About our courses

Through years of experience working with more than 1000 top companies in the world, we ́ve architected the Readynez method for learning.
Train in any technology using the award-winning Readynez method and combine any variation of learning style, technology and place, to take learning ambitions from intent to impact.

Learn more about Readynez Training
Isc2 Cissp2

Best Course to get your (ISC)2 CISSP Exam and Certification

This Virtual and In-classroom course is your best preparation for the (ISC)2 CISSP Exam and becoming a Certified Information System Security Professional.


(308 Reviews)

Course: (ISC)2 CISSP - Certified Information Systems Security Professional

Duration: 6 Days

Format: Virtual or Classroom

Prepares for Exam : (ISC)2 Certified Information Systems Security Professional (CISSP)

Prepares for Certification : (ISC)2: Certified Information Systems Security Professional (CISSP)


CISSP is the gold standard credential to pursue for IT security professionals. It remains at the very top of the game and is a requirement for a majority of senior IT security roles. The CISSP certification proves you have the advanced skills, knowledge and commitment required, to command higher wages. The challenging standards require students to have at least 5 years of experience in two of the eight (ISC)2 domains. Additionally, you must complete a 100-150 multiple choice- and advanced innovative questions exam in order to be officially certified. This is no walk in the park and that’s why the Readynez CISSP course- and certification program is taught by experts who will work with you before, during and after your course to ensure you're best prepared for the exam. Although a difficult process, the return on investment makes it one of the most highly sought after courses available.

  • Course with Certification Guarantee
  • Learn from Expert instructors
  • Always updated course materials
  • Online prep course by Kevin Henry

What Our Delegates Are Saying about the course

Christer Johansson IP Solutions
Christer Johansson

Great teacher! Made a tough course online so interesting and a nice experience

Tony Moran TDS
Tony Moran

Instructor had a great understanding of all Domains and was able to pass this knowledge on at a comfortable pace and using real world scenarios which were very helpful.

What You will Learn

- Confidentiality, integrity, and availability concepts
- Security governance principles
- Compliance
- Legal and regulatory issues
- Professional ethic
- Security policies, standards, procedures and guidelines

- Information and asset classification
- Ownership (e.g. data owners, system owners)
- Protect privacy
- Appropriate retention
- Data security controls
- Handling requirements (e.g. markings, labels, storage)

- Engineering processes using secure design principles
- Security models fundamental concepts
- Security evaluation models
- Security capabilities of information systems
- Security architectures, designs, and solution elements vulnerabilities
- Web-based systems vulnerabilities
- Mobile systems vulnerabilities
- Embedded devices and cyber-physical systems vulnerabilities
- Cryptography
- Site and facility design secure principles
- Physical security

- Secure network architecture design (e.g. IP & non-IP protocols, segmentation)
- Secure network components
- Secure communication channels
- Network attacks

- Physical and logical assets control
- Identification and authentication of people and devices
- Identity as a service (e.g. cloud identity)
- Third-party identity services (e.g. on-premise)
- Access control attacks
- Identity and access provisioning lifecycle (e.g. provisioning review)

- Assessment and test strategies
- Security process data (e.g. management and operational controls)
- Security control testing
- Test outputs (e.g. automated, manual)
- Security architectures vulnerabilities

- Investigations support and requirements
- Logging and monitoring activities
- Provisioning of resources
- Foundational security operations concepts
- Resource protection techniques
- Incident management
- Preventative measures
- Patch and vulnerability management
- Change management processes
- Recovery strategies
- Disaster recovery processes and plans
- Business continuity planning and exercises
- Physical security
- Personnel safety concerns

- Security in the software development lifecycle
- Development environment security controls
- Software security effectiveness
- Acquired software security impact

Meet Our Instructors

Meet some of the Readynez Instructors you can meet on your course. They are experts, passionate about what they do, and dedicated to give back to their industry, their field, and those who want to learn, explore, and advance in their careers.

