CISSP ® – Certified Information Systems Security Professional

Training Courses and Certification Exam Preparation (Bootcamp)

We also deliver all our courses online through live interactive video sessions. Discover our Certifying Training Options.

We have advised more than 400 companies and trained over 1500 professionals. Will you be next?

Next courses (more below)

Current Month

Upcoming courses

11nov(nov 11)09:0015(nov 15)16:30CISSP - Exam BootcampIN-CLASSROOM – Geneva / Lausanne - Switzerland / ONLINE – Live Interactive

16dec(dec 16)09:0020(dec 20)16:30CISSP - Exam BootcampIN-CLASSROOM – Lausanne - Switzerland / ONLINE – Live Interactive

Information Systems Security

This 5-day training is composed of theory modules covering the 8 CISSP domains which were updated in April 2015, interlaced with exam questions, offering the participant an optimal preparation for the certification exam.

Official BCI Certification

The Best CISSP training

ACTAGIS proposes worldwide up to date  learning and preparation classes for CISSP certifications.

We guarantee your exam success

Nearly 100% success rate!
We will support you until you pass the exam of the course in which you enroll (some conditions apply). We offer the official mock exams to help you prepare.

Swiss Quality around the world

Our attention to detail, staying up to date, all reflect our commitment to quality. Our trainers bring real-life project experience in implementing frameworks and programs in large organizations.

Hands-on exercises

Free consulting session included

Most of our training programs include a supplementary free online consulting session to help you implement your project in your organisation.

Small classes

Competitive pricing

To ensure that our courses are available to all sizes of companies, we practice competitive pricing.

English and French

Learn from where you are

Our courses are delivered in a traditional classroom setting, as well as live online with an instructor. Certain courses are also available in a self-study format.

What our clients are saying

“ACTAGIS trainer has first hand experience in most the domains covered by the CISA program. This proved to be invaluable in making ISACA’s somewhat theoretical subjects very tangible and meaningful. Many thanks for this great step towards the CISA certification.”Tom RoystonCIO

“During all of the CISA, Business Continuity Management and ISO 27001 LI sessions, the consultant openly shared his insightful experiences, carefully listened to all of the participants’ most puzzling questions, remarks, criticisms… and gave precious explanations, recommendations and advice.”Savrak SarHead of IT, Haute école pédagogique

“A great course and a serious levelling up with a good dive into the universe of CISA.”Josselin RenardIT Systems Auditor, UBS

“I thank the consultant for this ISO 27001 training. His pedagogy, technical expertise and long experience in the field make the difference and bring real added value. Course materials are of high quality and the exchanges throughout this training allowed me to assimilate the material and go beyond theory.”Daniel MeierHead Internal Audit, Vaudoise Assurances

At our Business Continuity Management (BCM) certification training, the trainer managed not only to cover perfectly the specific, certification-related topics but he also opened windows and connections to other standardization bodies. It was an excellent week enriching our knowledge broadly. Thank you!Christoph TeuberGroup Safety & Security Manager, Swiss Re

“The Business Continuity Management (BCM) course with ACTAGIS enabled me to consolidate and reinforce the knowledge related to the domain. A successful training that will help me to bring BCM practices in my company at a higher professional level.”Paulo GriloDirecteur Etudes & Développements, TUI France

“I thank ACTAGIS’ Business Continuity Management (BCM) trainer for his professionalism and his motivation during this course which allowed me to obtain the BC certification. I recommend this training to anyone who wishes to strengthen and consolidate the topic of BCM.”Jean-Charles CoralBC Manager, Nestlé Switzerland

“I had a great pleasure participating to the ISO 9001 Lead Implenter training provided by Jeff Primus. His engagement, professionalism, motivation and technical expertise gave me full satisfaction. Eeased by his ability of communication, I had no difficulties to assimilate the content of the course. Without any hesitation, I gladly recommend ACTAGIS to everyone who needs guidance for SMQ implementation projects.”Mehmed Cormehic, Lean Manufacturing Engineer, GOLDEC SA

“Thank you for the great course. I did really enjoy it and got a lot of new insights and a much better understanding about what matters in a Business Continuity Management System”Dieter Gramberg, Business Continuity Manager, Novartis Pharma AG

“The course was highly interesting. The tools for managing a Business Continuity (BC) Program were teached in a very descriptive and understandable way. I can recommend this course to everybody having a key position in a BC Program.”Philip Sauter, Business Continuity Manager, ISS Facility Services AG

