(ISC)2 CISSP Boot Camp - Only 6 Days

Why

Seven reasons why you should sit your CISSP course with Firebrand Training

Find Out How We Help You To Learn New Skills Quickly

  1. You'll be trained in just 6 days.
  2. Our course is all-inclusive. A one-off fee covers all course materials, exams, accommodation and meals. No hidden extras
  3. Pass CISSP first time or train again for free. This is our guarantee. We’re confident you’ll pass your course first time. But if not, come back within a year and only pay for accommodation, exams and incidental costs
  4. You’ll learn more. A day with a traditional training provider generally runs from 9am – 5pm, with a nice long break for lunch. With Firebrand Training you’ll get at least 12 hours/day quality learning time, with your instructor
  5. You’ll learn faster. Chances are, you’ll have a different learning style to those around you. We combine visual, auditory and tactile styles to deliver the material in a way that ensures you will learn faster and more easily
  6. You’ll be studying CISSP with the best. We’ve been named in Training Industry’s “Top 20 IT Training Companies of the Year” every year since 2010. As well as winning many more awards, we’ve trained and certified 67,286 professionals, and we’re partners with all of the big names in the business
  7. You'll do more than study courseware. We use practical exercises to make sure you can apply your new knowledge to the work environment. Our instructors use demonstrations and real-world experience to keep the day interesting and engaging

Think you are ready for the course? Take a FREE practice test to assess your knowledge!

What

Get CISSP trained in just six days on this accelerated course. The CISSP (certified information systems security professional) is globally recognised as the gold standard IT security certification – learn the skills you need to achieve it at twice the speed with Firebrand.

Developed by (ISC)2, the world’s leading cyber security membership association, the CISSP is key for professionals aiming for senior roles in information security. With Firebrand, you’ll build the expert knowledge needed to implement and manage an enterprise security programme.

On this accelerated course, you’ll study the eight domains of the CISSP Common Body of Knowledge (CBK):

  1. Security and Risk Management
  2. Asset Security
  3. Security Architecture and Engineering
  4. Communication and Network Security
  5. Identity and Access Management (IAM)
  6. Security Assessment and Testing
  7. Security Operations
  8. Software Development Security

Strengthen your skills as a security professional – this training is ideal for security consultants, analysts, managers, auditors and architects. Plus, the CISSP certification is highly desirable for ambitious professionals aiming to achieve Chief Information Security Officer (CISO) roles.


Train at twice the speed on this official CISSP course

Firebrand Training is an Authorised Provider of (ISC)2 training. On this accelerated course, you’ll get access to resources only available to authorised providers:

  • Expert training from authorised (ISC)2 instructors
  • Official courseware
  • Official CISSP Practice Exam and Evaluation

(ISC)2 Highest Performing Affiliate of the Year

Firebrand Training has been named as a “Highest Performing Affiliate of the Year – EMEA” by (ISC)2. Upon announcing the award, W. Hord Tipton, Executive Director of (ISC)2, stated: “This award represents Firebrand as the top performer for (ISC)2...for the EMEA region.”

Read more ...

Interested? See prices or call 080 80 800 888

(ISC)2 Membership Benefits

(ISC)2 is an international, non-profit membership association built for security professionals. When you certify, you’ll become a member of (ISC)². As a member, you’ll join a global network of 125,000+ and get access to an array of exclusive resources, tools and peer-to-peer networking opportunities, conference and event discounts.

Become a member by earning one of (ISC)2’s gold standard certifications. Contact us to find out more.

Benefits of Firebrand’s official six-day CISSP training

  • (ISC)2 instructors present the Common Body of Knowledge Seminar
  • Study with (ISC)2 copyrighted training material, which is unavailable to non-partner organisations
  • Prepare for your CISSP exam with the official (ISC)2 practice exam
  • Receive a personal critique of your practice exam results to help you focus on topics where additional focus should be given
  • Study faster with accelerated training in a distraction-free environment

Benefits of CISSP certification for your company

  • Establish information security best practices within your organisation
  • Organisations employing CISSP-certified professionals have their data and systems safeguarded by the best in the business
  • Provides a business and technology orientation to risk management

Other accelerated training providers rely heavily on lecture and independent self-testing and study.

Effective technical instruction must be highly varied and interactive to keep attention levels high, promote camaraderie and teamwork between the students and instructor, and solidify knowledge through hands-on learning.

