(ISC)2 CISSP Instructor-Led Training Live and In-Person In Huntsville, AL

December 2-6, 2019


Winter Sale

 $3,245  Now $2,750 

Live and In-Person Instructor-Led Training.

All required classroom materials and testing vouchers included.


*Additional Discount(s) available for multi-student or proof of professional membership affiliation (e.g., Chamber of Commerce, PMI, ISACA, (ISC)2, etc..)





Systems Atlanta’s CISSP training will prepare you for the following skills that you will master and validate:

Security and Risk Management

This is the largest domain and contains 15% of the CISSP Exam content.  Topics covered include IT Policies and Procedures; Compliance Requirements; Security Governance Principles; Risk-Based Management Concepts; and the Confidentiality, Integrity and Availability of Information.

Asset Security

This accounts for about 10% of the exam, and addresses the physical requirements of information security.  Topics covered include Data Security Controls; Retention Periods; Privacy; Handling Requirements; and the Classification and Ownership of Information and Assets.

Security Engineering

This accounts for 13% of the exam, and addresses several important information security concepts such as Fundamental Concepts of Security Models; Security Capabilities of Information Systems; Cryptography; Engineering Processes Using Secure Design Principles; and Assessing and Mitigating Vulnerabilities in Systems.

Communications and Network Security

This accounts for 14% of the exam and addresses the design and protection of an organization’s networks.  Topics covered include Secure Design Principles for Network Architecture; Secure Network Components; and Secure Communication Channels.

Security Operations

This accounts for 13% of the exam and addresses the way plans are put into action.  Topics include Business Continuity; Disaster Recovery; Incident Management; Managing Physical Security; Understanding and Supporting Investigations; Requirements for Investigation Types; Logging and Monitoring Activities; Securing the Provision of Resources; Foundational Security Operations Concepts; and Applying Resource Protection Techniques.

Identity and Access Management

This accounts for 13% of the exam, and addresses helping information security professionals understand how to control the way users can access data.  Topics include Identification and Authentication; Authorization Mechanisms; The Identity and Access Provisioning Lifecycle; Physical and Logical Access to Assets; and Integrating Identity as a Service and Third-Party Identity Services.

Software Development Security

This accounts for 10% of the exam and addresses helping professionals understand, apply and enforce software security.  Topics covered include Secure Coding Guidelines and Standards; Security in the Software Development Lifecycle; Security Controls in Development Environments; and The Effectiveness of Software Security.

Security Assessment and Testing

This accounts for 12% of the exam, and addresses the design, performance and analysis of security testing.  Topics include Security Control Testing; Test Outputs; Internal and Third-Party Security Audits; Collecting Security Process Data; and Designing and Validating Assessment and Test Strategies.

Exam Details:

  • (ISC)2 requires exam candidates to have a minimum of five years of relevant work experience in two or more of the ten domains, four years of work experience with an applicable college degree, or a credential from the (ISC)2-approved list. 
  • The CISSP certification requires successfully passing the CISSP exam (administered by (ISC)2) and having met the experience requirements.
  • Number of Questions:  Minimum of 100, Maximum of 150
  • Length of Exam: 3 Hours

5 Day Instructor-Led Training Course / Live and IN-PERSON

SAI believes in full immersion training and a significant element of that is an instructor physically in the classroom with you. We provide that!

Earning the Certified Information Systems Security Professional (CISSP) proves you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program. With a CISSP, you validate your expertise and become an (ISC)² member, unlocking a broad array of exclusive resources, educational tools, and peer-to-peer networking opportunities.

Get Started

Went through a two weekend bootcamp for CISSP with John. One of the best classes I’ve ever had, wish all of my professors were like him! Passed the CISSP on the first shot.

Michael Gordover, CISSP, ITPM

Hack’s mastery of the technical domain is impressive. But it’s his ability to teach students with a wide range of expertise that sets him apart. His teaching method leverages an innovative Conceptual Linking process to visualizing the connection between security domains and information concepts. It’s a technique I’ve used repeatedly to break down complex topics into digestible components. I would highly recommend security education from John Hackmeyer to students seeking to fully learn the material at hand.

Sean Curry, CISSP, CISM


I attended a CISSP bootcamp that Hack was teaching and with his Conceptual Linking teaching style I was able to easily pass the brutal CISSP exam. Hack is a no-nonsense and get the job done kind of guy and I recommend him to anyone looking for a trainer or consultant.

Donald Pandori, CISSP

Meet John  Hackmeyer:
Your new favorite trainer.

Hack started his security career as a systems engineer and eventually went on to become an instructor, instructional designer, content developer, and a leader in sales enablement.

Over the last two decades, Hack has continually educated himself in order to better educate others. Here is a partial list of certifications Hack has achieved: CISSP, CISM, CEH, CCSA, CCDA, CCNA and MCSE.

His students have a 92% Pass Rate after completing certification training!

Class Starts In








We're Here To Help!


1100 Cobb Intenrnational Place NW
Kennesaw, GA 30152


M-F: 9am – 5pm
S-S: Closed

Call Us

(770) 790-5340


Systems Atlanta will match any competitor’s price quote on qualifying training courses for both individual training seats and private group training events.  Quote must be an “apples-to-apples” comparison (number of days, vouchers, materials, delivery method, etc.) with the name and address of the competitor. Competitor quotes may not be more than 30 days old.