“I often find that you learn more from the experience of people in the room than anything in the training material and this was definitely the case at ACTAGIS. Jeff has a wealth of experience and he did an excellent job of adapting his delivery the training to the needs of the class.”Anthony Scarfe, Information Security Services Specialist

“Jeff Primus provided a great CISA training. His motivation, engagement and professionalism made the training really interesting and easy to understand. I enjoyed to take part in this training and would like to thank ACTAGIS for helping me to succeed the CISA exam.”Melany Scherer, Global IT Audit – Compliance, Jet Aviation AG

“I thank ACTAGIS, and especially Jeff Primus, for organizing the GDPR – Certified Data Protection Officer –training, which is very useful to me in the context of my professional activities and which I strongly recommend. Organizing trainings for a limited number of participants enables to take full advantage of the courses and to exchange interesting information more easily between professionals active in that domain”Chiara Tanteri – Vice-présidence pour les systèmes d’information, Ecole Polytechnique Fédérale de Lausanne (EPFL)

“Attending the GDPR – Certified Data Protection Officer – training provided by ACTAGIS was at the same time a challenge and a pleasure. The content was extremely interesting and provided by a highly skilled trainer. The setup of the classroom, the small group and the given material contributed to make it successful.”Grégoire Ramuz – CIO, Transports Publics Fribourgeois

“Very intense and worthwhile training. The trainer based his teaching on an excellent knowledge of the GDPR regulation, but also on his hands-on experiences enabling real-life and concrete cases. I recommend this training to anyone dealing with the protection of the personal data within his company “Stéphane Butty – DPO Group – 5àSec

“The way how we went through Business Continuity (BC) Program from policy to validation via practical examples was inspiring. Jeff’s enthusiastic and knowledgeable approach to BC area and ability to promote discussions really expanded understanding of this topic. Now I think that I have good tools to practice. Thank you Jeff!”Miska Riihimäki – Senior Risk Manager – OP Insurance Ltd

“I followed a CISSP course in a small group with ACTAGIS. Jeff teached with expertise, passion and profession. The complex subject of IT security was presented understandable and garnished with many real life examples. The atmosphere was intensive and forward oriented, but relaxed and fruitful. I’m really impressed and with no doubt I would follow, and recommend others to follow, courses with ACTAGIS”Harald Friedel – Project Manager & DPO

Jeff’s primary goal is not only to help you digest the material, but arrive at the examination with the right tools and the right confidence level so to maximize your chances to pass with flying colors. I recommend Jeff wholeheartedly and without reservations. Jeff is one of those rare sure bets!Massimo Marino – CDPO – Advanced Accelerator Applications

Having participated to the ISO 27001 LA training led by Jeff Primus, I was able to appreciate his value as a trainer both in terms of his technical skills and his extensive experience in auditing . Jeff is an experienced professional who communicates his knowledge with enthusiasm. This allowed me to succeed the certification exam. I would like to recommend ACTAGIS for the quality of their services and the perfect organization of this trainingStéphane Reuss – Audit interne Groupe Mutuel

I came from Paris to attend the ISO 27001 LI training which was led by a trainer of rare efficiency and having a real knowledge of the concepts coupled with a solid field experience. The training was based on theoretical fundamentals which were illustrated to us in a concrete way through workshops and group exchanges. The entire group succeeded the certification exam. Thanks again to ACTAGIS for their warm welcome, the quality of the training and their professionalismLotfi Adassen – Information Security Architect – Hitachi Automotive Systems Group

I had the pleasure to attend GDPR training provided by Jeff and ACTAGIS. The course was quite challenging in terms of material that required to be absorbed and Jeff made the work engaging, whilst providing good real case examples to the participants. He also explained the technical and legal parts very clearly for those who are not in IT or who has no legal background. I would happily recommend Jeff and ACTAGIS to those looking for an excellent and detailed insight. Clare Joyner, Legal Counsel, IMD

I participated to ACTAGIS Academy CISSP training. I definitely recommend this course to everyone who wants to succeed the CISSP exam. Jeff is an excellent trainer who knows how to vehicle the key messages enhanced with real life examples. Thanks Jeff for that excellent course ! Gilbert Caballer, IT Audit Expert, UBS

The BCI training based on solid experience and real life examples was provided by a very professional and patient mentor, Jeff Primus. Small group of participants is a great benefit for added value discussions. The training exceeded all my expectations. Andrey Afanasiev, Vice President, Risk Manager, RCB Bank Ltd

