CISSP Exam Preparation Course

CISSP Exam Preparation Course prepares professionals for the CISSP® certification exam through a structured review of cybersecurity and information security topics. The training consolidates strategic and operational concepts, based on Behaviour®’s own content and aligned with the domains publicly indicated by the certification body.

CISSP®, ISC2® and CBK® are registered trademarks of ISC2, Inc. This training is developed and delivered by Behaviour® with its own content, as an independent preparation course for the CISSP® exam.

Upcoming dates

Public dates listed on the website.
Synchronous, live training. Interaction with the trainer and the group.

25 May 2026
Live Online • next edition
7 September 2026
Live Online • base price
Duration: 5 days / 40h
Language: available in Portuguese or English
Training: review + original exercises by thematic area
Certification exam: 3h (100 to 150 questions) • not included
PROFESSIONAL LEVEL — practical application of methods in a professional context

Why this course exists

To develop cross-cutting knowledge in cybersecurity and information security, with method, a common language and application capability, while also supporting preparation for the certification exam.

In many organisations, security “exists” but fails in critical areas: consistent governance, effective risk management, coherent security architecture, operations and incident response supported by evidence, and secure development.

The CISSP® exam is associated with broad information security and cybersecurity competencies. The course helps participants consolidate knowledge and practice in the main areas assessed, through a structured preparation approach.

What this course enables you to do

Govern and manage risk

Apply principles, policies and criteria to protect information and assets, supporting risk-based decisions.

Design security

Consolidate foundations of security architecture and engineering for systems, networks and modern environments.

Assess and test

Understand security assessment, testing, evidence and critical interpretation of results to improve controls.

Operate and respond

Strengthen security operations, monitoring, logs and incident management, including forensic concepts.

Topics and competence areas addressed throughout the course

Exam areas publicly indicated by the certification body
Governance, policies and risk management
Asset security
Security architecture and engineering
Communication and network security
IAM — identity and access management
Security assessment and testing
Security operations and incident response
SDLC security and software vulnerabilities

Value for the organisation

  • Stronger common language and consistent criteria in cybersecurity, reducing ambiguity in decision-making.
  • Greater ability to assess and manage risk, prioritise controls and justify investment.
  • Improved operational maturity, including assessment, testing, operations, incidents and evidence.
  • Professionals better prepared to act with an integrated view across governance, architecture, operations and secure development.

Introduction

The CISSP Exam Preparation Course is professional training in cybersecurity and information security, intended for professionals who wish to prepare for the CISSP® certification exam.

Develop a structured view of information security and cybersecurity, oriented towards roles that lead, support or influence decisions in security, governance and the operation of critical IT processes. The course supports preparation for the CISSP® exam and strengthens the ability to consolidate concepts, align terminology, frame practices and control the reasoning required to respond to exam requirements with rigour and consistency.

The CISSP Exam Preparation Course addresses the main areas assessed in the exam, including Security and Risk Management, Asset Security, Security Architecture and Engineering, Communication and Network Security, Identity and Access Management (IAM), Security Assessment and Testing, Security Operations and Software Development Security. Consolidation is carried out through discussion, original exercises by thematic area and Behaviour® simulation, aimed at transforming knowledge into exam performance.

The training includes proprietary support resources, guided discussion, exercises by thematic area and a final exam simulation.

This Training Plan and the associated documents are Behaviour®’s own content, protected by Copyright and registered as a literary work with IGAC – Portugal.

General Objectives

At the end of this course, participants will be able to:

  • Apply security principles and practices to protect information and assets throughout their lifecycle, with governance and organisational awareness.
  • Support the implementation and monitoring of controls to ensure confidentiality, integrity and availability.
  • Design and assess security in systems, networks, applications and operational environments, including communications and information transmission.
  • Understand IAM foundations, identities, access and control, and security assessment and testing, with analysis of evidence and results.
  • Ensure reliable security operations, including logs and incidents, and integrate security into software development (SDLC), recognising vulnerabilities and applying good practices.
  • Reach the exam with structured preparation in the areas publicly indicated by the certification body.

Target Audience

  • IT, security and compliance leadership and management, including CISO, CIO/CTO and executive roles.
  • Information Security and Cybersecurity managers and specialists.
  • Technical profiles in security architecture, engineering and analysis.
  • Security auditors and consultants.
  • Professionals who wish to take the certification exam.

Prerequisites

To attend this course, participants are recommended to have fundamental knowledge of networks, operating systems, information security and the areas assessed in the exam, as well as understanding of English to follow the associated terminology.

Other specific requirements may apply, where relevant, depending on the quotation or proposal presented (please consult the proposal).

Programme

Review by competence areas
  1. Security and Risk Management
  2. Asset Security
  3. Security Architecture and Engineering
  4. Communication and Network Security
  5. Identity and Access Management (IAM)
  6. Security Assessment and Testing
  7. Security Operations
  8. Software Development Security
Exam Preparation (simulation)
  • Exam preparation: Behaviour® simulation
  • Original practical questions, with correction and explanation of reasoning
  • Discussion and clarification of reasoning and criteria.