Firebrand Training provides instruction to meet every learning need:

  • Intensive group instruction
  • One-on-one instruction attention
  • Hands-on labs
  • Lab partner and group exercises
  • Question and answer drills
  • Independent study

This information has been provided as a helpful tool for candidates considering training. Courses that include certification come with a Certification Guarantee. Pass first time or train again for free (just pay for accommodation, exams and incidental costs). We do not make any guarantees about personal successes or benefits of obtaining certification. Benefits of certification determined through studies do not guarantee any particular personal successes.

Read more ...

Interested? See prices or call 080 80 800 888

Domain 1: Security and Risk Management

1.1 Understand and apply concepts of confidentiality, integrity and availability

1.2 Evaluate and apply security governance principles

  • Alignment of security function to business
  • Security control frameworks strategy, goals, mission, and objectives
  • Due care/due diligence
  • Organisational processes (e.g., acquisitions, divestitures, governance committees)
  • Organisational roles and responsibilities

1.3 Determine compliance requirements

  • Contractual, legal, industry standards, and regulatory requirements
  • Privacy requirements

1.4 Understand legal and regulatory issues that pertain to information security in a global context

  • Cyber crimes and data breaches
  • Trans-border data flow
  • Licensing and intellectual property requirements
  • Privacy
  • Import/export controls

1.5 Understand, adhere to and promote professional ethics

  • (ISC)² Code of Professional Ethics
  • Organisational code of ethics

1.6 Develop, document, and implement security policy, standards, procedures, and guidelines

1.7 Identify, analyse and prioritise Business Continuity (BC) requirements

  • Develop and document scope and plan
  • Business Impact Analysis (BIA)

1.8 Contribute to and enforce personnel security policies and procedures

  • Candidate screening and hiring
  • Compliance policy requirements
  • Employment agreements and policies
  • Privacy policy requirements
  • Onboarding and termination processes
  • Vendor, consultant, and contractor agreements and controls

1.9 Understand and apply risk management concepts

  • Identify threats and vulnerabilities
  • Security Control Assessment (SCA)
  • Risk assessment/analysis
  • Monitoring and measurement
  • Risk response
  • Asset valuation
  • Countermeasure selection and implementation
  • Reporting
  • Applicable types of controls (e.g., preventive, Continuous improvement detective, corrective)
  • Risk frameworks

1.10 Understand and apply threat modelling concepts and methodologies

  • Threat modelling methodologies
  • Threat modelling concepts

1.11 Apply risk-based management concepts to the supply chain 

  • Risks associated with hardware, software, and SERVICES            
  • Service-level requirements services
  • Third-party assessment and monitoring
  • Minimum security requirements

1.12 Establish and maintain a security awareness, education, and training program

  • Methods and techniques to present awareness and training
  • Periodic content reviews
  • Program effectiveness evaluation

Domain 2: Asset Security

2.1 Identify and classify information and assets

  • Data classification
  • Asset Classification

2.2 Determine and maintain information and asset ownership

2.3 Protect privacy

  • Data owners
  • Data remanence
  • Data processors
  • Collection limitation

2.4 Ensure appropriate asset retention

2.5 Determine data security controls

  • Understand data states
  • Standards selection
  • Scoping and tailoring
  • Data protection methods

2.6 Establish information and asset handling requirements

Domain 3: Security Architecture and Engineering

3.1 Implement and manage engineering processes using secure design principles

3.2 Understand the fundamental concepts of security models

3.3 Select controls based upon systems security requirements

3.4 Understand security capabilities of information systems (e.g., memory protection, Trusted Platform Module (TPM), encryption/decryption)

3.5 Assess and mitigate the vulnerabilities of security architectures, designs, and solution

  • Client-based systems
  • Server-based systems
  • Database systems
  • Cryptographic systems
  • Industrial Control Systems (ICS)
  • Cloud-based systems
  • Distributed systems
  • Internet of Things (IoT)

3.6 Assess and mitigate vulnerabilities in web-based systems

3.7 Assess and mitigate vulnerabilities in mobile systems

3.8 Assess and mitigate vulnerabilities in embedded devices

3.9 Apply cryptography

  • Cryptographic life cycle (e.g., key management, algorithm selection)
  • Cryptographic methods (e.g., symmetric, asymmetric, elliptic curves)
  • Public Key Infrastructure (PKI)
  • Digital signatures
  • Non-repudiation
  • Integrity (e.g., hashing)
  • Understand methods of cryptanalytic attacks
  • Digital Rights Management (DRM)
  • Key management practices