2022 05 27 09H18 27
Kevin Henry

Kevin Henry is a well-known expert with over 20-year contribution to learners training for IT security skills.

2022 05 27 09H37 24
Friedhelm Düsterhöft

Friedhelm Düsterhöft is a well-known expert with over 20-year contribution to learners training for IT security skills.

2022 05 27 09H25 34
James Rowney

James Rowney is a well-known expert with over 20-year contribution to learners training for IT security skills.

How to Best Be Prepared

To be eligible to get your certification, you must complete two processes:

Exam length: up to three hours
Number of questions: 100-150
Format: Multiple choice and advanced innovative questions
Passing grade: 700 out of 1000 points
Content: Security and Risk Management - 15%, Asset Security - 10%, Security Architecture and Engineering - 13%, Communication and Network Security - 14%, Identity and Access Management (IAM) - 13%, Security Assessment and Testing - 12%, Security Operations - 13%, Software Development Security - 10%

The CISSP exam does not automatically lead to a CISSP Certification. In order to acquire the certification you must also adhere to the following requirements.

To be issued a certificate, you must:

Prove that you possess a minimum of five years of professional experience in the information security field (or four years plus a college degree)
Complete the Candidate Agreement, confirming the above experience, and legally committing to the Code of Ethics
Successfully answer four questions regarding criminal history and related background
Pass the exam with a scaled score of 700 points or greater
Submit a completed Endorsement Form
(If randomly selected) successfully pass an audit of your professional experience
What is Endorsement?
Once you have been notified of passing the examination, you will be required to have your application endorsed by a Certified Information Systems Security Professional before the credential can be awarded. If none can be found, another qualified professional with knowledge of information systems or an officer of the candidates corporation can be used to validate your professional experience.

Your endorser will confirm your professional experience is true to the best of their knowledge, and that you are in good standing within the information security industry.

Upon receipt of the Endorsement Form and barring a random audit of your professional experience, the credential should be awa

Our Track Record

With 15 years experience and more than 35.000 happy customers from all over the world, companies such as ALSO, ATEA, Microsoft, Serco, and many more, trust Readynez to help them train and certify their staff.

  • Top rated courses, with learners most often rating their training 10/10
  • Globally recognized expert instructors, many of which are MVP's
  • 35.000 delegates trained and certified
  • Trusted provider of large training projects for many large companies

These are just some of the many major brands trusting Readynez.

Also Holding Ag Logo Square1 360 F 442787128 Rrbodb4mauiszgzjjperz4557zn8o5bv1 Atea (Company) Logo1 Microsoft Logo Serco Logo


(ISC)2 CCSP - Certified Cloud Security Professional

This CCSP course was made to ensure that cloud security professionals have the required knowledge, skills, and abilities in cloud security design, implementation, architecture, operations, controls, and compliance with regulatory frameworks.

ISACA CISM Certification

This CISM course and CISM certification is for the individual who manages, designs, oversees and/or assesses an enterprise's information security (IS). The CISM certification promotes international practices and provides executive management with assurance that those earning the designation have the required experience and knowledge to provide effective security management and consulting services.



The Virtual Classroom is an online room, where you will join your instructor and fellow classmates in real time. Everything happens live and you can interact freely, discuss, ask questions, and watch your instructor present on a whiteboard, discuss the courseware and slides, work with labs, and review.

Your prereading is available for you in your personal space at readynez.com: My Readynez. Simply log in, find your course and start your preparations.

Your exam voucher is usually included in your virtual training package. When you´re ready to sit your exam, you just book it with the exam provider. You can sit most exams from home or at a local test centre. We’re here to help you with that process.

Yes, you can sit exams from all the major Vendors like Microsoft, Cisco etc from the comfort of your home or office.

Your Readynez Course package includes the exam voucher for Microsoft exams, AWS exams, ISO Exams and almost every other exam.

With Readynez you do any course form the comfort of your home or office. Readynez provides support and best practices for your at-home classroom and you can enjoy learning with minimal impact on your day-to-day life. Plus you'll save the cost and the environmental burden of travelling.

