CISSP® Authorized Training (Prague, The Czech Republic)

2,300.00  excl. VAT

Duration: 5 days;

Prerequisites: Yes, see detailed description;

Instructor: Jorge Carrilllo,, PhD; (Certified Data Protection Officer GDPR-P, GDPR-F PCI ISA (PCI SSC Internal Security Assessor) and PCI Professional (PCIP); Microsoft Certified Trainer; Certified Professional in Accessibility (CPACC); PMI-ACP, PMP, PRINCE2 Practitioner 2009 and 2017 edition; ITIL Foundations; CIPP/G, CIPP/US, CIPP/E, CIPP/C, CIPM, CIPT; FIP; CISSP; Data Protection Compliance in the EU).

Delivery dates: December 3rd – 7th  2018 (MON – FRI);

Location: Vyskočilova 1100/2, 140 06 Praha 4, Czechia.


CISSP® – Certified Information Systems Security Professional (CISSP). The Industry Leading Credential


This course is not about having a certificate on the wall. It is about establishing holistic security programs to protect organizations.

  • Authorized trainer: Unique experience to learn and reflect on Cybersecurity in a holistic view following up-to-date security practices;
  • Get Certified: CISSP is the Gold Standard credential that assures you have the deep technical and managerial knowledge and experience to effectively design, engineer, and manage the overall security posture of an organization;
  • Lots of fun! Don’t be a paper-certified person – be a information security leader!;
  • Original content: Authorized and official courseware.

Delivered by Carrillo CZ, an (ISC)² Official Training Provider, with official courseware developed by (ISC)². This ensures your training content is relevant and up-to-date. The instructor, Jorge Carrillo, PhD, is a verified security expert.

Who should attend:

If you are working or involve in cyber-security or information governance, now it is time to take your experience to the next level.  This course is ideal for individuals with security responsibilities, for example:

  • Chief Information Security Officer (CISO), IT Director/Manager;
  • Security Consultants, Analyst, Managers, Systems Engineers;
  • Security Auditor, IT Auditors.

At the end of this course, you will be ready to excel and pass your CISSP exam and get certified. After passing the CISSP exam, you will earn the status of (ISC)2 Associate. By obtaining the additional cumulative work experience in the domains of the certification and completing the endorsement process, you will be able to reach your goal.


Candidates must have a minimum of five years cumulative paid work experience in two or more of the eight domains of the CISSP CBK. Earning a four-year college degree or regional equivalent or an additional credential from the (ISC)² approved list will satisfy one year of the required experience. Education credit will only satisfy one year of experience.

A candidate who doesn’t have the required experience to become a CISSP may become an Associate of (ISC)² by successfully passing the CISSP examination. The Associate of (ISC)² will then have six years to earn the five years required experience. For a detailed explanation of CISSP prerequisites please check:

About the Instructor, Jorge Carrillo, CISSP, PhD:

Jorge Carrillo PhD is an enthusiastic InfoTech advisor since 2000 in the areas of IT, Compliance, Project Management and InfoSec.

Jorge Carrillo obtained his PhD in applied Informatics at the Faculty of Informatics at Masaryk University in Brno. After his studies, Jorge has been helping international organizations to address complex security and compliance challenges.

Jorge is an active contributor to the IT Industry. He has participated as a speaker at few international conferences, and delivered lectures and workshops at Czech Universities to promote good practices in different topics of Information Governance and Project Management since 2011.

Main Content:

Secure what matters

Risk Management and Governance models are here to help you to prioritize your efforts for allocating resources to secure a system. At the end of this module you will know how to prioritize your security efforts by following Risk Management tools and techniques. Security and Risk Management.

Where to start

To implement a security program, you need to start with the fundamental problem: “Where my data and/or assets are”.  At the end of this module you will know how to effectively implement data classification, privacy controls, data security controls and discover “unknowns” that required to be protected. Asset Security.

Build and Manage Security

Building security within an engineering process is not an easy task, by “building security” from the beginning you will be able to prevent rather than correct.  At the end of this module you will now the different security engineering practices and modern techniques and tool to engineer and manage of security. Security Engineering.

Network Security

With more a more devices connected to a network, such as your toaster or laptop, you will learn how to secure network components including designing a good architecture.  At the end of this module you will be familiar with common network attacks and the best way to protect against them (by preventing them in the first place). Communication and Network Security.

Who are you?

Allocating identities and implementing access controls are a fundamental step in any security program.  At the end of this module you will understand the access provisioning lifecycle, their corresponding threats and corresponding access controls. Identity and Access Management.

Test and Validate

Is your security really working?. There are two ways to find out: Your systems might get hacked and you will find out on the press; or you might choose to test your security controls. Clearly, finding the issues first (so you can fix them) is the best place to be.  At the end of this module you will be able to define good security test strategies that will help you to identify vulnerabilities effectively. Security Assessment and Testing.

Business as Usual

Security should be part of your organization DNA, and security should not be a “extra work” – but the “normal way to work”  At the end of this module you will be able to design good security controls within the normal operations, including Incident Management, change management and other operational activities. Security Operations.

Secure Development

Security in the software development lifecycle allows to design and enforce Software security effectively. Security by design should be part of your software acceptance criteria.  At the end of this module you will be able to design and implement robust security controls within the development of systems. Software Development Security.