3.10 Apply security principles to site and facility design

3.11 Implement site and facility security controls

  • Wiring closets/intermediate distribution facilities
  • Server rooms/data centres
  • Media storage facilities
  • Evidence storage
  • Restricted and work area security
  • Utilities and Heating, Ventilation, and Air Conditioning (HVAC) » Environmental issues
  • Fire prevention, detection, and suppression

Domain 4: Communication and Network Security

4.1 Implement secure design principles in network architectures

  • Open System Interconnection (OSI) and Transmission Control Protocol/Internet Protocol (TCP/IP) models
  • Internet Protocol (IP) networking
  • Implications of multilayer protocols
  • Software-defined networks
  • Wireless networks
  • Converged protocols

4.2 Secure network components             

  • Operation of hardware
  • Transmission media
  • Network Access Control (NAC) devices
  • Endpoint security
  • Content-distribution networks

4.3 Implement secure communication channels according to design

  • Voice
  • Multimedia collaboration
  • Remote access
  • Data communications
  • Virtualised networks

Domain 5: Identity and Access Management (IAM)

5.1 Control physical and logical access to assets

  • Information
  • Systems
  • Devices
  • Facilities

5.2 Manage identification and authentication of people, devices, and services

  • Identity management implementation
  • Registration and proofing of identity
  • Single/multi-factor authentication
  • Federated Identity Management (FIM)
  • Accountability
  • Credential management systems
  • Session management

5.3 Integrate identity as a third-party service

  • On-premise
  • Cloud
  • Federated

5.4 Implement and manage authorisation mechanisms

  • Role Based Access Control (RBAC)
  • Discretionary Access Control (DAC)
  • Rule-based access control
  • Attribute Based Access Control (ABAC)
  • Mandatory Access Control (MAC)

5.5 Manage the identity and access provisioning lifecycle

  • User access review
  • System account access review
  • Provisioning and deprovisioning

Domain 6: Security Assessment and Testing 

6.1 Design and validate assessment, test, and audit strategies

  • Internal
  • External
  • Third-party

6.2 Conduct security control testing

  • Vulnerability assessment
  • Code review and testing
  • Penetration testing
  • Misuse case testing
  • Log reviews
  • Test coverage analysis
  • Synthetic transactions
  • Interface testing

6.3 Collect security process data (e.g., technical and administrative)

  • Account management
  • Training and awareness
  • Management review and approval
  • Disaster Recovery (DR) and Business Continuity
  • Key performance and risk indicators (BC)
  • Backup verification data

6.4 Analyse test output and generate report

6.5 Conduct or facilitate security audits

  • Internal
  • External
  • Third-party

Domain 7: Security Operations

7.1 Understand and support investigations

  • Evidence collection and handling
  • Investigative techniques
  • Reporting and documentation
  • Digital forensics tools, tactics, and procedures

7.2 Understand requirements for investigation types

  • Administrative
  • Regulatory
  • Criminal
  • Industry standards
  • Civil

7.3 Conduct logging and monitoring activities

  • Intrusion detection and prevention
  • Continuous monitoring
  • Security Information and Event Management
  • Egress monitoring (SIEM)

7.4 Securely provisioning resources

  • Asset inventory
  • Asset management
  • Configuration management

7.5 Understand and apply foundational security operations concepts

  • Need-to-know/least privileges
  • Job rotation
  • Separation of duties and responsibilities
  • Information lifecycle
  • Privileged account management
  • Service Level Agreements (SLA)

7.6 Apply resource protection techniques

  • Media management
  • Hardware and software asset management

7.7 Conduct incident management

  • Detection
  • Recovery
  • Response
  • Remediation
  • Mitigation
  • Lessons learned
  • Reporting

7.8 Operate and maintain detective and preventative measures

  • Firewalls
  • Sandboxing
  • Intrusion detection and prevention systems
  • Honeypots/honeynets
  • Whitelisting/blacklisting
  • Anti-malware
  • Third-party provided security services

7.9 Implement and support patch and vulnerability management

7.10 Understand and participate in change management processes

7.11 Implement recovery strategies

  • Backup storage strategies
  • System resilience, high availability, Quality of
  • Recovery site strategies Service (QoS), and fault tolerance
  • Multiple processing sites

7.12 Implement Disaster Recovery (DR) processes

  • Response
  • Personnel
  • Communications

7.13 Test Disaster Recovery Plans (DRP)               

  • Assessment
  • Restoration
  • Training and awareness
  • Read-through/tabletop
  • Walkthrough
  • Simulation
  • Parallel
  • Full interruption