Exam(s) and Certification

Certification exam

The certification exam is not included in the course price. Registration, scheduling, delivery, eligibility requirements, certification decision and issuance of the certification are managed directly by the certification body, in accordance with its rules in force. The course does not include the exam, voucher, official materials or certification application process.

Indicative information. Candidates should always confirm requirements, rules, prices, eligibility, procedures and applicable content directly with the certification body.

Certification requirements
To achieve certification, candidates must successfully take the exam and meet the remaining requirements defined by the certification body, including the formal certification application process. The exam is not included.

Other Information

General Information
  • Training available in Portuguese or English.
  • Behaviour® proprietary support materials, made available online, with original exercises by thematic area and consolidation resources, according to the awarded conditions.
  • Behaviour® exam simulation to support consolidation.
  • Behaviour® digital Training Attendance Certificate, with indication of 40 CPD/CPE credits awarded by Behaviour®.
Trainer(s)
Learn with senior consultants and auditors, with practical experience in implementation, auditing, governance, risk management, information security, cybersecurity and professional training, including experience in international references relevant to the area.

Benefits

View benefits
  • Practical and integrated consolidation in Information Security and Cybersecurity, with recognised language and criteria.
  • Cross-cutting strengthening of skills in the assessed areas, including governance, risk, architecture, IAM, operations, incidents, assessment and SDLC.
  • Greater ability to analyse controls and evidence and articulate security decisions with a senior-level view.
  • Structured preparation for the certification exam, with review by competence areas and Behaviour® simulation.
  • Participatory pedagogical model, oriented towards discussion, real-world application and more efficient study after the course.

Logistics

Useful information
  • Live Online (working hours): 09h15–17h30 (Lisbon time), with lunch break and short breaks.
  • After-hours Live Online: 18h15–21h45 (Lisbon time), with a short break.
  • 35 hours of synchronous training, distributed across 5 consecutive days.
  • Estimated 5 hours of guided autonomous work, intended for content consolidation, carried out flexibly outside the synchronous sessions.
  • Requirements: computer with stable internet, browser, PDF reader, audio/video.
Hotels in Lisbon

Find out where you can stay in Lisbon, near Behaviour, for classroom training.

Frequently Asked Questions

Objective answers to common questions about this CISSP Exam Preparation Course and its professional context.

Is this course introductory?
No. It is a review and consolidation course for exam preparation. Prior knowledge of networks, operating systems and information security is recommended.
Is there an exam simulation?
Yes. There is a Behaviour® simulation to assess level and support the definition of the effort required after the course.
Can this course also support SSCP® preparation?
It may be used to support SSCP® preparation where applicable to the participant’s path, while maintaining the main focus on the certification exam indicated on this page.
In which professional contexts is this course most useful?
It is especially useful for professionals who work, or intend to work, in roles with cross-cutting security responsibility, where it is necessary to connect governance, risk, architecture, operations, incidents, assessment and SDLC, and communicate with technical teams and management.
Which roles can I perform or strengthen after this course?
The course strengthens the foundation and language to evolve towards roles such as Security Manager/Lead, Information Security Officer, Security Architect, Risk & Compliance (Security), IAM Lead, Security Operations Lead, Security Consultant/Auditor and, in more senior contexts, support to CISO functions.
Does the course help train the reasoning required in scenario-based exam questions?
Yes. Review by competence areas, original exercises and guided discussion help structure the cross-cutting reasoning required in scenario-based questions, strengthening the ability to interpret contexts, identify priorities and respond with greater consistency.
Does it make sense to attend this course before meeting all formal experience requirements for certification?
Yes. The course can be attended as technical and methodological preparation for the exam and for knowledge consolidation. The formal certification requirements follow the process defined by the certification body and are assessed separately.
Is this course useful for professionals who are highly specialised in only one technical area?
Yes. One of the benefits of the course is precisely to strengthen a cross-cutting view across governance, risk, architecture, operations, assessment, IAM and secure development, helping more specialised professionals consolidate the global perspective required by the exam.
How can the course support autonomous study after the training?
The course helps identify stronger areas and areas requiring further reinforcement, allowing participants to better organise autonomous study, prioritise revision and guide the final effort before scheduling the exam.
Is the course suitable for those who have already studied the body of knowledge but struggle to consolidate the cross-cutting view?
Yes. For those who have already studied isolated content, the course can help connect concepts, align terminology, clarify relationships between areas and consolidate the logic needed to respond more confidently to exam requirements.

For general questions about registration, delivery modes, exams, certification and recertification, please consult the BEHAVIOUR® FAQs.

Registration

Complete the form to request your registration for the preferred edition. Check the upcoming dates.

Contact name
=

Training delivered by a certified training provider (processes and quality). See DGERT framework.

Request more information

If you would like help to frame the course within your professional or organisational context, contact us and we will indicate the most suitable path.

Request Information

Companies: request a proposal

For team registrations, we provide volume conditions and a proposal tailored to the organisational need.

Request Proposal

This course may be attended by individual professionals. It may also be integrated into preparation paths for roles with broad responsibility over processes, risk and decisions in Information Security.