Weiterbildung
Official ISC2 CISSP Training – 6 Tage Österreich

CISSP bestehen – mit 2 kostenlosen Prüfungsversuchen! Die Certified Information Systems Security Professional (CISSP) von ISC2 ist eine der weltweit führenden Zertifizierungen im Bereich Cybersecurity.

  • Dauer: Days
  • Preis: CHF - inkl. 8.1% MWST

Anmelden

Über den Kurs

Official ISC2 CISSP Training – 6 Tage Österreich

Offizielles ISC2 Bootcamp  / Official ISC2 CISSP Training Österreich

🇨🇭 Alle Termine zum Buchen für die Schweiz: 6-Tage: 6700 CHF inkl. Prüfung

🇩🇪 Alle Termine zum Buchen für Deutschland: 6-Tage: 7100 € inkl. Prüfung

6 Tage intensives Training – Prüfungsvorbereitung + Exam Flexible Termine – Weitere Durchführungen auf Anfrage

CISSP Zertifizierung mit 2 kostenlosen Versuchen

Loader image

Lehrplan und Inhalte (CISSP Zertifizierung)

Loader image

1.1 Grasp and apply the principles of confidentiality, integrity, and availability.

1.2 Assess and apply security governance principles:

  • Aligning security with business objectives

  • Security control frameworks: strategy, mission, goals, and objectives

  • Due care and due diligence

  • Organizational processes (e.g., acquisitions, divestitures, governance)

  • Defining roles and responsibilities

1.3 Identify and adhere to compliance requirements:

  • Legal, regulatory, contractual, and industry standards

  • Privacy obligations

1.4 Understand global legal and regulatory aspects of information security:

  • Cybercrime and breaches

  • Cross-border data transfers

  • Licensing and IP requirements

  • Import/export restrictions

1.5 Uphold and promote professional ethics:

  • ISC2 Code of Professional Ethics

  • Organizational codes of conduct

1.6 Develop, document, and implement policies, standards, procedures, and guidelines.

1.7 Identify, assess, and prioritize Business Continuity (BC) needs:

  • Scope and planning

  • Business Impact Analysis (BIA)

1.8 Support and enforce personnel security measures:

  • Hiring and onboarding

  • Policy adherence

  • Termination protocols

  • Third-party agreements

1.9 Understand and apply risk management:

  • Threat/vulnerability identification

  • Security Control Assessment (SCA)

  • Risk analysis, mitigation, and reporting

  • Control selection and frameworks

1.10 Apply threat modeling methodologies and principles.

1.11 Manage supply chain risks:

  • Hardware/software/service risks

  • Third-party assessments

  • Minimum security standards

1.12 Build and maintain a security awareness and training program:

  • Delivery methods

  • Content updates

  • Effectiveness evaluation

2.1 Classify and identify assets and information.

2.2 Define and maintain asset ownership.

2.3 Ensure privacy protection:

  • Data ownership

  • Remanence

  • Processing practices

  • Collection limitations

2.4 Establish proper asset retention protocols.

2.5 Select appropriate data security controls:

  • Data states and protection techniques

  • Scoping and tailoring

  • Standards selection

2.6 Define requirements for information and asset handling.

3.1 Apply secure design principles in engineering processes.

3.2 Understand foundational security model concepts.

3.3 Select controls based on system requirements.

3.4 Evaluate system security capabilities (e.g., TPM, encryption, memory protection).

3.5 Identify and mitigate architectural and design vulnerabilities:

  • Systems (client/server, databases, cloud, ICS, IoT)

  • Cryptographic solutions

3.6-3.8 Evaluate and address vulnerabilities in web, mobile, and embedded systems.

3.9 Implement cryptographic solutions:

  • Key management

  • PKI

  • Digital signatures, integrity, non-repudiation

  • Secure algorithms and attack resistance

3.10 Design secure sites and facilities.

3.11 Implement physical site security controls.

4.1 Apply secure design principles to network architectures:

  • OSI/TCP-IP models

  • Software-defined networking

  • Wireless and converged networks

4.2 Secure network infrastructure and components.

4.3 Deploy secure communication channels:

  • Remote access

  • Voice and multimedia

  • Virtual networks

5.1 Control physical and logical access.

5.2 Manage identity verification for users/devices/services:

  • Multi-factor authentication

  • Identity proofing

  • Session and credential management

5.3 Integrate third-party identity solutions (on-premises/cloud).

5.4 Implement authorization mechanisms:

  • RBAC, DAC, ABAC, MAC

5.5 Manage the access lifecycle:

  • Reviews

  • Provisioning/deprovisioning

6.1 Design and validate test/audit strategies (internal/external/third-party).

6.2 Conduct testing:

  • Pen testing, vulnerability scans, code reviews

  • Log and misuse analysis

6.3 Collect process data for auditing.

6.4 Analyze results and report findings.

6.5 Conduct/facilitate audits.

7.1 Support investigations:

  • Evidence handling

  • Digital forensics

  • Documentation

7.2 Understand investigation types.

7.3 Monitor and log activities:

  • SIEM

  • Intrusion detection

  • Egress monitoring

7.4 Manage resource provisioning.

7.5 Apply foundational operational concepts:

  • Least privilege

  • Separation of duties

  • Privileged access

7.6 Implement resource protection.

7.7 Handle incident response and management.

7.8 Maintain security measures:

  • Firewalls, IDS/IPS, sandboxing, etc.