7.14 Participate in Business Continuity (BC) planning and exercises

7.15 Implement and manage physical security

  • Perimeter security controls
  • Internal security controls

7.16 Address personnel safety and security concerns

  • Travel
  • Emergency management
  • Security training and awareness
  • Duress

Domain 8: Software Development Security

8.1 Understand and integrate security in the Software Development Life Cycle (SDLC)

  • Development methodologies
  • Change management
  • Maturity models
  • Integrated product team
  • Operation and maintenance

8.2 Identify and apply security controls in development environments

  • Security of the software environments
  • Configuration management as an aspect of secure coding
  • Security of code repositories

8.3 Assess the effectiveness of software security

  • Auditing and logging of changes
  • Risk analysis and mitigation

8.4 Assess security impact of acquired software

8.5 Define and apply secure coding guidelines and standards

  • Security weaknesses and vulnerabilities at the source-code level
  • Security of application programming interfaces
  • Secure coding practices

Read more ...

Interested? See prices or call 080 80 800 888

What is a CISSP Boot Camp?

Firebrand’s CISSP Boot Camp is an accelerated course that will prepare you to take the challenging CISSP exam. Accelerated training is fast, but this is not a crash course – you’ll learn from a real-world security expert and study everything you need to know to pass the exam.

You’ll study the eight CISSP CBK (Common Body of Knowledge) domains using the most up-to-date curriculum and revision materials.

Firebrand’s CISSP bootcamp is ideal for experienced security professionals, including managers, auditors and consultants – or anyone aiming to achieve CISO roles.


Does Firebrand offer CISSP online training?

Firebrand does not provide online training for the CISSP certification. Instead, Firebrand’s CISSP course provides students with an opportunity to learn in-person from expert security instructors.


How much does CISSP training cost?

To find out the cost of this accelerated CISSP course and others, visit our prices page.


What is the CISSP CBK?

The CISSP Common Body of Knowledge (CBK) is an established information security framework covering security terminology, principles and a library of cyber security topics. It is sometimes referred to as the CISSP syllabus.

Created by (ISC)2, the CBK is used to assess a student’s level of security knowledge when preparing for and sitting the CISSP exam.

CISSPs are subject matter experts (SMEs) who work within two or more of these eight domains and possess advanced knowledge, skills, and experience gained through certification. 


What are the CISSP domains?

The CISSP exam covers 8 domains in 2018 which are:

  • Security and Risk Management
  • Asset Security
  • Security Engineering
  • Communications & Network Security
  • Identity & Access Management
  • Security Assessment & Testing
  • Security Operations
  • Software Development Security

What are the CISSP prerequisites?

To achieve this certification, you must have at least five years of cumulative, paid and full-time work experience in two or more of the eight CISSP CBK domains.

However, if you don’t meet these requirements, you can get a one-year experience waiver with:

  • A four-year college degree (or regional equivalent)
  • An approved credential from (ISC)2’s experience waiver list

You may also opt to take and sit the CISSP exam without the required experience. If you do pass the exam without the prerequisite experience, you will become an Associate of (ISC)2. You’ll then have six years to earn the work experience required, at which point you will receive your CISSP certification.


What does the CISSP exam cost in the UK?

The CISSP exam costs £560 in the UK.


How many hours is the CISSP exam?

The CISSP CAT exam duration is three hours. Exceptions can be provided to candidates with medical accommodations that are pre-approved by (ISC)2.

There is no minimum exam duration and students may proceed through the exam at their own pace.


What is the salary for a CISSP professional?

The average annual salary for professionals holding the CISSP certification is £60,000 – according to data from ITJobsWatch.

Read more ...

Interested? See prices or call 080 80 800 888

This accelerated CISSP course will prepare you for the following exam. The exam voucher is included in the course price. If you wish to take the exam, we'll provide guidance on how to book your seat at a Pearson Vue testing centre.

  • CISSP exam
    • Exam length: up to three hours
    • Number of questions: 100-150
    • Format: Multiple choice and advanced innovative questions
    • Passing grade: 700 out of 1000 points
    • Languages: English, French, German, Brazilian Portuguese, Spanish, Japanese, Simplified Chinese and Korean. The exam is also available in a format for Visually Impaired students.

