Authorized CISSP Course in Prague

What you get?

CISSP® - The industry leading credential.

This course is not about having a certificate on a wall. It is about establishing holistic security programs to protect organizations.
Ask me for details

CISSP®

If you are working or involve in cyber-security or information governance, now it is time to take your experience to the next level.
This course is ideal for individuals with security responsibilities, for example:
  • Chief Information Security Officer (CISO), IT Director/Manager
  • Security Consultants, Analyst, Managers, Systems Engineers.
  • Security Auditor, IT Auditors.
At the end of this course, you will be ready to excel and pass your CISSP exam and get certified.

(ISC)2 - Associate

If you are serious about Security, this course will help understanding and applying security best practices – today and in the future.
This course will help you to demonstrate cybersecurity knowledge while working to gain experience required for the CISSP certification

At the end of this course and passing the CISSP exam, you will earn the status of (ISC)2 Associate. By obtaining the additional cumulative work experience in the domains of the certification and completing the endorsement process, you will be able to reach your goal.

This intensive course includes the following modules:

Note: Modules are based on the official CISSP courseware

Secure what matters

Risk Management and Governance models are here to help you to prioritize your efforts for allocating resources to secure a system.

At the end of this module you will know how to prioritize your security efforts by following Risk Management tools and techniques.

Where to start

To implement a security program, you need to start with the fundamental problem: "Where my data and/or assets are".

At the end of this module you will know how to effectively implement data classification, privacy controls, data security controls and discover "unknowns" that required to be protected.

Build and Manage Security

Building security within an engineering process is not an easy task, by "building security" from the beggining you will be able to prevent rather than correct.

At the end of this module you will now the different security engineering practices and modern techniques and tool to engineer and manage of security.

Network Security

With more a more devices connected to a network, such as your toaster or laptop, you will learn how to secure network components including designing a good architecture.

At the end of this module you will be familiar with common network attacks and the best way to protect against them (by preventing them in the first place)

Who are you?

Allocating identities and implementing access controls are a fundamental step in any security program.

At the end of this module you will understand the access provisioning lifecycle, their corresponding threats and corresponding access controls.

Test and Validate

Is your security really working?. There are two ways to find out: Your systems might get hacked and you will find out on the press; or you might choose to test your security controls. Clearly, finding the issues first (so you can fix them) is the best place to be.

At the end of this module you will be able to define good security test strategies that will help you to identify vulnerabilities effectively.

Bussiness as Usual

Security should be part of your organization DNA, and security should not be a "extra work" - but the "normal way to work"

At the end of this module you will be able to design good security controls within the normal operations, including Incident Managament, change management and other operational activities.

Secure Development

Security in the software development lifecycle allows to design and enforce Software security effectively. Security by design should be part of your software acceptance criteria.

At the end of this module you will be able to design and implement robost security controls within the development of systems.