Official Course - Czech Republic

Inspiring a Safe and Secure Cyber World

Authorized CISSP course in Prague
Authorized (ISC)2 Course

  • Authorized (ISC)2 trainer: Unique experience to reflect on Cybersecurity strategy in a holistic view. Join our instructor Jorge Carrillo, PhD to cover all aspects to design, develop and manage the overall security posture of your organization.
  • Get Certified: CISSP is the Gold Standard credential that assures you have the deep technical and managerial knowledge and experience to effectively design, engineer, and manage a Cybersecurity strategy.
  • Lot of fun! Don't be a paper-certified person - be a information security leader
  • Original content: Authorized and official courseware.

CISSP® - The industry leading credential.

This course is not about having a certificate on a wall. It is about establishing holistic security programs to protect organizations.


If you are working or involve in cyber-security or information governance, now it is time to take your experience to the next level.
This course is ideal for individuals with security responsibilities, for example:
  • Chief Information Security Officer (CISO), IT Director/Manager
  • Security Consultants, Analyst, Managers, Systems Engineers.
  • Security Auditor, IT Auditors.
At the end of this course, you will be ready to excel and pass your CISSP exam and get certified.

(ISC)2 - Associate

If you are serious about Security, this course will help understanding and applying security best practices – today and in the future.
This course will help you to demonstrate cybersecurity knowledge while working to gain experience required for the CISSP certification

At the end of this course and passing the CISSP exam, you will earn the status of (ISC)2 Associate. By obtaining the additional cumulative work experience in the domains of the certification and completing the endorsement process, you will be able to reach your goal.

Main content

Secure what matters

Risk Management and Governance models are here to help you to prioritize your efforts for allocating resources to secure a system.

At the end of this module you will know how to prioritize your security efforts by following Risk Management tools and techniques.

Where to start

To implement a security program, you need to start with the fundamental problem: "Where my data and/or assets are".

At the end of this module you will know how to effectively implement data classification, privacy controls, data security controls and discover "unknowns" that required to be protected.

Build and Manage Security

Building security within an engineering process is not an easy task, by "building security" from the beggining you will be able to prevent rather than correct.

At the end of this module you will now the different security engineering practices and modern techniques and tool to engineer and manage of security.

Network Security

With more a more devices connected to a network, such as your toaster or laptop, you will learn how to secure network components including designing a good architecture.

At the end of this module you will be familiar with common network attacks and the best way to protect against them (by preventing them in the first place)

Who are you?

Allocating identities and implementing access controls are a fundamental step in any security program.

At the end of this module you will understand the access provisioning lifecycle, their corresponding threats and corresponding access controls.

Test and Validate

Is your security really working?. There are two ways to find out: Your systems might get hacked and you will find out on the press; or you might choose to test your security controls. Clearly, finding the issues first (so you can fix them) is the best place to be.

At the end of this module you will be able to define good security test strategies that will help you to identify vulnerabilities effectively.

Bussiness as Usual

Security should be part of your organization DNA, and security should not be a "extra work" - but the "normal way to work"

At the end of this module you will be able to design good security controls within the normal operations, including Incident Managament, change management and other operational activities.

Secure Development

Security in the software development lifecycle allows to design and enforce Software security effectively. Security by design should be part of your software acceptance criteria.

At the end of this module you will be able to design and implement robost security controls within the development of systems.

April 2019

Get your CISSP and register

Why us?

  • Official courseware and most up-to-date content
  • Official Trainer.
  • After course support
  • CPEs opportunities
  • Get in-depth, real-world practice that can be applied to the exam

Talk to us

Contact us
  • Drop us an email to info (at)
  • By post as:
    Carrillo. P.O.Box 2
    Vyskocilova 1100/2
    P-46, 140 06
  • Chat via Skype: live:jocaphd