CISSP training given by ACTAGIS trainers, is intense and very complete. During the 5 days, you get home exhausted but with knowledge you did not have when started the day. The trainers use a methodology that helps you understand the concepts and the trap questions you might get in the exam. Totally worth it.Diego de Haller, IT Security Service Manager

Thank you for your training. I particularly appreciated the quality of the teachers Jeff and his colleague who were able to animate this course in an attractive and instructive way by alternating the theoretical part and the practical exercises. The course material is a summary of excellent quality. I highly recommend this course.Remo Stolz, IT Manager, CIMO

I’m a repeat offender at Jeff’s courses, having already attended CISA, CISSP and CRISC courses. Jeff is an engaging teacher and bring numerous examples from real life. Class size is limited, so there is always time for questions. I’m planning on attacking CISM next year and will certainly be knocking once again on Jeff’s door. Highly recommended !Liz O’Sullivan, Bundesamt für Informatik und Telekommunication BIT, Head of Security

“The Business Continuity Management (BCM) training provided by the trainer was invaluable for me. All the participants highly appreciated his excellent knowledge, experience, focus on key points, manner of teaching, understanding of the participants’ requirements. Thank you for the great training delivered! I definitely recommend ACTAGIS if you want to succeed the exam.”Anna Glazunova, BC Manager

“One of my concerns in every training opportunity is that it may just end up being theoretical with limited relevance to my work realities. I am glad to have taken my Business Continuity Management (BCM) course with ACTAGIS. Jeff was able to share his vast experience as the subject matter expert and explain via practical examples how to apply the principles and tools in our real work situations. This kept us engaged throughout the intense training. Even with little preparation, I passed the exam with Merit. I look forward to taking the next course with ACTAGIS.”Mathew Siwoi, Senior Oversight Officer, UNHCR

“The training provided by ACTAGIS is of a high level of quality thanks to the experience and personality of the trainer. We were not only able to prepare ourselves for the CDPO exam, but also benefit from his knowledge necessary for a successful implementation of the GDPR in our organizations”.Romain Galster, IT Manager, FINA

“The Business Continuity Management (BCM) course allowed me to expand my understanding and analysis of the different themes. Beyond the course material and the academic notions necessary for the certification, Jeff does everything possible to put us in a practical context by sharing his knowledge and experience. He teaches with passion, enthusiasm and adapts to the participants so that we can benefit from his expertise”.Stéphane RardCIO

“I would like to thank Jeff for all the support that permitted me to pass the Business Continuity Management (BCM) exam. The course was challenging, with lots of useful information, and Jeff was always there supporting me (and all the other trainees) and ready to help. I enjoyed your class tremendously. I look forward to taking another class with ACTAGIS.”Valentin Mazareanu, PhD, Data Security Officer, SCC Services Romania

“In a very pleasant environment, I participated to the GDPR-CDPO training delivered by ACTAGIS which I recommend. Throughout the sessions, the expert trained us with dynamism and pedagogy while sharing his field experience. During this training, I was able to submit my questions on practical cases. All these points greatly contributed grandly to the success of the certification exam.”Vincent Bovay, Responsable informatique, Altis

“The Business Continuity Management (BCM) training with ACTAGIS provided me the needed information to increase my knowledge for my current professional context and to understand what business continuity is for, including all the connections with the real world to reach higher level of knowledge.”Aristidis Lampiris, Major Incident and Process Expert, Swiss Re

“The trainer led the Business Continuity Management (BCM) course very well. He covered the material at an ideal pace, ensured the active participations of all, and encouraged an interactive atmosphere in class. All these advantages helped me to succeeded the certification exam.”Maximilian Mayer, Senior Consultant, Allianz

“To attend the CDPO training with ACTAGIS. The volume of information and the subject matter were intense given its ONLINE conduct due to the pandemic situation. In this context, Massimo made it very accessible to us given his extensive professional experience and pedagogy. I can only recommend ACTAGIS as a training partner.”Mahieu Perrin, IT Advisor

“Very good training to prepare the CISSP exam. Both trainers are experts in theirs fields. They were dedicated and created a comfortable environment that allowed valuable experience sharing. During the sessions, they provided real life examples which made the concepts easy to understand. After ACTAGIS’ training, I feel more confident and equipped with the right tools to succeed.”Besma Elketroussi, Graduate – CyberSecurity Project Manager, Banking Sector

