Our five-day course is ideal for cybersecurity professionals looking to demonstrate their knowledge of CISSP Common Book of Knowledge (CBK) and to prepare to achieve the (ISC)2 CISSP certification.
5 day course
Supporting material
A private training session for your team. Groups can be of any size, at a location of your choice including our training centres.

The (ISC)² CISSP (Certified Information Systems Security Professional) is a de facto certification for mid-level or senior cybersecurity professionals. It is known as the most difficult cybersecurity certifications to attain. Our instructors are practising cybersecurity consultants who provide up-to-date real-world examples from their experience.

Our course runs over five consecutive days and covers the 8 Domains of the (ISC)2 CISSP CBK. While other training providers provide “boot camp” environments and rush to train to the exam, Jellyfish is focused on knowledge transfer and to give you the knowledge needed to prepare for the exam as well as excel in your cybersecurity career.

As part of after-care, our instructors are available to assist you after the course to answer questions and provide guidance to further help you achieve your certification. And should you not achieve certification, you can resit the course for free.

Our (ISC)2 CISSP course is offered as a private training session and will run over five consecutive days. It can be delivered at our own training venue in the World Trade Center, Barcelona or any location of your choice.

Course overview
Who should attend:

This course is aimed at mid-level and senior cybersecurity professionals who want to achieve the CISSP (Certified Information Systems Security Professional) gold standard of cybersecurity certifications.

Walk away with the ability to:

As a certification course, we focus on providing you with the knowledge and strategies necessary to finalise your preparation for the CISSP examination. By the end of the course, you will understand:

  • The basic concepts of security and risk management
  • How to identify, classify, and protect assets and data
  • How to mitigate common system vulnerabilities
  • How to secure network architectures
  • How to conduct incident management and recovery
  • How to integrate security into the software development lifecycle

There are no prerequisites for this course, however, to gain CISSP certification one must possess and acquire the following.

  • Five years experience in at least two the above CISSP CBK Domains
  • Pass the CISSP Exam
  • Agree to the(ISC)2 Code of Ethics
  • Be endorsed by a CISSP in good standing
  • One year may be waived upon submitting proof of a four-year college degree (or regional equivalent) or an approved credential from (ISC)2’s waiver list.

Alternatively, those who lack the five years experience become an Associate of (ISC)2 and are allowed six years to gain the prerequisite experience for full CISSP certification.

Course agenda

This is a lecture course based on theory. The CBK is often described as “a mile wide and an inch deep” and you will be exposed to a wide array of inter-related topics. By Friday, you will walk away with a comprehensive overview of the 8 Domains of the (ISC)2 CISSP CBK (percentages represent the weights in the exam).

  1. Security and Risk Management – 15%
  2. Asset Security – 10%
  3. Security Architecture and Engineering – 13%
  4. Communication and Network Security – 14%
  5. Identity and Access Management (IAM) – 13%
  6. Security Assessment and Testing – 12%
  7. Security Operations – 13%
  8. Software Development Security – 10%

The cost of the exam is not included in the price of the course. To obtain a Pearson VUE exam voucher and book your exam please visit:

  • Language: English
  • Length of exam: Up to 3 hours
  • Number of questions: 100 – 150
  • Question Format: Multiple-choice and advanced innovative questions
  • Passing Grade: 700 out of 1000 points
  • Delivery Method: Computer Adaptive Testing (CAT)
Book this course
Call our sales team today
Don't miss out
Keep up to date with news, views and offers from Jellyfish Training.
Your data will be handled in accordance with our Privacy Policy