You'll be tested on the eight CISSP domains:

  1. Security and Risk Management - 15%
  2. Asset Security - 10%
  3. Security Architecture and Engineering - 13%
  4. Communication and Network Security - 14%
  5. Identity and Access Management (IAM) - 13%
  6. Security Assessment and Testing - 12%
  7. Security Operations - 13%
  8. Software Development Security - 10%

After passing your exam

Once you have successfully passed your certification exam, you'll receive your certificate and ID card. Upon receiving notification of your exam success, you will be required to subscribe to the (ISC)2 Code of Ethics and have your application endorsed before the credential can be awarded.

An endorsement form for this purpose must be completed and signed by an (ISC)2 certified professional who is an active member, and who can attest to your professional experience. You are required to become certified within nine months of the date of your exam.

If you do not become certified or an Associate of (ISC)2 within 9 months of the date of your exam, you will be required to retake the exam in order to become certified. It is possible for (ISC)2 to endorse you if you cannot find a certified individual to act as one.

Maintenance Requirements

The CISSP certification has annual and three-year CPE requirements. To maintain your certification you must:

  • Earn and submit a minimum of 40 Continuing Professional Education (CPE) credits each year of the three year certification cycle
  • Gain a minimum of 120 CPE credits every three years
  • Pay the annual maintenance fee (AMF) of USD$85 each year of your three-year certification cycle
  • Fully support and abide by the (ISC)2 Code of Ethics

Please note: Passing candidates may be randomly selected and audited by (ISC)2 Member Services prior to issuance of a certification. Attaining multiple certifications may result in a candidate being audited more than once. Firebrand Training will provide support for candidates that are audited.

Read more ...

Interested? See prices or call 080 80 800 888

On your accelerated CISSP course, you'll get access to resources only available to authorised (ISC)2 training providers:

  • Authorised (ISC)2 instructors vetted by (ISC)2 and trained to deliver (ISC)2 certification courses
  • Official and up-to-date courseware, including "The Official (ISC)2 CISSP CBK Review Seminar - Student Handbook"
  • Official Practice Exam

Firebrand will also provide you with:

  • Personal exam-readiness evaluation
  • Supplementary material designed to further strengthen your knowledge in preparation for the exam

Please note: If you are funding this accelerated course through the MOD's Enhanced Learning Credits (ELC) scheme, you must pay separately for accommodation and meals. For more information, contact us on 080 80 800 888.

Firebrand Training offers top-quality technical education and certification training in an all-inclusive course package specifically designed for the needs and ease of our students. We attend to every detail so our students can focus solely on their studies and certification goals.

Our Accelerated Learning Programmes include:

  • Intensive Hands-on Training Utilising our (Lecture | Lab | Review)TM Delivery
  • Comprehensive Study Materials, Program Courseware and Self-Testing Software including MeasureUp *
  • Fully instructor-led program with 24 hour lab access
  • Examination vouchers **
  • On site testing ***
  • Accommodation, all meals, unlimited beverages, snacks and tea / coffee****
  • Transportation to/from designated local railway stations
  • Examination Passing Policy

Our instructors teach to accommodate every student's learning needs through individualised instruction, hands-on labs, lab partner and group exercises, independent study, self-testing, and question/answer drills.

Firebrand Training has dedicated, well-equipped educational facilities where you will attend instruction and labs and have access to comfortable study and lounging rooms. Our students consistently say our facilities are second-to-none.

Firebrand goes digital

We’re currently migrating from printed to digital courseware. Some courseware is already available in digital, while other books remain in printed form. To find out if this course is digital, call us on 080 80 800 888.

There are several benefits of easy-to-use digital courseware: downloads are immediate, and you’ll always have your courseware available wherever you are. You won’t need to wait for a printed book to be delivered before you start learning – and it’s better for the environment. You can choose to download the courseware to your own device, or borrow one of ours.

Considering a Microsoft course? Always have the most up-to-date Microsoft digital courseware with ‘Fresh Editions’. This gives you access to all versions of digital courseware – you’ll receive updates and revisions of your textbook, at no charge, for the life of that course.

Examination Passing Policy

Should a student complete a Firebrand Training Program without having successfully passed all vendor examinations, the student may re-attend that program for a period of one year.  Students will only be responsible for accommodations and vendor exam fees.

Please note

  • * Not on all courses
  • ** Examination vouchers are not included for the following courses: PMI, GIAC and CISSP CBK Review
  • *** On site testing is not included for our PMI, GIAC, (ISC)2, CREST, CSX Practitioner or ITIL Managers and Revision Certification Courses
  • **** Accommodation not included on the CISSP CBK Review Seminar

Read more ...