“I would like to thank ACTAGIS, and in particular Jeff and Alexandre, for the CISSP certification preparation course. An intense 5-day course, in a studious but relaxed atmosphere, which prepared me as well as possible to pass this demanding certification. Thank you again, and I look forward to taking another course with you !”Claude-Alain SchweriResponsable sécurité informatique et technologie

“A very good preparation for the CISA. Good pedagogical approach, going to the essential. Allows you to have fruitful exchanges with specialists. Makes the preparation of the exam enjoyable and adds IT knowledge beyond the strict CISA framework.”Lionel NoetzlinHead of Internal Audit

Business Continuity Management (BCM) training was engaging, challenging, and eye-opening. The experienced trainer provided practical examples, shared real-world cases and invaluable insights. It was a truly enriching experience that expanded my understanding of BCM. If you want to improve your knowledge and skills in BCM, don’t miss this opportunity. Thanks for delivering a fantastic learning experience. It’s time well spent!Jean-Philippe SchadInformation Security Officer

I would like to express my complete satisfaction regarding ACTAGIS and the CISSP training delivered by their two instructors. Their expertise and passion for the subject greatly enhanced the learning experience. The courses were clear, well-structured, and supported by concrete examples, enabling effective knowledge assimilation. I highly recommend this course to anyone looking to prepare for the CISSP certification.Sivathushn VairavanatharChief Information Security Officer

Certification organisation

CISSP - Certified Information Systems Security Professional

Certificate Sample

CIISP Certificate Sample

The complexity of our highly interconnected world is rapidly increasing.
Protecting an organization’s information assets requires security programs that cover the increasingly broad spectrum of systems, processes and behaviors. Information security leaders need more than ever the full breadth and depth of expertise to efficiently tackle these challenges. This is where CISSP is uniquely positioned.

As an information security professional, the CISSP certification showcases your up-to-date technical knowledge, skills, capacities and master of industry best practices.

As an enterprise, the CISSP certification ensures that your information security leader, and their team, are at the cutting edge of defense against emerging threats and knowledgeable of the latest technologies, standards and regulations. They possess the capacities to design, build and maintain a secure business infrastructure.

Our Certified Information Systems Security Professional (CISSP) training course aims to provide you with a theoretical and hands-on practical approach to learn about the security process surrounding information systems. The course teaches the eight main areas of information security, which allow you to gain a comprehensive understanding of information security. At the end of the course, you will be well prepared to pass the CISSP exam.

Information security themes:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communication and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security

The CISSP certification is globally recognized as the premier security certification of information systems for security professionals.

During the course, the following subjects will be covered:

 

Domain 1 – Security and Risk Management

  1. Understand, adhere to, and promote professional ethics
  2. Understand and apply security concepts
  3. Evaluate and apply security governance principles
  4. Determine compliance and other requirements
  5. Understand legal and regulatory issues that pertain to information security in a holistic context
  6. Understand requirements for investigation types (i.e., administrative, criminal, civil, regulatory, industry standards)
  7. Develop, document, and implement security policy, standards, procedures, and guidelines
  8. Identify, analyze, and prioritize Business Continuity (BC) requirements
  9. Contribute to and enforce personnel security policies and procedures
  10. Understand and apply risk management concepts
  11. Understand and apply threat modeling concepts and methodologies
  12. Apply Supply Chain Risk Management (SCRM) concepts
  13. Establish and maintain a security awareness, education, and training program

Domain 2 – Asset Security

  1. Identify and classify information and assets
  2. Establish information and asset handling requirements
  3. Provision resources securely
  4. Manage data lifecycle
  5. Ensure appropriate asset retention (e.g., End-of-Life (EOL), End-of-Support (EOS))
  6. Determine data security controls and compliance requirements

Domain 3 – Security Architecture and Engineering

  1. Research, implement and manage engineering processes using secure design principles
  2. Understand the fundamental concepts of security models (e.g., Biba, Star Model, Bell-LaPadula)
  3. Select controls based upon systems security requirements
  4. Understand security capabilities of Information Systems (IS) (e.g., memory protection, Trusted Platform Module (TPM), encryption/decryption)
  5. Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements
  6. Select and determine cryptographic solutions
  7. Understand methods of cryptanalytic attacks
  8. Apply security principles to site and facility design
  9. Design site and facility security controls

