CyberProtex
  • SOLUTIONS
    • Defense & Federal
    • Cloud & DevSecOps Engineering
    • Risk, Compliance & GRC
    • Rapid Prototyping
  • SERVICES
    • Managed Services >
      • Security Operations Center
      • Endpoint Protection
      • Operational Technology
      • Tabletop Exercises
      • Continuous Monitoring
    • Managed Security Services Provider (MSSP) >
      • Proactive Threat Monitoring
      • Managed Detection & Response (MDR)
      • Managed SIEM / Log Management
    • Security and Compliance >
      • Compliance and Governance >
        • Microsoft Purview
        • NIST 800-171 Assessments
        • CMMC Assessments
        • SPRS Score Checklist
      • Security Testing & Response >
        • Incident Response
        • Penetration Testing
        • Vulnerability Assessments
        • Phishing Simulations
  • SOFTWARE
    • Azure Migrations >
      • Azure Security and Federation
      • Identity and Access Management
    • Dynamics 365
    • SQL Management
    • DevSecOps
    • Application Security
    • Software Products >
      • Vulnerability Genius Software
      • eMASS Simulator Software
      • ICS - SCADA Simulations
      • CyberLMS Software
  • Training
    • Training Schedule
    • Certification >
      • Most Popular Certifications >
        • COMPTIA SECURITY+
        • CISM
        • ISC2-CISSP
        • CLOUD COMPUTING
        • AGILE AND SCRUM
        • ARTIFICAL INTELLIGENCE
        • DEVOPS
      • Cybersecurity Certifications >
        • ISC2-CC
        • ISC2-SSCP
        • ISC2-CGRC
        • ISC2-CSSLP
        • ISC2-ISSAP
        • ISC2-ISSEP
        • ISC2-ISSMP
        • ISACA-CISA
        • COMPTIA CASP+
        • COMPTIA CLOUD ESSENTIALS+
        • COMPTIA CLOUDNETX
        • COMPTIA DATA+
        • COMPTIA DATASYS+
        • COMPTIA DATAX
        • COMPTIA NETWORK+
        • COMPTIA PENTEST+
        • ISC2-CISSP
        • COMPTIA SECURITY+
        • COMPTIA SECURITYX
        • COMPTIA LINUX+
        • CISM
        • COMPTIA CYSA+
        • ISC2-CCSP
        • COMPTIA CLOUD+
        • COMPTIA A+
      • Microsoft Certifications >
        • SC-100
        • SC-200
        • AZ-500
        • SC-900
        • AZ-900
        • MS-900
        • PL-900
      • TOPICS >
        • CYBERSECURITY
        • CLOUD COMPUTING
        • ARTIFICAL INTELLIGENCE
        • VIRTUALIZATION
        • DEVOPS
        • AGILE AND SCRUM
      • BRANDS >
        • ISC2
        • COMPTIA
        • MICROSOFT
        • ISACA
        • AWS
        • CISCO
        • RED HAT
        • VMWARE
    • CMMC Coffee & Compliance >
      • Sensitivity Labels
      • Identity Is the New Perimeter
      • Access Control Without Breaking the Business
    • Tabletop Exercises >
      • Executive-Level TTXs
    • ICS - SCADA Training
    • YouTube Channel
    • Online Courses
    • BLOGS
  • About Us
    • Careers
    • Partners
    • Corporate-Offices >
      • Training Center
    • Community Outreach
    • Top Certs of 2025
  • Contact

​CISSP BOOTCAMP

Certified Information Systems Security Professional
Bootcamp 40 CPEs
​

In Person or Virtual Training
​
Group Training Available
Picture
March 23 - 27, 2026
Monday - Friday | 9am - 4pm CST
Register

Contact us for more information

Contact Us
Why ISC²'s – CISSP Matters
CISSP is the industry standard for senior cybersecurity professionals. Earning the CISSP proves you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program. With a CISSP, you validate your expertise, unlocking a broad array of exclusive resources, educational tools, and peer-to-peer networking opportunities
​

Prerequisites: 
The CISSP is ideal for experienced security practitioners, managers and executives interested in proving their knowledge across a wide array of security practices and principles. This course is ideal for individuals currently working in, or pursuing, roles such as: Chief Information Security Officer, Chief Information Officer, Director of Security, IT Director/Manager, Security Systems Engineer, Security Analyst, Security Manager, Security Auditor, Security Architect, Security Consultant, Network Architect
 

Learning Outcomes:
Through this CISSP Bootcamp, you will develop the skills to confidently lead security initiatives, understand complex security domains, and prepare thoroughly to pass the CISSP exam. With a CISSP, you validate your expertise and become an (ISC)² member, unlocking a broad array of exclusive resources, educational tools, and peer-to-peer networking opportunities. Prove your skills, advance your career, and gain the support of a community of cybersecurity leaders here to support you throughout your career
 

NICE Framework Connections:
  • Securely Provision
  • Operate and maintain
  • Protect and Defend
  • Oversee and Govern

