CISSP ® – Certified Information Systems Security Professional

Training Courses and Certification Exam Preparation (Bootcamp)

We also deliver all our courses online through live interactive video sessions. Discover our Certifying Training Options.

We have advised more than 400 companies and trained over 1500 professionals. Will you be next?

TrainEverywhere®
Next courses (more below)

Current Month

Upcoming courses

15sep(sep 15)09:0019(sep 19)16:30CISSP - Exam BootcampIN-CLASSROOM – Geneva / Lausanne - Switzerland / ONLINE – Live Interactive

03nov(nov 3)09:0007(nov 7)16:30CISSP - Exam BootcampIN-CLASSROOM – Lausanne - Switzerland / ONLINE – Live Interactive

08dec(dec 8)09:0012(dec 12)16:30CISSP - Exam BootcampIN-CLASSROOM – Geneva / Lausanne - Switzerland / ONLINE – Live Interactive

Information Systems Security

This 5-day training is composed of theory modules covering the 8 CISSP domains which were updated in April 2015, interlaced with exam questions, offering the participant an optimal preparation for the certification exam.

Official BCI Certification

The Best CISSP training

ACTAGIS proposes worldwide up to date  learning and preparation classes for CISSP certifications.

We guarantee your exam success

Nearly 100% success rate!
We will support you until you pass the exam of the course in which you enroll (some conditions apply). 

Swiss Quality around the world

Our attention to detail, staying up to date, all reflect our commitment to quality. Our trainers bring real-life project experience in implementing frameworks and programs in large organizations.

Hands-on exercises

Free consulting session included

Most of our training programs include a supplementary free online consulting session to help you implement your project in your organisation.

Small classes

Competitive pricing

To ensure that our courses are available to all sizes of companies, we practice competitive pricing.

English and French

TrainEverywhere®

Our courses are delivered in a classroom setting or live online with an instructor (sometimes hybrid). Specific courses are also available in a self-study format.

What our clients are saying

I would like to express my complete satisfaction regarding ACTAGIS and the CISSP training delivered by their two instructors. Their expertise and passion for the subject greatly enhanced the learning experience. The courses were clear, well-structured, and supported by concrete examples, enabling effective knowledge assimilation. I highly recommend this course to anyone looking to prepare for the CISSP certification.

Sivathushn Vairavanathar
Chief Information Security Officer

A very good preparation for the CISA. Good pedagogical approach, going to the essential. Allows you to have fruitful exchanges with specialists. Makes the preparation of the exam enjoyable and adds IT knowledge beyond the strict CISA framework.

Lionel Noetzlin
Head of Internal Audit

I would like to thank ACTAGIS, and in particular Jeff and Alexandre, for the CISSP certification preparation course. An intense 5-day course, in a studious but relaxed atmosphere, which prepared me as well as possible to pass this demanding certification. Thank you again, and I look forward to taking another course with you !

Claude-Alain Schweri
Responsable sécurité informatique et technologie

To attend the CDPO training with ACTAGIS. The volume of information and the subject matter were intense given its ONLINE conduct due to the pandemic situation. In this context, Massimo made it very accessible to us given his extensive professional experience and pedagogy. I can only recommend ACTAGIS as a training partner.

Mahieu Perrin
IT Advisor, BIT

The trainer led the Business Continuity Management (BCM) course very well. He covered the material at an ideal pace, ensured the active participation of all, and encouraged an interactive atmosphere in class. All these advantages helped me to pass the certification exam.

Maximilian Mayer
Senior Consultant, Allianz

The Business Continuity Management (BCM) training with ACTAGIS provided me the needed information to increase my knowledge for my current professional context and to understand what business continuity is for, including all the connections with the real world to reach higher level of knowledge.

Aristidis Lampiris
Major Incident and Process Expert, Swiss Re

In a very pleasant environment, I participated to the GDPR-CDPO training delivered by ACTAGIS which I recommend. Throughout the sessions, the expert trained us with dynamism and pedagogy while sharing his field experience. During this training, I was able to submit my questions on practical cases. All these points greatly contributed grandly to the success of the certification exam.

Vincent Bovay
Responsable informatique, Altis

I would like to thank Jeff for all the support that permitted me to pass the Business Continuity Management (BCM) exam. The course was challenging, with lots of useful information, and Jeff was always there supporting me (and all the other trainees) and ready to help. I enjoyed your class tremendously. I look forward to taking another class with ACTAGIS.