Domain 4 – Communication and Network Security

  1. Assess and implement secure design principles in network architectures
  2. Secure network components
  3. Implement secure communication channels according to design

Domain 5 – Identity and Access Management (IAM)

  1. Control physical and logical access to assets
  2. Manage identification and authentication of people, devices, and services
  3. Federated identity with a third-party service » On-premise
  4. Implement and manage authorization mechanisms
  5. Manage the identity and access provisioning lifecycle
  6. Implement authentication systems

Domain 6 – Security Assessment and Testing

  1. Design and validate assessment, test, and audit strategies
  2. Conduct security control testing
  3. Collect security process data (e.g., technical and administrative)
  4. Conduct or facilitate security audits

Domain 7 – Security Operations

  1. Understand and comply with investigations
  2. Conduct logging and monitoring activities
  3. Perform Configuration Management (CM) (e.g., provisioning, baselining, automation)
  4. Apply foundational security operations concepts
  5. Apply resource protection
  6. Conduct incident management
  7. Operate and maintain detective and preventative measures
  8. Implement and support patch and vulnerability management
  9. Understand and participate in change management processes
  10. Implement recovery strategies
  11. Implement Disaster Recovery (DR) processes
  12. Test Disaster Recovery Plans (DRP)
  13. Participate in Business Continuity (BC) planning and exercises
  14. Implement and manage physical security
  15. Address personnel safety and security concerns

Domain 8 – Software Development Security

  1. Understand and integrate security in the Software Development Life Cycle (SDLC)
  2. Identify and apply security controls in software development ecosystems
  3. Assess the effectiveness of software security
  4. Assess security impact of acquired software
  5. Define and apply secure coding guidelines and standards

The CISSP is perfect for professionals working as:

  • Security Consultant
  • Security Analyst
  • Security Manager
  • Security Auditor
  • Security Architect
  • IT Director/Manager
  • Director of Security
  • Network Architect
  • Security Systems Engineer
  • Chief Information Security Officer
  • Candidates must have a minimum of 5 years cumulative paid full-time work experience in 2 or more of the 8 domains of the CISSP CBK
  • Earning a 4-year college degree or regional equivalent or an additional credential from the (ISC)² approved list will satisfy 1 year of the required experience. Education credit will only satisfy 1 year of experience.
  • A candidate that doesn’t have the required experience to become a CISSP may become an Associate of (ISC)² by successfully passing the CISSP examination. The Associate of (ISC)² will then have 6 years to earn the 5 years required experience

The CISSP exam (not included in our offer) uses Computerized Adaptive Testing (CAT) for all English exams. CISSP exams in all other languages are administered as linear, fixed-form exams.

  • Length of exam: 3 hours
  • Number of questions: 100 – 150
  • Question format: Multiple choice and advanced innovative items
  • Passing grade: 700 out of 1000 points
  • Exam language availability: English

Days

Courses highlighted in green are rapidly filling up.
Don't miss out.
Current Month

Upcoming courses

11nov(nov 11)09:0015(nov 15)16:30CISSP - Exam BootcampIN-CLASSROOM – Geneva / Lausanne - Switzerland / ONLINE – Live Interactive

16dec(dec 16)09:0020(dec 20)16:30CISSP - Exam BootcampIN-CLASSROOM – Lausanne - Switzerland / ONLINE – Live Interactive

We can also help you implement Cybersecurity in your company

Our services

Secure your business in alignment with the stakeholders needs and augment your level of protect in a proactive way.

  • Strategy creation
  • Security Management System
  • Security Dashboard
  • Architectures
  • Training & Awareness
  • Packaged security services
  • CSO, CISO services

The training is a combination of directly applicable theory, hands-on exercises, feedback from experience and class interaction.

%

Exam pass rate

You will be well prepared for the exam. Counting all our students, almost 100% have been successful.

Up To Date

All our courses are up to date. They have been adapted to the latest changes of the different exams. We are in constant contact with each certification organisation.

The training is a combination of directly applicable theory, hands-on exercises, feedback from experience and class interaction.

You will be well prepared for the exam. Counting all our students, almost 100% have been successful.

All our courses are up to date. They have been adapted to the latest changes of the different exams. We are in constant contact with each certification organisation.

Interested? Ask us more!

    Your interest

    Name (required)

    Email (required)

    Direct Business Phone with country code (required)

    Mobile Phone with country code (required)

    City (required)

    Country (required)

    Your message