​Knowledge Skills and Abilities (KSAs) Mapping:
The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Specialty Area details within the interactive National Cybersecurity Workforce Framework.
  • Risk Management
  • Systems Analysis
  • Vulnerability Assessment and Management
  • Cybersecurity Management
  • Program/Project Management and Acquisition
Course Outline:
  • Security and Risk Management
  • Network Security - EAP PEAP LEAP
  • Identity and Access Management (IAM) - Federation
  • Asset Security
  • Identity and Access Management (IAM) - Active Directory
  • Security Assessment and Testing
  • Asset Security -Intellectual Property
  • Identity and Access Management (IAM) - IAAA
  • Security Assessment and Testing - Types
  • Security Architecture and Engineering​
​​
  • Identity and Access Management (IAM) - Principle of Least Privilege
  • Security Operations - Defense in Depth
  • Security Architecture and Engineering - Models
  • Identity and Access Management (IAM) - Provisioning Accounts
  • Security Operations - HIDS vs. NIDS
  • Network Security - Architecture and Design
  • Identity and Access Management (IAM) - RBAC
  • Software Development Security
  • Software Development Security - Methods
Meet Your CISSP Instructor:
Benjamin McGee is the President and CEO of CyberProtex and a nationally recognized cybersecurity leader with deep experience in enterprise security, risk management, and compliance.
​
A CISSP, CEH Master Instructor, and NYU-educated cybersecurity professional, Ben has spoken at over 100 cybersecurity events nationwide and previously served as Chief Scientist at SAIC, earning multiple honors including the Trailblazer Award for cybersecurity.
​

This CISSP bootcamp is instructor-led, structured, and focused on helping experienced professionals truly understand the material, not just memorize it.
Picture
Mr. McGee has helped certify over 3,500 Cybersecurity Professionals over the United States. 
Bootcamp Includes
Picture

​Hear From Previous Customers:
PLEASE NOTE:  WE PROVIDE THE CISSP CERTIFICATION EXAM VOUCHER FOR THIS COURSE, BUT THE EXAM WILL NEED TO BE SCHEDULED SEPARATELY at a convenient Pearson-Vue test center. The exam voucher can be purchased through CyberProtex as part of the price or can be purchased directly through Pearson-Vue.
​

Exam voucher must be used (exam taken) within one year of bootcamp. 

All courses are subject to cancellation and/or rescheduling due to insufficient enrollment or unforeseen circumstances, as per CyberProtex Policy.  Additionally, if for some unforeseen reason an instructor cannot be available at any particular time, we will notify the attendees of the class as soon as possible and allow a makeup time for the missed instruction due to the instructors' absence.
CyberProtex, LLC - 2012-2026
850 Ben Graves Dr NW Suite 306, Huntsville, AL 35816
[email protected]
256-401-7072
Picture
  • SOLUTIONS
    • Defense & Federal
    • Cloud & DevSecOps Engineering
    • Risk, Compliance & GRC
    • Rapid Prototyping
  • SERVICES
    • Managed Services >
      • Security Operations Center
      • Endpoint Protection
      • Operational Technology
      • Tabletop Exercises
      • Continuous Monitoring
    • Managed Security Services Provider (MSSP) >
      • Proactive Threat Monitoring
      • Managed Detection & Response (MDR)
      • Managed SIEM / Log Management
    • Security and Compliance >
      • Compliance and Governance >
        • Microsoft Purview
        • NIST 800-171 Assessments
        • CMMC Assessments
        • SPRS Score Checklist
      • Security Testing & Response >
        • Incident Response
        • Penetration Testing
        • Vulnerability Assessments
        • Phishing Simulations
  • SOFTWARE
    • Azure Migrations >
      • Azure Security and Federation
      • Identity and Access Management
    • Dynamics 365
    • SQL Management
    • DevSecOps
    • Application Security
    • Software Products >
      • Vulnerability Genius Software
      • eMASS Simulator Software
      • ICS - SCADA Simulations
      • CyberLMS Software
  • Training
    • Training Schedule
    • Certification >
      • Most Popular Certifications >
        • COMPTIA SECURITY+
        • CISM
        • ISC2-CISSP
        • CLOUD COMPUTING
        • AGILE AND SCRUM
        • ARTIFICAL INTELLIGENCE
        • DEVOPS
      • Cybersecurity Certifications >
        • ISC2-CC
        • ISC2-SSCP
        • ISC2-CGRC
        • ISC2-CSSLP
        • ISC2-ISSAP
        • ISC2-ISSEP
        • ISC2-ISSMP
        • ISACA-CISA
        • COMPTIA CASP+
        • COMPTIA CLOUD ESSENTIALS+
        • COMPTIA CLOUDNETX
        • COMPTIA DATA+
        • COMPTIA DATASYS+
        • COMPTIA DATAX
        • COMPTIA NETWORK+
        • COMPTIA PENTEST+
        • ISC2-CISSP
        • COMPTIA SECURITY+
        • COMPTIA SECURITYX
        • COMPTIA LINUX+
        • CISM
        • COMPTIA CYSA+
        • ISC2-CCSP
        • COMPTIA CLOUD+
        • COMPTIA A+
      • Microsoft Certifications >
        • SC-100
        • SC-200
        • AZ-500
        • SC-900
        • AZ-900
        • MS-900
        • PL-900
      • TOPICS >
        • CYBERSECURITY
        • CLOUD COMPUTING
        • ARTIFICAL INTELLIGENCE
        • VIRTUALIZATION
        • DEVOPS
        • AGILE AND SCRUM
      • BRANDS >
        • ISC2
        • COMPTIA
        • MICROSOFT
        • ISACA
        • AWS
        • CISCO
        • RED HAT
        • VMWARE
    • CMMC Coffee & Compliance >
      • Sensitivity Labels
      • Identity Is the New Perimeter
      • Access Control Without Breaking the Business
    • Tabletop Exercises >
      • Executive-Level TTXs
    • ICS - SCADA Training
    • YouTube Channel
    • Online Courses
    • BLOGS
  • About Us
    • Careers
    • Partners
    • Corporate-Offices >
      • Training Center
    • Community Outreach
    • Top Certs of 2025
  • Contact