Valentin Mazareanu
PhD, Data Security Officer, SCC Services Romania

The Business Continuity Management (BCM) course allowed me to expand my understanding and analysis of the different themes. Beyond the course material and the academic notions necessary for the certification, Jeff does everything possible to put us in a practical context by sharing his knowledge and experience. He teaches with passion, enthusiasm and adapts to the participants so that we can benefit from his expertise.

Stéphane Rard
CIO

The training provided by ACTAGIS is of a high level of quality thanks to the experience and personality of the trainer. We were not only able to prepare ourselves for the CDPO exam, but also benefit from his knowledge necessary for a successful implementation of the GDPR in our organizations

Romain Galster
IT Manager, FINA

One of my concerns in every training opportunity is that it may just end up being theoretical with limited relevance to my work realities. I am glad to have taken my Business Continuity Management (BCM) course with ACTAGIS. Jeff was able to share his vast experience as the subject matter expert and explain via practical examples how to apply the principles and tools in our real work situations. This kept us engaged throughout the intense training. Even with little preparation, I passed the exam with Merit. I look forward to taking the next course with ACTAGIS.

Mathew Siwoi
Senior Oversight Officer, UNHCR

The Business Continuity Management (BCM) training provided by the trainer was invaluable for me. All the participants highly appreciated his excellent knowledge, experience, focus on key points, manner of teaching, understanding of the participants’ requirements. Thank you for the great training delivered! I definitely recommend ACTAGIS if you want to succeed the exam.

Anna Glazunova
BC Manager

I'm a repeat offender at Jeff's courses, having already attended CISA, CISSP and CRISC courses. Jeff is an engaging teacher and bring numerous examples from real life. Class size is limited, so there is always time for questions. I'm planning on attacking CISM next year and will certainly be knocking once again on Jeff's door. Highly recommended !

Liz O’Sullivan
Bundesamt für Informatik und Telekommunication BIT, Head of Security

Thank you for your training. I particularly appreciated the quality of the teachers Jeff and his colleague who were able to animate this course in an attractive and instructive way by alternating the theoretical part and the practical exercises. The course material is a summary of excellent quality. I highly recommend this course.

Remo Stolz
IT Manager, CIMO

CISSP training given by ACTAGIS trainers, is intense and very complete. During the 5 days, you get home exhausted but with knowledge you did not have when started the day. The trainers use a methodology that helps you understand the concepts and the trap questions you might get in the exam. Totally worth it.

Diego de Haller
IT Security Service Manager

The BCI training based on solid experience and real life examples was provided by a very professional and patient mentor, Jeff Primus. Small group of participants is a great benefit for added value discussions. The training exceeded all my expectations.

Andrey Afanasiev
Vice President, Risk Manager, RCB Bank Ltd

I participated to ACTAGIS Academy CISSP training. I definitely recommend this course to everyone who wants to succeed the CISSP exam. Jeff is an excellent trainer who knows how to vehicle the key messages enhanced with real life examples. Thanks Jeff for that excellent course !

Gilbert Caballer
IT Audit Expert, UBS

I had the pleasure to attend GDPR training provided by Jeff and ACTAGIS. The course was quite challenging in terms of material that required to be absorbed and Jeff made the work engaging, whilst providing good real case examples to the participants. He also explained the technical and legal parts very clearly for those who are not in IT or who has no legal background. I would happily recommend Jeff and ACTAGIS to those looking for an excellent and detailed insight.

Clare Joyner
Legal Counsel, IMD

I came from Paris to attend the ISO 27001 LI training which was led by a trainer of rare efficiency and having a real knowledge of the concepts coupled with a solid field experience. The training was based on theoretical fundamentals which were illustrated to us in a concrete way through workshops and group exchanges. The entire group succeeded the certification exam. Thanks again to ACTAGIS for their warm welcome, the quality of the training and their professionalism.

Lotfi Adassen
Information Security Architect - Hitachi Automotive Systems Group

Having participated to the ISO 27001 LA training led by Jeff Primus, I was able to appreciate his value as a trainer both in terms of his technical skills and his extensive experience in auditing . Jeff is an experienced professional who communicates his knowledge with enthusiasm. This allowed me to succeed the certification exam. I would like to recommend ACTAGIS for the quality of their services and the perfect organization of this training.