Interested? See prices or call 080 80 800 888

To achieve this certification, you must have:

  • At least five years cumulative, paid, full-time work experience in two or more of the eight (ISC)2 CISSP Body of Knowledge (CBK) domains

If you don’t meet the work experience requirement you can get a one year experience waiver with:

  • A four-year college degree (or regional equivalent)
  • An approved credential from (ISC)2’s experience waiver list

Alternatively, you may opt to take and sit the CISSP exam without the required experience. Pass the exam and you will become an Associate of (ISC)2 – you’ll then have six years to earn the work experience required. Upon gaining the experience you will receive your full CISSP certification.

Unsure whether you meet the prerequisites?

Don’t worry - we’ll discuss your technical background, experience and qualifications to determine whether this accelerated course suits you.

Just call us on 080 80 800 888 and speak to one of our enrolment consultants.

Firebrand is an immersive environment and requires commitment. Some prerequisites are simply guidelines; you may find your unique experience, attitude and determination enables you to succeed on your accelerated course.

Interested? See prices or call 080 80 800 888

When

When do you want to sit your accelerated course?

Start

Finish

Status

Book now

Finished

 

Finished

 

Running

 

Open

Book now

Open

Book now

Open

Book now

Open

Book now

Open

Book now

Reviews

Here's the Firebrand Training review section. Since 2001 we've trained exactly 67,286 students and asked them all to review our Accelerated Learning. Currently, 96.67% have said Firebrand exceeded their expectations.

Read reviews from recent accelerated courses below or visit Firebrand Stories for written and video interviews from our alumni.


"An intense week but completely worth it. You will never be as prepared for an exam after sitting through this week. Highly recommended and the Firebrand staff are amazing as always."
Kyle Williams, Win Technologies. - (ISC)2 CISSP Boot Camp (6 days) (2018.5.21 to 2018.5.26)

"Brilliant tutor. Well laid out course. Good facilities"
Mark Sawyer, SLAUGHTER AND MAY 02. - (ISC)2 CISSP Boot Camp (6 days) (2018.5.21 to 2018.5.26)

"Fantastic facilities, well structured course topped off by engaging and charismatic instructor. Whole package is what beats the competitor."
Anonymous - (ISC)2 CISSP Boot Camp (6 days) (2018.4.30 to 2018.5.5)

"Really enjoyable experience with the instructor and the CISSP course. The breadth of knowledge, and life experience the instructor has shines through in his delivery and makes for a (mostly) fun, and very interesting course. It has certainly increased my desire and determination to gain the CISSP qualification."
Hemant Mistry. - (ISC)2 CISSP Boot Camp (6 days) (2018.4.30 to 2018.5.5)

"Despite the huge range of topics to take in, the instructor delivered the course in a lively and interesting manner, with great "Real-Life" associations. Not being and IT-Tech-y, I was slightly concerned before the course, but this should not put anyone off doing the course!"
Mark Hempton, International Nuclear Services. - (ISC)2 CISSP Boot Camp (6 days) (2018.4.30 to 2018.5.5)

"This is my first experience with Firebrand and I was impressed by the quality of the organization and delivery of the training. "
Anonymous - (ISC)2 CISSP Boot Camp (6 days) (2018.4.30 to 2018.5.5)

"A very big course packed into quite a long and hard week, but a well structured course reinforced important points and principals throughout. "
Anonymous - (ISC)2 CISSP Boot Camp (6 days) (2018.4.30 to 2018.5.5)

"Training, Food and accommodation all in one location makes a difficult course easier to take in - the usual personal admin factor is taken away. The staff and instructors are great and the course content (for CISSP in my case) was delivered very well and in a logical way."
Roy Organ, MOD. - (ISC)2 CISSP Boot Camp (6 days) (2018.4.30 to 2018.5.5)

"Firebrand training is second to none, with talented and knowledgeable instructors who deliver courses using their experience in IT, not simply a theory perspective."
John Thomas, Zigbee Limted. - (ISC)2 CISSP Boot Camp (6 days) (2018.2.19 to 2018.2.24)

"Really good facilities, well run with professional staff. Looking forward to my next course with Firebrand."
Nicholas Wieckowski, MOD. - (ISC)2 CISSP Boot Camp (6 days) (2018.2.19 to 2018.2.24)

"Firebrand have provided an intense and fun week on the CISSP course. A great day of knowledge was shared and the learning environment was open and conducive to discussion and a deeper understanding. I would highly recommend Firebrand CISSP course."
K.R.. - (ISC)2 CISSP Boot Camp (6 days) (2018.2.19 to 2018.2.24)

