Certified Information Systems Security Professional

Unique learning experience to become a CISSP®

CISSP® - The industry leading credential.

This course is not about having a certificate on a wall. It is about establishing holistic security programs to protect organizations.

CISSP in Prague

CISSP®

If you are working or involve in cyber-security or information governance, now it is time to take your experience to the next level.
This course is ideal for individuals with security responsibilities, for example:
  • Chief Information Security Officer (CISO), IT Director/Manager
  • Security Consultants, Analyst, Managers, Systems Engineers.
  • Security Auditor, IT Auditors.
At the end of this course, you will be ready to excel and pass your CISSP exam and get certified.
CISSP in Prague

(ISC)2 - Associate

If you are serious about Security, this course will help understanding and applying security best practices – today and in the future.
This course will help you to demonstrate cybersecurity knowledge while working to gain experience required for the CISSP certification

At the end of this course and passing the CISSP exam, you will earn the status of (ISC)2 Associate. By obtaining the additional cumulative work experience in the domains of the certification and completing the endorsement process, you will be able to reach your goal.

Join Today

When? What's included?

19th - 23- June

23th - 27 October

Contact us to know the details or any concern you might have about this course.

Know more and get certified

Get ready to present the CISSP® Exam

Get the official courseware

Study aids to prepare to pass the exam

Practice exam

Personalized approach

This intensive course includes the following modules:

Note: Modules are based on the official CISSP courseware

Secure what matters

Risk Management and Governance models are here to help you to prioritize your efforts for allocating resources to secure a system.

At the end of this module you will know how to prioritize your security efforts by following Risk Management tools and techniques.

Where to start

To implement a security program, you need to start with the fundamental problem: "Where my data and/or assets are".

At the end of this module you will know how to effectively implement data classification, privacy controls, data security controls and discover "unknowns" that required to be protected.

Build and Manage Security

Building security within an engineering process is not an easy task, by "building security" from the beggining you will be able to prevent rather than correct.

At the end of this module you will now the different security engineering practices and modern techniques and tool to engineer and manage of security.

Network Security

With more a more devices connected to a network, such as your toaster or laptop, you will learn how to secure network components including designing a good architecture.

At the end of this module you will be familiar with common network attacks and the best way to protect against them (by preventing them in the first place)

Who are you?

Allocating identities and implementing access controls are a fundamental step in any security program.

At the end of this module you will understand the access provisioning lifecycle, their corresponding threats and corresponding access controls.

Test and Validate

Is your security really working?. There are two ways to find out: Your systems might get hacked and you will find out on the press; or you might choose to test your security controls. Clearly, finding the issues first (so you can fix them) is the best place to be.

At the end of this module you will be able to define good security test strategies that will help you to identify vulnerabilities effectively.

Bussiness as Usual

Security should be part of your organization DNA, and security should not be a "extra work" - but the "normal way to work"

At the end of this module you will be able to design good security controls within the normal operations, including Incident Managament, change management and other operational activities.

Secure Development

Security in the software development lifecycle allows to design and enforce Software security effectively. Security by design should be part of your software acceptance criteria.

At the end of this module you will be able to design and implement robost security controls within the development of systems.

Plan

Register to the Course


One month before we start the course, let me know the domains or topics you believe are less known to you


This will help us to enhance your learning experience during the course

Do

Join the fun during 5 intensive days


Raise your questions and share your ideas to the group

Check

Try the test exam and identify areas that require more attention.


We will complete a retrospective of the course to identify lessons learnt and we will prepare a plan to help you to prepare for the exam.

Act

Review the study notes and flashcards provided


Raise your questions, concern and reach out via Facebook, Twitter or via e-mail


Engage with our (ISC)2 community