Stéphane Reuss
Audit interne Groupe Mutuel

Jeff's primary goal is not only to help you digest the material, but arrive at the examination with the right tools and the right confidence level so to maximize your chances to pass with flying colors. I recommend Jeff wholeheartedly and without reservations. Jeff is one of those rare sure bets!

Massimo Marino
CDPO - Advanced Accelerator Applications

I followed a CISSP course in a small group with ACTAGIS. Jeff teached with expertise, passion and profession. The complex subject of IT security was presented understandable and garnished with many real life examples. The atmosphere was intensive and forward oriented, but relaxed and fruitful. I’m really impressed and with no doubt I would follow, and recommend others to follow, courses with ACTAGIS.

Harald Friedel
Project Manager & DPO

The way how we went through Business Continuity (BC) Program from policy to validation via practical examples was inspiring. Jeff’s enthusiastic and knowledgeable approach to BC area and ability to promote discussions really expanded understanding of this topic. Now I think that I have good tools to practice. Thank you Jeff!

Miska Riihimäki
Senior Risk Manager - OP Insurance Ltd

Very intense and worthwhile training. The trainer based his teaching on an excellent knowledge of the GDPR regulation, but also on his hands-on experiences enabling real-life and concrete cases. I recommend this training to anyone dealing with the protection of the personal data within his company.

Stéphane Butty
DPO Group - 5àSec
Transport Publics Fribourgeois

Attending the GDPR - Certified Data Protection Officer – training provided by ACTAGIS was at the same time a challenge and a pleasure. The content was extremely interesting and provided by a highly skilled trainer. The setup of the classroom, the small group and the given material contributed to make it successful.

Grégoire Ramuz
CIO, Transports Publics Fribourgeois

I thank ACTAGIS, and especially Jeff Primus, for organizing the GDPR - Certified Data Protection Officer –training, which is very useful to me in the context of my professional activities and which I strongly recommend. Organizing trainings for a limited number of participants enables to take full advantage of the courses and to exchange interesting information more easily between professionals active in that domain.

Chiara Tanteri
Vice-Présidence pour les systèmes d’information, École Polytechnique Fédérale de Lausanne (EPFL)

Jeff Primus provided a great CISA training. His motivation, engagement and professionalism made the training really interesting and easy to understand. I enjoyed taking part in this training and would like to thank ACTAGIS for helping me to pass the CISA exam.

Melany Scherer
Global IT Audit - Compliance, Jet Aviation AG

I often find that you learn more from the experience of people in the room than anything in the training material and this was definitely the case at ACTAGIS. Jeff has a wealth of experience and he did an excellent job of adapting his delivery the training to the needs of the class.

Anthony Scarfe
Information Security Services Specialist

The course was highly interesting. The tools for managing a Business Continuity (BC) Program were taught in a very descriptive and understandable way. I can recommend this course to everybody having a key position in a BC Program.

Philip Sauter
Business Continuity Manager, ISS Facility Services AG

Thank you for the great course. I did really enjoy it and got a lot of new insights and a much better understanding about what matters in a Business Continuity Management System.

Dieter Gramberg
Business Continuity Manager, Novartis Pharma AG

I had a great pleasure participating to the ISO 9001 Lead Implenter training provided by Jeff Primus. His engagement, professionalism, motivation and technical expertise gave me full satisfaction. Eeased by his ability of communication, I had no difficulties to assimilate the content of the course. Without any hesitation, I gladly recommend ACTAGIS to everyone who needs guidance for SMQ implementation projects.

Mehmed Cormehic
Lean Manufacturing Engineer, GOLDEC SA

I thank ACTAGIS' Business Continuity Management (BCM) trainer for his professionalism and his motivation during this course which allowed me to obtain the BC certification. I recommend this training to anyone who wishes to strengthen and consolidate the topic of BCM.

Jean-Charles Coral
BC Manager, Nestlé Switzerland

The Business Continuity Management (BCM) course, offered by ACTAGIS, enabled me to consolidate and reinforce my knowledge in the domain. A successful training that will help me to bring BCM practices in my company to a higher professional level.

Paulo Grilo
Directeur Etudes & Développements, TUI France

At our Business Continuity Management (BCM) certification training, the trainer managed not only to cover perfectly the specific, certification-related topics but he also opened windows and connections to other standardization bodies. It was an excellent week enriching our knowledge broadly. Thank you!