"Great staff, great facilities, great experience."
A.W.. - (ISC)2 CISSP Boot Camp (6 days) (2018.2.19 to 2018.2.24)

"Great course, location and trainer with really insightful stories/examples that bring the subject to life."
Justin Stevens, teleperformance. - (ISC)2 CISSP Boot Camp (6 days) (2018.2.19 to 2018.2.24)

"A very "real world" learning experience that will help me immensely in my career. "
Anonymous - (ISC)2 CISSP Boot Camp (6 days) (2018.1.15 to 2018.1.20)

"Really enjoyed my time, even with the long days. Plenty of course content to learn but it was delivered in a constructive way, making it easy to learn. It helped me feel ready to take the exam."
Jason Lucas, Proact. - (ISC)2 CISSP Boot Camp (6 days) (2017.12.11 to 2017.12.16)

"Great Instructor!"
Kevin Worki. - (ISC)2 CISSP Boot Camp (6 days) (2017.12.11 to 2017.12.16)

"Great support and lots of good content. I've never learned and understood anything so quickly in such a short time."
Christopher Searles. - (ISC)2 CISSP Boot Camp (6 days) (2017.12.11 to 2017.12.16)

"I think that it would be exceptionally difficult to find a more accomplished instructor."
C.D.. - (ISC)2 CISSP Boot Camp (6 days) (2017.10.23 to 2017.10.29)

"Fantastic supplement to my knowledge and experience; I would not have passed this exam any other way!"
Keith Cottenden, Cyfor. - (ISC)2 CISSP Boot Camp (6 days) (2017.10.23 to 2017.10.29)

"Instructor was calm, measured and knowledgeable. Was pretty good at reading the class and was punctual, available and willing to assist with topics outside of the training hours. "
Craig Hendley, FTI. - (ISC)2 CISSP Boot Camp (6 days) (2017.10.23 to 2017.10.29)

"The instructor was great and I am already looking at taking more Firebrand (ISC2) courses taught by him. Wyboston is a very acceptable training centre & accommodation. Looking forward to the next!"
Chris Wicks, Baringa. - (ISC)2 CISSP Boot Camp (6 days) (2017.10.23 to 2017.10.29)

"Do not fear this course if you are non technical. The concepts are explained in very clear and non-technical ways!"
Stuart Leworthy. - (ISC)2 CISSP Boot Camp (6 days) (2017.9.18 to 2017.9.24)

"Brilliant, accomplished an impossible exam in no time."
Kunal Hatode, NTT Security. - (ISC)2 CISSP Boot Camp (6 days) (2017.9.18 to 2017.9.24)

"I have learnt a lot that I will use at work."
Jason Medhurst, N/A. - (ISC)2 CISSP Boot Camp (6 days) (2017.9.18 to 2017.9.24)

"My time here has been outstanding and intense, almost relentless, but he has helped to understand a domain I am not very well versed in, in a very easy to follow manner"
Adam Fallon. - (ISC)2 CISSP Boot Camp (6 days) (2017.9.18 to 2017.9.24)

"I can recommend Firebrand and their CISSP bootcamp wholeheartedly. The Instructor was excellent, the management very friendly and helpful and the facilities excellent and certainly conducive as a learning environment"
Philip Sills, MOD. - (ISC)2 CISSP Boot Camp (6 days) (2017.9.18 to 2017.9.24)

"We use Firebrand to train our team and new starters because the training is consistently good and the immersive environment is perfect for learning and getting through exams."
Richard Clarke, SQA. - (ISC)2 CISSP Boot Camp (6 days) (2017.9.18 to 2017.9.24)

"Great place to learn, environment is set up for students to learn and get ready for exams, As a returning student I will gladly come back again!"
Lee Bhagat, Genertali UTB. - (ISC)2 CISSP Boot Camp (6 days) (2017.9.18 to 2017.9.24)

"Course venue, Instructor support staff and content "spot on", pass or fail I've learnt a lot with the safety net that I can come back for free!"
Paul McDonald, Thomas Miller. - (ISC)2 CISSP Boot Camp (6 days) (2017.9.18 to 2017.9.24)

"Firebrand - where quality counts."
John Nulty, Amethyst Risk Management. - (ISC)2 CISSP Boot Camp (6 days) (2017.9.18 to 2017.9.24)

"Second time at Firebrand, both very intense but both great successes."
Ryan Licchelli, Complete IT. - (ISC)2 CISSP Boot Camp (6 days) (2017.9.18 to 2017.9.24)

