.


This course is intended for chief information security officers, security systems administrators, information assurance analysts, IT security engineers, senior IT security consultants, senior information security risk officers, or anyone who manages or oversees security strategies.

Certification Requirements:

To obtain the CISSP certification, you must have:

  • At least five years of professional experience in the information security field
  • A work history reflecting direct experience in at least two of the eight domains listed in the ISC2 CISSP Common Body of Knowledge (CBK)

However, you can become an Associate of ISC2 by passing the exam without the required work experience for the CISSP requirements.


Hardware Requirements:

  • This course can be taken on either a PC, Mac, or Chromebook.
  • A microphone.
  • Speakers.
  • A webcam.

Software Requirements:

  • PC: Windows 7 or later.
  • Mac: macOS 10.7 or later.
  • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
  • Microsoft Word Online
  • Adobe Acrobat Reader
  • Zoom Meetings
  • Software must be installed and fully operational before the course begins.


  • Email capabilities and access to a personal email account.

Instructional Material Requirements:

The instructional materials required for this course are included in enrollment and will be available online.

You also have the option to purchase a physical copy of the text for an additional fee of $100.

  • CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide, (Sybex)

Certification Magazine listed the CISSP as one of the top 75 highest salaried credentials in its annual Salary Survey 75 report. As of December 2022, ZipRecruiter reported the nationwide average salary for CISSP-certified professionals to be $130,185 annually.

You can expect to pay $749 to take the CISSP exam.

In order to qualify for CISSP certification, you must have a minimum of five years of cumulative paid work experience in two or more of the eight domains of the CISSP CBK. Additionally, earning a four-year college degree or regional equivalent or an additional credential from the ISC2 approved list will satisfy up to one year of experience needed to fulfill CISSP requirements.

The CISSP exam covers 8 different domains, including:

  1. Security and Risk Management
  2. Asset Security
  3. Security Architecture and Engineering
  4. Communication and Network Security
  5. Identity and Access Management (IAM)
  6. Security Assessment and Testing
  7. Security Operations
  8. Software Development Security

Candidates must demonstrate mastery of all eight CISSP domains in order to earn their CISSP certification.

The CISSP, or Certified Information Systems Security Professional, is an in-demand certification that is earned by passing the CISSP exam from ISC2. This credential is highly respected worldwide because it proves the certification holder's ability to effectively design, implement and manage best-in-class cybersecurity operations.

There are a large variety of CISSP jobs available globally. Some of these job titles include chief information security officer, security systems administrator, information assurance analyst, IT security engineer, senior IT security consultant, senior information security risk officer, and any other job for professionals who manage or oversee security strategies.

The CISSP is worthwhile for practically any cybersecurity professional. Even IT professionals who don't come into direct contact with traditional cybersecurity implementations and configurations should consider doing the prep work necessary to earn the CISSP. It can open the door to many IT positions and is a necessary certification for those wishing to pursue higher-level security roles in the future.

Yes, you will be prepared to sit for the ISC2 CISSP – Certified Systems Security Professional exam and the exam cost is included with your enrollment. To sit for the exam, you will need to meet the following requirements:

  • Have a minimum of five years cumulative paid work experience in two or more of the eight domains of the CISSP CBK. Earning a four-year college degree or regional equivalent or an additional credential from the ISC2 approved list will satisfy one year of the required experience. Education credit will only satisfy one year of experience.
  • If you do not have the required experience to become a CISSP, you may become an Associate of ISC2 by successfully passing the CISSP examination. As an Associate of ISC2, you will have six years to earn the five years required experience.

You can register for the boot camp whenever you are ready. Our team will help you select the session that will best fit you.

The boot camp is 6 days in length. You will have 3 months from the completion of the boot camp to access all boot camp materials.

The boot camp instructor will be available during the session to answer any questions. You will also have access to the Infosec Skills platform where you will be able to create support requests, as needed.

Upon successful completion of your boot camp session, you will be awarded a certificate of completion from Infosec and the school or organization that you registered through.

ed2go courses will help you gain the skills and knowledge you need to take the next step in your career and stand out to potential employers. However, you should always research the job market in your area before enrolling.

ed2go courses are non-credit, so they do not qualify for federal aid, FAFSA, and Pell Grant. In some states, vocational rehab or workforce development boards may provide funding to take our courses. Additionally, you may qualify for financial assistance if you meet certain requirements. Learn more about financial assistance.

If you have questions that are not answered on our website, representatives are available via LIVE chat. You can also call us at 1-877-221-5151 during regular business hours to have your questions promptly answered. If you are visiting us during non-business hours, please send us a question using the "Contact Us."