- Home
- Training Areas Catalogue
- Information Security
- CISSP® Exam Preparation Course
CISSP Exam Preparation Course prepares professionals for the CISSP® certification exam through a structured review of cybersecurity and information security topics. The training consolidates strategic and operational concepts, based on Behaviour®’s own content and aligned with the domains publicly indicated by the certification body.
CISSP®, ISC2® and CBK® are registered trademarks of ISC2, Inc. This training is developed and delivered by Behaviour® with its own content, as an independent preparation course for the CISSP® exam.
Quick Access: Introduction· Why this course exists· What this course enables· Topics and areas· Value· Objectives· Target audience· Prerequisites· Programme· Exam & Certification· Other information· Benefits· Logistics· FAQs· Registration
Upcoming dates
Public dates listed on the website.
Synchronous, live training. Interaction with the trainer and the group.
Live Online • next edition
Live Online • base price
Language: available in Portuguese or English
Training: review + original exercises by thematic area
Certification exam: 3h (100 to 150 questions) • not included
PROFESSIONAL LEVEL — practical application of methods in a professional context
Why this course exists
To develop cross-cutting knowledge in cybersecurity and information security, with method, a common language and application capability, while also supporting preparation for the certification exam.
In many organisations, security “exists” but fails in critical areas: consistent governance, effective risk management, coherent security architecture, operations and incident response supported by evidence, and secure development.
The CISSP® exam is associated with broad information security and cybersecurity competencies. The course helps participants consolidate knowledge and practice in the main areas assessed, through a structured preparation approach.
What this course enables you to do
Govern and manage risk
Apply principles, policies and criteria to protect information and assets, supporting risk-based decisions.
Design security
Consolidate foundations of security architecture and engineering for systems, networks and modern environments.
Assess and test
Understand security assessment, testing, evidence and critical interpretation of results to improve controls.
Operate and respond
Strengthen security operations, monitoring, logs and incident management, including forensic concepts.
Topics and competence areas addressed throughout the course
Governance, policies and risk management
Asset security
Security architecture and engineering
Communication and network security
IAM — identity and access management
Security assessment and testing
Security operations and incident response
SDLC security and software vulnerabilities
Value for the organisation
- Stronger common language and consistent criteria in cybersecurity, reducing ambiguity in decision-making.
- Greater ability to assess and manage risk, prioritise controls and justify investment.
- Improved operational maturity, including assessment, testing, operations, incidents and evidence.
- Professionals better prepared to act with an integrated view across governance, architecture, operations and secure development.
Introduction
The CISSP Exam Preparation Course is professional training in cybersecurity and information security, intended for professionals who wish to prepare for the CISSP® certification exam.
Develop a structured view of information security and cybersecurity, oriented towards roles that lead, support or influence decisions in security, governance and the operation of critical IT processes. The course supports preparation for the CISSP® exam and strengthens the ability to consolidate concepts, align terminology, frame practices and control the reasoning required to respond to exam requirements with rigour and consistency.
The CISSP Exam Preparation Course addresses the main areas assessed in the exam, including Security and Risk Management, Asset Security, Security Architecture and Engineering, Communication and Network Security, Identity and Access Management (IAM), Security Assessment and Testing, Security Operations and Software Development Security. Consolidation is carried out through discussion, original exercises by thematic area and Behaviour® simulation, aimed at transforming knowledge into exam performance.
The training includes proprietary support resources, guided discussion, exercises by thematic area and a final exam simulation.
This Training Plan and the associated documents are Behaviour®’s own content, protected by Copyright and registered as a literary work with IGAC – Portugal.
General Objectives
At the end of this course, participants will be able to:
- Apply security principles and practices to protect information and assets throughout their lifecycle, with governance and organisational awareness.
- Support the implementation and monitoring of controls to ensure confidentiality, integrity and availability.
- Design and assess security in systems, networks, applications and operational environments, including communications and information transmission.
- Understand IAM foundations, identities, access and control, and security assessment and testing, with analysis of evidence and results.
- Ensure reliable security operations, including logs and incidents, and integrate security into software development (SDLC), recognising vulnerabilities and applying good practices.
