

1. Security and Risk Management:
Fundamentals of security and risk management, legal and regulatory requirements, compliance, and strategies for business continuity and governance.
2. Asset security:
Protection and management of information assets – from data classification and property rights to secure storage and disposal of sensitive information.
3. Security Architecture and Engineering:
Design and operation of secure architectures and systems, understanding of security models, cryptography, hardware and network security.
4. Communication and Network Security:
Planning, setting up, and securing networks, protecting communication channels, and using secure protocols against internal and external threats.
5. Identity and Access Management (IAM):
Management of user identities and access rights, authentication mechanisms, lifecycle management, and principles such as least privilege or separation of duties.
6. Security Assessment and Testing:
Planning and conducting security assessments, audits, penetration tests, and continuous monitoring to ensure the effectiveness of security measures.
7. Security Operations:
Operation and control of security-related processes—including incident response, monitoring, forensic analysis, recovery, and emergency management.
8. Software Development Security:
Integration of security principles into the software development process, secure programming, testing methods, and control of software security risks.
Requirements:
To obtain CISSP® certification, you need at least five years of relevant full-time work experience. This experience must cover at least two of the eight domains of the CISSP® exam outline.
Here's how you can shorten the time:
Studies: A relevant 4-year university degree (or a regionally equivalent degree) will be credited as one year of professional experience.
Additional qualifications: Recognized certifications from the ISC2 list can also replace one year of the required practical experience.
Important: A maximum of one year of the required five years can be waived through study or other certificates.
Flexibility: Part-time jobs and internships can also count toward your work experience.
Not enough experience yet? Become an "Associate of ISC2."
If you don't have the necessary practical experience yet, this is no obstacle to your career:
Additional info:
This course is conducted by the accredited training organization Digicomp Academy AG.
In your online learning environment, you will find useful information, downloads and extra services for this training course once you have registered.
Exam information:
Applying for certification:
Once you have passed the CISSP® exam, you can apply for the official ISC2 certificate. To do so, you must sign the ISC2 Code of Ethics, and your professional experience must be verified by an actively certified ISC2 professional. Certification must be completed within nine months of the exam date. If you are unable to find a suitable person, ISC2 will assist you in validating your application.
Re-certification:
The CISSP® certificate is valid for three years. To maintain your certification, you must provide proof of continuing professional education (CPE) and pay the annual maintenance fee (AMF) to ISC2. This ensures that your expertise remains up to date and your status as a Certified Professional remains active.
CISSP® certification is ideal for you if you already hold or are aiming for a specialist or management role. It is the decisive career step for:
Executives: As a CISO, CIO, or IT manager, you master the strategic management of your organization by focusing on security and risk management.
Architects & Engineers: As a security or network architect or security systems engineer, you will deepen your knowledge of security architecture and engineering as well as communication and network security in order to design secure infrastructures.
Specialists & consultants: As a security consultant, analyst, manager, or auditor, you will hone your profile in areas such as asset security, identity and access management (IAM), and security assessment and testing.
Developer: You will learn how to efficiently manage security operations and ensure software development security throughout the company.
Form of learning
Learning form
No filter results
The training is conducted in cooperation with an authorized training partner. This partner collects and processes data on its own responsibility. Please take note of the relevantprivacy policy.