7.9 Execute patch and vulnerability management.

7.10 Participate in change management.

7.11 Implement recovery solutions:

  • Backup and fault tolerance

  • High availability

7.12 Develop disaster recovery processes.

7.13 Test DR plans via multiple approaches.

7.14 Engage in business continuity planning.

7.15 Implement physical security measures.

7.16 Address personnel safety/security.

8.1 Integrate security throughout the SDLC:

  • Methodologies

  • Change and configuration management

8.2 Secure the development environment.

8.3 Evaluate software security effectiveness.

8.4 Analyze the impact of acquired software.

8.5 Apply secure coding standards and best practices:

  • API security

  • Code-level vulnerability mitigation

CISSP-Schulungen 2025: Alle Lehrgangstermine in Deutschland, Österreich & Schweiz

Loader image

CISSP-Training – Häufig gestellte Fragen (FAQ)

Loader image

ISC2: CISSO-Ultimate-Guide

Wählen Sie Ihr Datum

03 Nov 2025
08 Nov 2025
  • Wien / EN / DE
  • Österreich
  • Wien

CHF 6700 / 7100 Euro

10 Nov 2025
15 Nov 2025
  • Graz / EN / DE
  • Österreich
  • Graz

CHF 6700 / 7100 Euro

17 Nov 2025
22 Nov 2025
  • Linz / EN / DE
  • Österreich
  • Linz

CHF 6700 / 7100 Euro

24 Nov 2025
29 Nov 2025
  • Salzburg / EN / DE
  • Österreich
  • Salzburg

CHF 6700 / 7100 Euro

01 Dec 2025
06 Dec 2025
  • Innsbruck / EN / DE
  • Österreich
  • Innsbruck

CHF 6700 / 7100 Euro

08 Dec 2025
13 Dec 2025
  • Klagenfurt / EN / DE
  • Österreich
  • Klagenfurt

CHF 6700 / 7100 Euro

15 Dec 2025
20 Dec 2025
  • Wien / EN / DE
  • Österreich
  • Wien

CHF 6700 / 7100 Euro

05 Jan 2026
10 Jan 2026
  • Bregenz / EN / DE
  • Österreich
  • Bregenz

CHF 6700 / 7100 Euro

12 Jan 2026
17 Jan 2026
  • St. Pölten / EN / DE
  • Österreich
  • St. Pölten

CHF 6700 / 7100 Euro

19 Jan 2026
24 Jan 2026
  • Graz / EN / DE
  • Österreich
  • Graz

CHF 6700 / 7100 Euro

26 Jan 2026
31 Jan 2026
  • Linz / EN / DE
  • Österreich
  • Linz

CHF 6700 / 7100 Euro

02 Feb 2026
07 Feb 2026
  • Salzburg / EN / DE
  • Österreich
  • Salzburg

CHF 6700 / 7100 Euro

09 Feb 2026
14 Feb 2026
  • Wien / EN / DE
  • Österreich
  • Wien

CHF 6700 / 7100 Euro

16 Feb 2026
21 Feb 2026
  • Innsbruck / EN / DE
  • Österreich
  • Innsbruck

CHF 6700 / 7100 Euro

23 Feb 2026
28 Feb 2026
  • Klagenfurt / EN / DE
  • Österreich
  • Klagenfurt

CHF 6700 / 7100 Euro

02 Mar 2026
07 Mar 2026
  • Graz / EN / DE
  • Österreich
  • Graz

CHF 6700 / 7100 Euro

09 Mar 2026
14 Mar 2026
  • Linz / EN / DE
  • Österreich
  • Linz

CHF 6700 / 7100 Euro

16 Mar 2026
21 Mar 2026
  • Salzburg / EN / DE
  • Österreich
  • Salzburg

CHF 6700 / 7100 Euro

06 Apr 2026
11 Apr 2026
  • Wien / EN / DE
  • Österreich
  • Wien

CHF 6700 / 7100 Euro

13 Apr 2026
18 Apr 2026
  • Graz / EN / DE
  • Österreich
  • Graz

CHF 6700 / 7100 Euro

20 Apr 2026
25 Apr 2026
  • Linz / EN / DE
  • Österreich
  • Linz

CHF 6700 / 7100 Euro

04 May 2026
09 May 2026
  • Salzburg / EN / DE
  • Österreich
  • Salzburg

CHF 6700 / 7100 Euro

11 May 2026
16 May 2026
  • Innsbruck / EN / DE
  • Österreich
  • Innsbruck

CHF 6700 / 7100 Euro

25 May 2026
30 May 2026
  • Wien / EN / DE
  • Österreich
  • Wien

CHF 6700 / 7100 Euro

01 Jun 2026
06 Jun 2026
  • Klagenfurt / EN / DE
  • Österreich
  • Klagenfurt

CHF 6700 / 7100 Euro

DSGVO Cookie Consent mit Real Cookie Banner