CISSP ® – Certified Information Systems Security Professional
Training Courses and Certification Exam Preparation (Bootcamp)
We also deliver all our courses online through live interactive video sessions. Discover our Certifying Training Options.
We have advised more than 400 companies and trained over 1500 professionals. Will you be next?
Next courses (more below)
Information Systems Security
This 5-day training is composed of theory modules covering the 8 CISSP domains which were updated in April 2015, interlaced with exam questions, offering the participant an optimal preparation for the certification exam.
The Best CISSP training
ACTAGIS proposes worldwide up to date learning and preparation classes for CISSP certifications.
We guarantee your exam success
Nearly 100% success rate!
We will support you until you pass the exam of the course in which you enroll (some conditions apply). We offer the official mock exams to help you prepare.
Swiss Quality around the world
Our attention to detail, staying up to date, all reflect our commitment to quality. Our trainers bring real-life project experience in implementing frameworks and programs in large organizations.
Free consulting session included
Most of our training programs include a supplementary free online consulting session to help you implement your project in your organisation.
Competitive pricing
To ensure that our courses are available to all sizes of companies, we practice competitive pricing.
Learn from where you are
Our courses are delivered in a traditional classroom setting, as well as live online with an instructor. Certain courses are also available in a self-study format.
What our clients are saying
Certificate Sample
The complexity of our highly interconnected world is rapidly increasing.
Protecting an organization’s information assets requires security programs that cover the increasingly broad spectrum of systems, processes and behaviors. Information security leaders need more than ever the full breadth and depth of expertise to efficiently tackle these challenges. This is where CISSP is uniquely positioned.
As an information security professional, the CISSP certification showcases your up-to-date technical knowledge, skills, capacities and master of industry best practices.
As an enterprise, the CISSP certification ensures that your information security leader, and their team, are at the cutting edge of defense against emerging threats and knowledgeable of the latest technologies, standards and regulations. They possess the capacities to design, build and maintain a secure business infrastructure.
Information security themes:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communication and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security
The CISSP certification is globally recognized as the premier security certification of information systems for security professionals.
During the course, the following subjects will be covered:
Domain 1 – Security and Risk Management
- Understand, adhere to, and promote professional ethics
- Understand and apply security concepts
- Evaluate and apply security governance principles
- Determine compliance and other requirements
- Understand legal and regulatory issues that pertain to information security in a holistic context
- Understand requirements for investigation types (i.e., administrative, criminal, civil, regulatory, industry standards)
- Develop, document, and implement security policy, standards, procedures, and guidelines
- Identify, analyze, and prioritize Business Continuity (BC) requirements
- Contribute to and enforce personnel security policies and procedures
- Understand and apply risk management concepts
- Understand and apply threat modeling concepts and methodologies
- Apply Supply Chain Risk Management (SCRM) concepts
- Establish and maintain a security awareness, education, and training program
Domain 2 – Asset Security
- Identify and classify information and assets
- Establish information and asset handling requirements
- Provision resources securely
- Manage data lifecycle
- Ensure appropriate asset retention (e.g., End-of-Life (EOL), End-of-Support (EOS))
- Determine data security controls and compliance requirements
Domain 3 – Security Architecture and Engineering
- Research, implement and manage engineering processes using secure design principles
- Understand the fundamental concepts of security models (e.g., Biba, Star Model, Bell-LaPadula)
- Select controls based upon systems security requirements
- Understand security capabilities of Information Systems (IS) (e.g., memory protection, Trusted Platform Module (TPM), encryption/decryption)
- Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements
- Select and determine cryptographic solutions
- Understand methods of cryptanalytic attacks
- Apply security principles to site and facility design
- Design site and facility security controls
Domain 4 – Communication and Network Security
- Assess and implement secure design principles in network architectures
- Secure network components
- Implement secure communication channels according to design
Domain 5 – Identity and Access Management (IAM)
- Control physical and logical access to assets
- Manage identification and authentication of people, devices, and services
- Federated identity with a third-party service » On-premise
- Implement and manage authorization mechanisms
- Manage the identity and access provisioning lifecycle
- Implement authentication systems
Domain 6 – Security Assessment and Testing
- Design and validate assessment, test, and audit strategies
- Conduct security control testing
- Collect security process data (e.g., technical and administrative)
- Conduct or facilitate security audits
Domain 7 – Security Operations
- Understand and comply with investigations
- Conduct logging and monitoring activities
- Perform Configuration Management (CM) (e.g., provisioning, baselining, automation)
- Apply foundational security operations concepts
- Apply resource protection
- Conduct incident management
- Operate and maintain detective and preventative measures
- Implement and support patch and vulnerability management
- Understand and participate in change management processes
- Implement recovery strategies
- Implement Disaster Recovery (DR) processes
- Test Disaster Recovery Plans (DRP)
- Participate in Business Continuity (BC) planning and exercises
- Implement and manage physical security
- Address personnel safety and security concerns
Domain 8 – Software Development Security
- Understand and integrate security in the Software Development Life Cycle (SDLC)
- Identify and apply security controls in software development ecosystems
- Assess the effectiveness of software security
- Assess security impact of acquired software
- Define and apply secure coding guidelines and standards
The CISSP is perfect for professionals working as:
- Security Consultant
- Security Analyst
- Security Manager
- Security Auditor
- Security Architect
- IT Director/Manager
- Director of Security
- Network Architect
- Security Systems Engineer
- Chief Information Security Officer
- Candidates must have a minimum of 5 years cumulative paid full-time work experience in 2 or more of the 8 domains of the CISSP CBK
- Earning a 4-year college degree or regional equivalent or an additional credential from the (ISC)² approved list will satisfy 1 year of the required experience. Education credit will only satisfy 1 year of experience.
- A candidate that doesn’t have the required experience to become a CISSP may become an Associate of (ISC)² by successfully passing the CISSP examination. The Associate of (ISC)² will then have 6 years to earn the 5 years required experience
The CISSP exam (not included in our offer) uses Computerized Adaptive Testing (CAT) for all English exams. CISSP exams in all other languages are administered as linear, fixed-form exams.
- Length of exam: 3 hours
- Number of questions: 100 – 150
- Question format: Multiple choice and advanced innovative items
- Passing grade: 700 out of 1000 points
- Exam language availability: English
Days
Courses highlighted in green are rapidly filling up.
Don't miss out.
We can also help you implement Cybersecurity in your company
Our services
Secure your business in alignment with the stakeholders needs and augment your level of protect in a proactive way.
- Strategy creation
- Security Management System
- Security Dashboard
- Architectures
- Training & Awareness
- Packaged security services
- CSO, CISO services
The training is a combination of directly applicable theory, hands-on exercises, feedback from experience and class interaction.
%
Exam pass rate
You will be well prepared for the exam. Counting all our students, almost 100% have been successful.
All our courses are up to date. They have been adapted to the latest changes of the different exams. We are in constant contact with each certification organisation.
The training is a combination of directly applicable theory, hands-on exercises, feedback from experience and class interaction.
You will be well prepared for the exam. Counting all our students, almost 100% have been successful.
All our courses are up to date. They have been adapted to the latest changes of the different exams. We are in constant contact with each certification organisation.
Interested? Ask us more!