"Firebrand excelled my expectations in the way they can deliver a course. Professional, well organized and extensive."
Luigi Ritacca, BBC. - (ISC)2 CISSP Boot Camp (6 days) (2017.9.18 to 2017.9.24)

"The insight and anecdotes given by the instructor really helped the subject matter to sink in. His way of explaining complex methodologies was outstanding. Thank you!"
Nigel Peirce, Merge with Lukes record. - (ISC)2 CISSP Boot Camp (6 days) (2017.9.18 to 2017.9.24)

" Excellent Training Facilities and instructor. Highly recommended for CISSP training in a fast and efficient manner! "
C.H.. - (ISC)2 CISSP Boot Camp (6 days) (2017.9.18 to 2017.9.24)

"I'm glad to have had this training with Firebrand"
Abdulaziz Al-Enezi, ELM. - (ISC)2 CISSP Boot Camp (6 days) (2017.8.21 to 2017.8.27)

"The knowledge anyone will get from Firebrand is valuable and excellent for any Information Security Officer."
Mirah Ahmad, DEWA. - (ISC)2 CISSP Boot Camp (6 days) (2017.8.21 to 2017.8.27)

"I would recommend Firebrand to anyone who is looking for quality training!"
Ahmed Shahid, Dubai electricity and water authority. - (ISC)2 CISSP Boot Camp (6 days) (2017.8.21 to 2017.8.27)

"The best place to study and learn new things and expand your knowledge with the best practices."
Khaleed Al Memari, FDC. - (ISC)2 CISSP Boot Camp (6 days) (2017.8.21 to 2017.8.27)

"Ideal environment to learn without distraction."
Joyce Robertson, Standard Life Aberdeen. - (ISC)2 CISSP Boot Camp (6 days) (2017.8.21 to 2017.8.27)

"Firebrand are a well oiled machine. There is no need to worry about anything as Firebrand have everything covered! "
Jayson Dudley, Mazars LLP. - (ISC)2 CISSP Boot Camp (6 days) (2017.8.21 to 2017.8.27)

"6 x 14 hr days...far more than other CISSP courses EXAM READY - unlike other CISSP courses"
Paul Thomas, MOD. - (ISC)2 CISSP Boot Camp (6 days) (2017.8.21 to 2017.8.27)

"High quality materials with a clearly knowledgeable instructor made for a thorough learning experience. "
Abdel Hamid Chachi, Insitute of Applied Technology. - (ISC)2 CISSP Boot Camp (6 days) (2017.7.17 to 2017.7.23)

"This is my 4th time and I will continue to come back!"
Steven Wright, Citrix. - (ISC)2 CISSP Boot Camp (6 days) (2017.7.17 to 2017.7.23)

"Thank you for everything. Thanks for a wonderful enjoyable experience!"
Anonymous - (ISC)2 CISSP Boot Camp (6 days) (2017.7.17 to 2017.7.23)

"Brilliant instructor, brilliant training provider "
Anonymous - (ISC)2 CISSP Boot Camp (6 days) (2017.7.17 to 2017.7.23)

"Whole week was well organised and run. Would recommend to anyone without hesitation. "
Kevin Vigar, Arqiva. - (ISC)2 CISSP Boot Camp (6 days) (2017.6.19 to 2017.6.25)

"Firebrand offer a good way to get certified quickly. Its very intense and perhaps does not suit everyone. However the total immersion of a residential course is an excellent way to get through content quickly."
Tim Goldfield, Geek Guru Ltd. - (ISC)2 CISSP Boot Camp (6 days) (2017.6.19 to 2017.6.25)

"Firebrand Training brings focus, you are completely submersed in the training and it allows for dedicated training. The facility is secluded enough to ensure that there are no temptations to wonder away from study. Whilst it is not military training it is regimented enough to provide you with the best possible out come."
Stewart Taylor, Director and Owner of Taylormade Information Security Ltd. - (ISC)2 CISSP Boot Camp (6 days) (2017.6.19 to 2017.6.25)

"The location was exceptional and very conducive to learning. The instructors and support staff were knowledgeable, supportive and professional. The food wasnt bad either. "
Chris White. - (ISC)2 CISSP Boot Camp (6 days) (2017.6.19 to 2017.6.25)

"Doing courses at Firebrand is one of the best things that have happened in my life and career this year. Thanks Firebrand"
Rami Al Dhafiri, Boubyan Bank. - (ISC)2 CISSP Boot Camp (6 days) (2017.5.15 to 2017.5.21)

See prices