Well, learning is limitless, when you are motivated, but you need the right path to achieve what you want. Readynez consultants have many years of experience customizing learner paths and we can design one for you too. We are always available with help and guidance, and you can reach us on the chat or write us at info@readynez.com.

The Certified Information Systems Security Professional (CISSP) is an information security certification. The International Information System Security Certification Consortium, or (ISC)2, awards the CISSP, an independent information security certification. Worldwide, there are 152,632 members of (ISC)2 who hold the CISSP certification.

Security professionals who successfully complete the six-hour Certified Information Systems Security Professional (CISSP) exam are recognized as experts in ten different fields: access control systems and methodology; disaster recovery planning; physical security; operations; security; management practices; telecommunications and network security.

The study of law, investigation, and ethics, as well as cryptography, security architecture, application and system development, and other related fields, is required curriculum in the CISSP exam.

The ideal candidate must have a minimum of five years of paid work experience in at least two of the CISSP CBK's eight domains. A four-year college degree or regional equivalent, or a credential from the (ISC)2 approved list, will satisfy one year of the required experience.

A CISSP certification requires at least five years of full-time, paid work as a security analyst in two or more of the eight fields included in the CISSP, such as cryptography and software development security.

If you have a college degree and additional credentials that have been approved by the board, you may be eligible for an experience waiver. When you've accumulated the necessary work experience, you can also become an Associate of the (ISC) and obtain the CISSP credential. Prepare for and ace the test is what's left to do. To pass the exam, you must score at least 700 out of a possible 1000 points.

Once you've passed the exam, you'll need an endorsement from a (ISC) expert who can validate your professional experience criteria, such as the length of time you've worked in the field, your reputation, and your continuing education as a security analyst. A professional endorsement from a current member is the primary reason for joining and participating in professional organizations and seminars. These are good career moves that can help you get endorsements for your CISSP application from potential sponsors.

If you want to keep your CISSP certification active, you must retake the exam every three years and pay the annual maintenance fee of $85 to the organization. CPE credits are required to maintain certification every three years, with a minimum of 20 credits per year. The annual maintenance fee and 40 CPE credits are required for re-certification.

Typical job roles for people holding this certification are;

  • Chief information security officer.
  • Security systems administrator.
  • Information assurance analyst.
  • IT security engineer.
  • Senior IT security consultant.
  • Senior information security assurance consultant.
  • Information security assurance analyst.

CISSP certifications are valid for a total of three years. For renewal, retaking the course and exam is an option, as is earning and submitting 120 Continuing Professional Education (CPE) credits over the three-year period.

The CISSP exam exam is typically $699, but the exact price and additional fees vary by location. If you need to reschedule your test, you must pay a $50 penalty.

As part of CISSP certification training, you learn how to define the IT architecture and how to build and maintain secure business environments using internationally recognized information security standards. The CISSP certification exam is administered by (ISC)2 and tests your knowledge of current industry standards and best practices, in topics like:

  • Security and risk management
  • Asset security Security architecture and design
  • Cryptography OSI and TCPIP models
  • IP addressesNetwork security
  • Identity and access management
  • Security assessment and testing
  • Software development security

The syllabus for the CISSP exam includes the following domains:

  • Security and Risk Management (Security, Risk, Compliance, Law, Regulations, and Business Continuity)´
  • Asset Security (Protecting Security of Assets)
  • Security Engineering (Engineering and Management of Security)
  • Communication and Network Security (Designing and Protecting Network Security)
  • Identity and Access Management (Controlling Access and Managing Identity)
  • Security Assessment and Testing (Designing, Performing, and Analysing Security Testing)
  • Security Operations (Foundational Concepts, Investigations, Incident Management, and Disaster Recovery)
  • Software Development Security (Understanding, Applying, and Enforcing Software Security




Price: {{item.ItemPriceExVatFormatted}} {{item.Currency}}