Certified Information Systems Security Professional (CISSP) Training

Upcoming Class Dates and Times

Start Duration Location Language Delivery
5.12.2022 9:00 CET 5 days Prague, Czech Republic English VILT
19.12.2022 15:00 CET 5 days Prague, Czech Republic English VILT G2R
30.1.2023 15:00 CET 5 days Prague, Czech Republic English VILT G2R
20.2.2023 9:00 CET 5 days Prague, Czech Republic English TILT
13.3.2023 15:00 CET 5 days Prague, Czech Republic English VILT G2R
24.4.2023 15:00 CET 5 days Prague, Czech Republic English VILT G2R
22.5.2023 9:00 CET 5 days Prague, Czech Republic English TILT
5.6.2023 15:00 CET 5 days Prague, Czech Republic English VILT G2R

NH Prague is proud to be able to provide training to assist you in preparation for the CISSP Information Security Certification exam. The CISSP certification is a globally recognized standard in information security certification governed and bestowed by the International Information Systems Security Certification Consortium, also known as (ISC)2. It was the first information security credential accredited by the international ANSI ISO/IEC Standard 17024:2003.

Course Overview / What You'll Learn

This course will expand upon your knowledge by addressing the essential elements of the eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process, while providing a framework to prepare for CISSP certification. By defining eight security domains that comprise a CBK, industry standards for the information systems security professional have been established. The skills and knowledge you gain in this course will help you master the eight CISSP domains and ensure your credibility and success within the information systems security field.

Who Should Attend

This course is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and engineers, network administrators, information security specialists, and risk management professionals, who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career. Through the study of all eight CISSP Common Body of Knowledge (CBK) domains, students will validate their knowledge by meeting the necessary preparation requirements to qualify to sit for the CISSP certification exam. Additional CISSP certification requirements include a minimum of five years of direct professional work experience in two or more fields related to the eight CBK security domains, or a college degree and four years of experience.

Event Price List / perfect price for event

WHAT is included in the cost of CISSP training proposed?

  • Official (ISC)2 Training Stuff – Official (ISC)2 Guide To The CISSP CBK, CISSP Official (ISC)2 Practice Tests
  • All day refreshment and Lunch Vouchers
  • Informal Networking – Students are invited to join informal InfoSec Networking at famous Prague Pub on Wednesday early evening. You can meet CISSP instructor and New Horizons of Prague owner. Bier and dinner is complimentary.
  • CISSP Training Re-SIT – you can enroll for official CISSP training once more in the future, and it is free
  • New Horizons Certificate of Completion

CISSP CLASS

59 500CZK
2 300
(ex. VAT)
  • Refreshment and Lunch Provided During the Training
  • Authorized Training Courseware
  • ISC2 CISSP Pre-Exam Test and Discussion
  • New Horizons Certificate of Completion
  • FREE CISSP Training Re-Take
Register

Course Objectives

In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK. You will:

  • Analyze components of the Security and Risk Management domain.
  • Analyze components of the Asset Security domain.
  • Analyze components of the Security Engineering domain.
  • Analyze components of the Communications and Network Security domain.
  • Analyze components of the Identity and Access Management domain.
  • Analyze components of the Security Assessment and Testing domain.
  • Analyze components of the Security Operations domain.
  • Analyze components of the Software Development Security domain.
We use cookies
This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Cookie Policy.