Weiterbildung
Official ISC2 CISSP Training – 5 Tage

5 Tage Training inklusive Prüfung : 5290 CHF ohne Prüfung Wir bieten diese Weiterbildung in der Variante 6 Tage an – inklusive 2 Prüfungsversuchen. Weitere Details findest du in unserer Kursliste. https://blueguardtraining.com/courses/official-isc2-cissp-training-6-tage/

  • Dauer: 5 Days
  • Preis: CHF 5290 - inkl. 8.1% MWST

Anmelden

Über den Kurs

Official ISC2 CISSP Training – 5 Tage

Offizielles ISC2 Bootcamp (DE/CH/AT)

🇨🇭 Alle Termine zum Buchen für die Schweiz: 6-Tage: 6700 CHF inkl. Prüfung

🇩🇪 Alle Termine zum Buchen für Deutschland: 6-Tage: 7100 € inkl. Prüfung

🇦🇹 Alle Termine zum Buchen für Österreich: 6-Tage: 7100 € inkl. Prüfung

5 Tage intensives Training – Prüfungsvorbereitung ohne Prüfung
Flexible Termine – Weitere Durchführungen auf Anfrage

Loader image

Lehrplan und Inhalte

Loader image

1.1 Grasp and apply the principles of confidentiality, integrity, and availability.

1.2 Assess and apply security governance principles:

  • Aligning security with business objectives

  • Security control frameworks: strategy, mission, goals, and objectives

  • Due care and due diligence

  • Organizational processes (e.g., acquisitions, divestitures, governance)

  • Defining roles and responsibilities

1.3 Identify and adhere to compliance requirements:

  • Legal, regulatory, contractual, and industry standards

  • Privacy obligations

1.4 Understand global legal and regulatory aspects of information security:

  • Cybercrime and breaches

  • Cross-border data transfers

  • Licensing and IP requirements

  • Import/export restrictions

1.5 Uphold and promote professional ethics:

  • ISC2 Code of Professional Ethics

  • Organizational codes of conduct

1.6 Develop, document, and implement policies, standards, procedures, and guidelines.

1.7 Identify, assess, and prioritize Business Continuity (BC) needs:

  • Scope and planning

  • Business Impact Analysis (BIA)

1.8 Support and enforce personnel security measures:

  • Hiring and onboarding

  • Policy adherence

  • Termination protocols

  • Third-party agreements

1.9 Understand and apply risk management:

  • Threat/vulnerability identification

  • Security Control Assessment (SCA)

  • Risk analysis, mitigation, and reporting

  • Control selection and frameworks

1.10 Apply threat modeling methodologies and principles.

1.11 Manage supply chain risks:

  • Hardware/software/service risks

  • Third-party assessments

  • Minimum security standards

1.12 Build and maintain a security awareness and training program:

  • Delivery methods

  • Content updates

  • Effectiveness evaluation

2.1 Classify and identify assets and information.

2.2 Define and maintain asset ownership.

2.3 Ensure privacy protection:

  • Data ownership

  • Remanence

  • Processing practices

  • Collection limitations

2.4 Establish proper asset retention protocols.

2.5 Select appropriate data security controls:

  • Data states and protection techniques

  • Scoping and tailoring

  • Standards selection

2.6 Define requirements for information and asset handling.

3.1 Apply secure design principles in engineering processes.

3.2 Understand foundational security model concepts.

3.3 Select controls based on system requirements.

3.4 Evaluate system security capabilities (e.g., TPM, encryption, memory protection).

3.5 Identify and mitigate architectural and design vulnerabilities:

  • Systems (client/server, databases, cloud, ICS, IoT)

  • Cryptographic solutions

3.6-3.8 Evaluate and address vulnerabilities in web, mobile, and embedded systems.