Christoph Teuber
Group Safety & Security Manager, Swiss Re

I thank the consultant for this ISO 27001 training. His pedagogy, technical expertise and long experience in the field make the difference and bring real added value. Course materials are of high quality and the exchanges throughout this training allowed me to assimilate the material and go beyond theory

Daniel Meier
Head Internal Audit, Vaudoise Assurances
A great course and a serious levelling up with a good dive into the universe of CISA.
Josselin Renard
IT Systems Auditor, UBS
During all of the CISA, Business Continuity Management and ISO 27001 LI sessions, the consultant openly shared his insightful experiences, carefully listened to all of the participants’ most puzzling questions, remarks, criticisms… and gave precious explanations, recommendations and advice.
Savrak Sar
Head of IT, Haute École Pédagogique
ACTAGIS trainer has first hand experience in most the domains covered by the CISA program. This proved to be invaluable in making ISACA’s somewhat theoretical subjects very tangible and meaningful. Many thanks for this great step towards the CISA certification.
Tom Royston
CIO

Certification organisation

CISSP - Certified Information Systems Security Professional

Certificate Sample

CIISP Certificate Sample

The complexity of our highly interconnected world is rapidly increasing.
Protecting an organization’s information assets requires security programs that cover the increasingly broad spectrum of systems, processes and behaviors. Information security leaders need more than ever the full breadth and depth of expertise to efficiently tackle these challenges. This is where CISSP is uniquely positioned.

As an information security professional, the CISSP certification showcases your up-to-date technical knowledge, skills, capacities and master of industry best practices.

As an enterprise, the CISSP certification ensures that your information security leader, and their team, are at the cutting edge of defense against emerging threats and knowledgeable of the latest technologies, standards and regulations. They possess the capacities to design, build and maintain a secure business infrastructure.

Our Certified Information Systems Security Professional (CISSP) training course aims to provide you with a theoretical and hands-on practical approach to learn about the security process surrounding information systems. The course teaches the eight main areas of information security, which allow you to gain a comprehensive understanding of information security. At the end of the course, you will be well prepared to pass the CISSP exam.

Information security themes:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communication and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security

The CISSP certification is globally recognized as the premier security certification of information systems for security professionals.

During the course, the following subjects will be covered:

 

Domain 1 – Security and Risk Management

  1. Understand, adhere to, and promote professional ethics
  2. Understand and apply security concepts
  3. Evaluate and apply security governance principles
  4. Determine compliance and other requirements
  5. Understand legal and regulatory issues that pertain to information security in a holistic context
  6. Understand requirements for investigation types (i.e., administrative, criminal, civil, regulatory, industry standards)
  7. Develop, document, and implement security policy, standards, procedures, and guidelines
  8. Identify, analyze, and prioritize Business Continuity (BC) requirements
  9. Contribute to and enforce personnel security policies and procedures
  10. Understand and apply risk management concepts
  11. Understand and apply threat modeling concepts and methodologies
  12. Apply Supply Chain Risk Management (SCRM) concepts
  13. Establish and maintain a security awareness, education, and training program

Domain 2 – Asset Security

  1. Identify and classify information and assets
  2. Establish information and asset handling requirements
  3. Provision resources securely
  4. Manage data lifecycle
  5. Ensure appropriate asset retention (e.g., End-of-Life (EOL), End-of-Support (EOS))
  6. Determine data security controls and compliance requirements

Domain 3 – Security Architecture and Engineering

  1. Research, implement and manage engineering processes using secure design principles
  2. Understand the fundamental concepts of security models (e.g., Biba, Star Model, Bell-LaPadula)
  3. Select controls based upon systems security requirements
  4. Understand security capabilities of Information Systems (IS) (e.g., memory protection, Trusted Platform Module (TPM), encryption/decryption)
  5. Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements
  6. Select and determine cryptographic solutions
  7. Understand methods of cryptanalytic attacks
  8. Apply security principles to site and facility design
  9. Design site and facility security controls

Domain 4 – Communication and Network Security

  1. Assess and implement secure design principles in network architectures
  2. Secure network components
  3. Implement secure communication channels according to design

Domain 5 – Identity and Access Management (IAM)