- Reach the exam with structured preparation in the areas publicly indicated by the certification body.
Target Audience
- IT, security and compliance leadership and management, including CISO, CIO/CTO and executive roles.
- Information Security and Cybersecurity managers and specialists.
- Technical profiles in security architecture, engineering and analysis.
- Security auditors and consultants.
- Professionals who wish to take the certification exam.
Prerequisites
To attend this course, participants are recommended to have fundamental knowledge of networks, operating systems, information security and the areas assessed in the exam, as well as understanding of English to follow the associated terminology.
Other specific requirements may apply, where relevant, depending on the quotation or proposal presented (please consult the proposal).
Programme
Review by competence areas
- Security and Risk Management
- Asset Security
- Security Architecture and Engineering
- Communication and Network Security
- Identity and Access Management (IAM)
- Security Assessment and Testing
- Security Operations
- Software Development Security
Exam Preparation (simulation)
- Exam preparation: Behaviour® simulation
- Original practical questions, with correction and explanation of reasoning
- Discussion and clarification of reasoning and criteria.
Exam(s) and Certification
Certification exam
The certification exam is not included in the course price. Registration, scheduling, delivery, eligibility requirements, certification decision and issuance of the certification are managed directly by the certification body, in accordance with its rules in force. The course does not include the exam, voucher, official materials or certification application process.
Indicative information. Candidates should always confirm requirements, rules, prices, eligibility, procedures and applicable content directly with the certification body.
Certification requirements
Other Information
General Information
- Training available in Portuguese or English.
- Behaviour® proprietary support materials, made available online, with original exercises by thematic area and consolidation resources, according to the awarded conditions.
- Behaviour® exam simulation to support consolidation.
- Behaviour® digital Training Attendance Certificate, with indication of 40 CPD/CPE credits awarded by Behaviour®.
Trainer(s)
Benefits
View benefits
- Practical and integrated consolidation in Information Security and Cybersecurity, with recognised language and criteria.
- Cross-cutting strengthening of skills in the assessed areas, including governance, risk, architecture, IAM, operations, incidents, assessment and SDLC.
- Greater ability to analyse controls and evidence and articulate security decisions with a senior-level view.
- Structured preparation for the certification exam, with review by competence areas and Behaviour® simulation.
- Participatory pedagogical model, oriented towards discussion, real-world application and more efficient study after the course.
Logistics
Useful information
- Live Online (working hours): 09h15–17h30 (Lisbon time), with lunch break and short breaks.
- After-hours Live Online: 18h15–21h45 (Lisbon time), with a short break.
- 35 hours of synchronous training, distributed across 5 consecutive days.
- Estimated 5 hours of guided autonomous work, intended for content consolidation, carried out flexibly outside the synchronous sessions.
- Requirements: computer with stable internet, browser, PDF reader, audio/video.
Hotels in Lisbon
Find out where you can stay in Lisbon, near Behaviour, for classroom training.
Frequently Asked Questions
Objective answers to common questions about this CISSP Exam Preparation Course and its professional context.
Is this course introductory?
Is there an exam simulation?
Can this course also support SSCP® preparation?
In which professional contexts is this course most useful?
Which roles can I perform or strengthen after this course?
Does the course help train the reasoning required in scenario-based exam questions?
Does it make sense to attend this course before meeting all formal experience requirements for certification?
Is this course useful for professionals who are highly specialised in only one technical area?
How can the course support autonomous study after the training?
Is the course suitable for those who have already studied the body of knowledge but struggle to consolidate the cross-cutting view?
For general questions about registration, delivery modes, exams, certification and recertification, please consult the BEHAVIOUR® FAQs.
Registration
Complete the form to request your registration for the preferred edition. Check the upcoming dates.
Training delivered by a certified training provider (processes and quality). See DGERT framework.
Request more information
If you would like help to frame the course within your professional or organisational context, contact us and we will indicate the most suitable path.
Companies: request a proposal
For team registrations, we provide volume conditions and a proposal tailored to the organisational need.
This course may be attended by individual professionals. It may also be integrated into preparation paths for roles with broad responsibility over processes, risk and decisions in Information Security.