3.9 Implement cryptographic solutions:

  • Key management

  • PKI

  • Digital signatures, integrity, non-repudiation

  • Secure algorithms and attack resistance

3.10 Design secure sites and facilities.

3.11 Implement physical site security controls.

4.1 Apply secure design principles to network architectures:

  • OSI/TCP-IP models

  • Software-defined networking

  • Wireless and converged networks

4.2 Secure network infrastructure and components.

4.3 Deploy secure communication channels:

  • Remote access

  • Voice and multimedia

  • Virtual networks

5.1 Control physical and logical access.

5.2 Manage identity verification for users/devices/services:

  • Multi-factor authentication

  • Identity proofing

  • Session and credential management

5.3 Integrate third-party identity solutions (on-premises/cloud).

5.4 Implement authorization mechanisms:

  • RBAC, DAC, ABAC, MAC

5.5 Manage the access lifecycle:

  • Reviews

  • Provisioning/deprovisioning

6.1 Design and validate test/audit strategies (internal/external/third-party).

6.2 Conduct testing:

  • Pen testing, vulnerability scans, code reviews

  • Log and misuse analysis

6.3 Collect process data for auditing.

6.4 Analyze results and report findings.

6.5 Conduct/facilitate audits.

7.1 Support investigations:

  • Evidence handling

  • Digital forensics

  • Documentation

7.2 Understand investigation types.

7.3 Monitor and log activities:

  • SIEM

  • Intrusion detection

  • Egress monitoring

7.4 Manage resource provisioning.

7.5 Apply foundational operational concepts:

  • Least privilege

  • Separation of duties

  • Privileged access

7.6 Implement resource protection.

7.7 Handle incident response and management.

7.8 Maintain security measures:

  • Firewalls, IDS/IPS, sandboxing, etc.

7.9 Execute patch and vulnerability management.

7.10 Participate in change management.

7.11 Implement recovery solutions:

  • Backup and fault tolerance

  • High availability

7.12 Develop disaster recovery processes.

7.13 Test DR plans via multiple approaches.

7.14 Engage in business continuity planning.

7.15 Implement physical security measures.

7.16 Address personnel safety/security.

8.1 Integrate security throughout the SDLC:

  • Methodologies

  • Change and configuration management

8.2 Secure the development environment.

8.3 Evaluate software security effectiveness.

8.4 Analyze the impact of acquired software.

8.5 Apply secure coding standards and best practices:

  • API security

  • Code-level vulnerability mitigation

CISSP-Schulungen 2025: Alle Termine in Deutschland, Österreich & Schweiz

Loader image

Mehr auf: https://www.isc2.org/certifications/cissp#Certification%20&%20Membership

CISSP-Training – Häufig gestellte Fragen (FAQ)

Loader image

Weitere Schulungen:

Cyber Security Specialist (eidg. Fachausweis) + CISSP

Official ISC2 CISSP Training – 6 Tage

ISC2: https://cloud.connect.isc2.org/cissp-ultimate-guide?

Mehr anzeigen

Wählen Sie Ihr Datum

18 Aug 2025
22 Aug 2025
  • Genf
  • Schweiz
  • Genf

CHF 5290

01 Sep 2025
05 Sep 2025
  • Zürich
  • Schweiz
  • Zürich, Winterthur

CHF 5290

29 Sep 2025
03 Oct 2025
  • Zürich / Bern
  • Schweiz
  • tbd

CHF 5290

13 Oct 2025
17 Oct 2025
  • Bern
  • Schweiz
  • Bern, Welle 7

CHF 5290

27 Oct 2025
31 Oct 2025
  • Zürich
  • Schweiz
  • Zürich, FFHS, HB

CHF 5290

10 Nov 2025
14 Nov 2025
  • Bern
  • Schweiz
  • Bern, Welle 7

CHF 5290

24 Nov 2025
28 Nov 2025
  • Zürich
  • Schweiz
  • Zürich FFHS, HB

CHF 5290

22 Jul 2025
26 Jul 2025
  • München
  • Deutschland
  • München

CHF 5290 / 5670 Euro

19 Aug 2025
23 Aug 2025
  • Stuttgart
  • Deutschland
  • Stuttgart

CHF 5290 / 5670 Euro

02 Sep 2025
06 Sep 2025
  • Berlin
  • Deutschland
  • Berlin

CHF 5290 / 5670 Euro

16 Sep 2025
20 Sep 2025
  • München
  • Deutschland
  • München

CHF 5290 / 5670 Euro

30 Sep 2025
04 Oct 2025
  • Freiburg
  • Deutschland
  • Freiburg

CHF 5290 / 5670 Euro

14 Oct 2025
18 Oct 2025
  • Stuttgart
  • Deutschland
  • Stuttgart

CHF 5290 / 5670 Euro

28 Oct 2025
01 Nov 2025
  • Berlin
  • Deutschland
  • Berlin

CHF 5290 / 5670 Euro

21 Oct 2025
25 Oct 2025
  • Wien
  • Österreich
  • Wien

CHF 5290 / 5670 Euro

04 Nov 2025
08 Nov 2025
  • Salzburg
  • Österreich
  • Salzburg

CHF 5290 / 5670 Euro

18 Nov 2025
22 Nov 2025
  • Graz
  • Österreich
  • Graz

CHF 5290 / 5670 Euro

02 Dec 2025
06 Dec 2025
  • Wien
  • Österreich
  • Wien

CHF 5290 / 5670 Euro

DSGVO Cookie Consent mit Real Cookie Banner