  1. Control physical and logical access to assets
  2. Manage identification and authentication of people, devices, and services
  3. Federated identity with a third-party service » On-premise
  4. Implement and manage authorization mechanisms
  5. Manage the identity and access provisioning lifecycle
  6. Implement authentication systems

Domain 6 – Security Assessment and Testing

  1. Design and validate assessment, test, and audit strategies
  2. Conduct security control testing
  3. Collect security process data (e.g., technical and administrative)
  4. Conduct or facilitate security audits

Domain 7 – Security Operations

  1. Understand and comply with investigations
  2. Conduct logging and monitoring activities
  3. Perform Configuration Management (CM) (e.g., provisioning, baselining, automation)
  4. Apply foundational security operations concepts
  5. Apply resource protection
  6. Conduct incident management
  7. Operate and maintain detective and preventative measures
  8. Implement and support patch and vulnerability management
  9. Understand and participate in change management processes
  10. Implement recovery strategies
  11. Implement Disaster Recovery (DR) processes
  12. Test Disaster Recovery Plans (DRP)
  13. Participate in Business Continuity (BC) planning and exercises
  14. Implement and manage physical security
  15. Address personnel safety and security concerns

Domain 8 – Software Development Security

  1. Understand and integrate security in the Software Development Life Cycle (SDLC)
  2. Identify and apply security controls in software development ecosystems
  3. Assess the effectiveness of software security
  4. Assess security impact of acquired software
  5. Define and apply secure coding guidelines and standards

The CISSP is perfect for professionals working as:

  • Security Consultant
  • Security Analyst
  • Security Manager
  • Security Auditor
  • Security Architect
  • IT Director/Manager
  • Director of Security
  • Network Architect
  • Security Systems Engineer
  • Chief Information Security Officer
  • Candidates must have a minimum of 5 years cumulative paid full-time work experience in 2 or more of the 8 domains of the CISSP CBK
  • Earning a 4-year college degree or regional equivalent or an additional credential from the (ISC)² approved list will satisfy 1 year of the required experience. Education credit will only satisfy 1 year of experience.
  • A candidate that doesn’t have the required experience to become a CISSP may become an Associate of (ISC)² by successfully passing the CISSP examination. The Associate of (ISC)² will then have 6 years to earn the 5 years required experience

The CISSP exam (not included in our offer) uses Computerized Adaptive Testing (CAT) for all English exams. CISSP exams in all other languages are administered as linear, fixed-form exams.

  • Length of exam: 3 hours
  • Number of questions: 100 – 150
  • Question format: Multiple choice and advanced innovative items
  • Passing grade: 700 out of 1000 points
  • Exam language availability: English

Days

Courses highlighted in green are rapidly filling up.
Don't miss out.
Current Month

Upcoming courses

15sep(sep 15)09:0019(sep 19)16:30CISSP - Exam BootcampIN-CLASSROOM – Geneva / Lausanne - Switzerland / ONLINE – Live Interactive

03nov(nov 3)09:0007(nov 7)16:30CISSP - Exam BootcampIN-CLASSROOM – Lausanne - Switzerland / ONLINE – Live Interactive

08dec(dec 8)09:0012(dec 12)16:30CISSP - Exam BootcampIN-CLASSROOM – Geneva / Lausanne - Switzerland / ONLINE – Live Interactive

We can also help you implement Cybersecurity in your company

Our services

Secure your business in alignment with the stakeholders needs and augment your level of protect in a proactive way.

  • Strategy creation
  • Security Management System
  • Security Dashboard
  • Architectures
  • Training & Awareness
  • Packaged security services
  • CSO, CISO services

The training is a combination of directly applicable theory, hands-on exercises, feedback from experience and class interaction.

%

Exam pass rate

You will be well prepared for the exam. Counting all our students, almost 100% have been successful.

Up To Date

All our courses are up to date. They have been adapted to the latest changes of the different exams. We are in constant contact with each certification organisation.

The training is a combination of directly applicable theory, hands-on exercises, feedback from experience and class interaction.

You will be well prepared for the exam. Counting all our students, almost 100% have been successful.

All our courses are up to date. They have been adapted to the latest changes of the different exams. We are in constant contact with each certification organisation.

Interested? Ask us more!

    Your interest

    Name (required)

    Email (required)

    Direct Business Phone with country code (required)

    Mobile Phone with country code (required)

    City (required)

    Country (required)

    Your message