651-905-3729 Microsoft Silver Learning Partner EC Counsel Reseller compTIA Authorized Partner

(ISC)2 CISSP Training Classroom Live Washington, DC January 26, 2026

Price: $4,300

This course runs for a duration of 6 Days.

The class will run daily from 8:30 PM ET to 6 PM ET.

Class Location: Washington D.C. - Washington, DC.

Enroll today to reserve your spot!

Space is limited. Enroll today.

Enroll Now

Description

This Official (ISC)² CISSP Certification Boot Camp is a comprehensive review of Cyber security & industry best practices merged with an award-winning comprehensive exam preparation for the rigorous CISSP adaptive exam.

This CISSP Training features:
• Up-to-date official CISSP courseware with practical interactive exercises
• Emphasis on exam content and format through instruction and mock tests
• Comprehensive study materials and resources
• Support from (ISC)2 certified CISSP experts for any questions
• Unbeatable “CISSP Pass Guarantee” for exam success.

Upon completion of the course, students are offered to attend (as many times as desired) our ongoing live, online full-day exam preparation review sessions prior to taking the examination. We are so confident in our course, we offer the industry’s best “CISSP Free-Retake Guarantee.”

Who Should Attend

Our Official (ISC)² CISSP Certification Boot Camp is ideal for professionals in the information security field who want to become CISSP certified. This includes, but is not limited to:

  • Information security analysts
  • Network architects
  • Security consultants
  • Security managers
  • IT auditors
  • Risk management professionals
  • Chief Information Security Officers (CISOs)

It is also suitable for professionals who want to expand their knowledge and skills in information security, including those working in related fields such as compliance, governance, and cyber law. The boot camp is designed to prepare individuals for the CISSP exam and provide the necessary knowledge and skills to succeed in the field of information security.

Course Overview

1. Security and Risk Management

Understand and Apply Concepts of Confidentiality, Integrity, and Availability
Apply Security Governance Principles
Compliance
Understand Legal and Regulatory Issues that Pertain to Information Security in a Global Context
Develop and Implement Documented Security Policy, Standards, Procedures, and Guidelines
Understand Business Continuity Requirements
Contribute to Personnel Security Policies
Understand and Apply Risk Management Concepts
Understand and Apply Threat Modeling
Integrate Security Risk Considerations into Acquisitions Strategy and Practice
Establish and Manage Security Education, Training, and Awareness

2. Asset Security

Classify Information and Supporting Assets
Determine and Maintain Ownership
Protect Privacy
Ensure Appropriate Retention
Determine Data Security Controls
Establish Handling Requirements

3. Security Engineering

Implement and Manage an Engineering Life Cycle Using Security Design Principles
Understand Fundamental Concepts of Security Models
Select Controls and Countermeasures Based Upon Information Systems Security Standards
Understand the Security Capabilities of Information Systems
Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements
Assess and Mitigate Vulnerabilities in Web-based Systems
Assess and Mitigate Vulnerabilities in Mobile Systems
Assess and Mitigate Vulnerabilities in Embedded Devices and Cyber-Physical Systems
Apply Cryptography
Apply Secure Principles to Site and Facility Design
Design and Implement Facility Security

4. Communications and Network Security

Apply Secure Design Principles to Network Architecture
Securing Network Components
Design and Establish Secure Communication Channels
Prevent or Mitigate Network Attacks

5. Identity and Access Management

Control Physical and Logical Access to Assets
Manage Identification and Authentication of People and Devices
Integrate Identity as a Service (IDaaS)
Integrate Third-Party Identity Services
Implement and Manage Authorization Mechanisms
Prevent or Mitigate Access Control Attacks
Manage the Identity and Access Provisioning Life Cycle

6. Security Assessment and Testing

Design and Validate Assessment and Test Strategies
Conduct Security Control Testing
Collect Security Process Data
Conduct or Facilitate Internal and Third-Party Audits

7. Security Operations

Understand and Support Investigations
Understand Requirements for Investigation Types
Conduct Logging and Monitoring Activities
Secure the Provisioning of Resources through Configuration Management
Understand and Apply Foundational Security Operations Concepts
Employ Resource Protection Techniques
Conduct Incident Response
Operate and Maintain Preventative Measures
Implement and Support Patch and Vulnerability Management
Participate in and Understand Change Management Processes
Implement Recovery Strategies
Implement Disaster Recovery Processes
Test Disaster Recovery Plan
Participate in Business Continuity Planning
Implement and Manage Physical Security
Participate in Personnel Safety

8. Software Development Security

Understand and Apply Security in the Software Development Life Cycle
Enforce Security Controls in the Development Environment
Assess the Effectiveness of Software Security
Assess Software Acquisition Security

Saturday Review
Official Training Camp Value-Add Exam Review
Official CISSP Certification Exam (Test must be scheduled separate of the class with ISC2)

Prerequisites

Click here to see our unofficial CISSP offering

Course Comments

Inculdes Exam Voucher

Click here to see our other CISSP course option

Other Available Dates for this Course

Virtual Classroom Live
January 05, 2026

$4,300.00
6 Days    8:30 AM ET - 5 PM ET
view class details and enroll
Virtual Classroom Live
February 09, 2026

$4,300.00
6 Days    8:30 AM ET - 5 PM ET
view class details and enroll