(ISC)2 CISSP Boot Camp - Vain 6 päivän

Miksi

Mitä asiakkaamme sanovat?

"Perfect location to prepare for the exam. No interference what so ever. Unfortunately it was winter and cold and I can imagine the location is even better in the summer. Staff is very helpful and service minded. I chose Firebrand Training for my CISSP training needs because you can get trained and sit for the exam in one go."
Christian Öhman - (ISC)2 CISSP Boot Camp (6 päivää), 8/2/2010 - 14/2/2010

8 syytä, miksi kannattaa hankkia CISSP Firebrand Trainingiltä:

Find Out How We Help You To Learn New Skills Quickly

  1. Koulutuksen ja todistuksen saaminen kestää vain 6 päivän.
  2. Hintaan sisältyy kaikki.Kertamaksu kattaa kaikki kurssimateriaalit, kokeet, kuljetuksen, majoituksen ja ateriat ja tarjoaa kustannustehokkaimman tavan hankkia CISSP koulutus ja todistus. Ilman mitään lisäkustannuksia.
  3. Suorita tutkinto ensimmäisellä kerralla tai kertaa koulutus ilmaiseksi. Tämä on takuumme. Olemme varmoja, että läpäiset CISSP -kurssin ensimmäisellä kerralla. Mutta jos näin ei käy, voit tulla takaisin vuoden kuluttua ja maksaa vain majoituksesta ja kokeista. Kaikki muu on ilmaista.
  4. Opit enemmän.Päivä perinteisen koulutuksen tarjoajan kanssa on yleensä klo 9–17, mihin sisältyy pitkä lounastauko. Firebrand Trainingiltä saat vähintään 12 tuntia päivässä keskittynyttä ja häiriötöntä laatukoulutusaikaa opettajasi kanssa.
  5. Opit CISSP nopeammin. Yhdistämme 3 eri oppimistyyliä (visuaalisen|kuuloon perustuvan|kosketukseen perustuvan) tarjotaksemme materiaalin tavalla joka varmistaa, että opit nopeammin ja helpommin.
  6. Opiskelet huippujen kanssa.Olemme kouluttaneet ja sertifioineet 68.075 ammattilaista ja olemme kumppaneita kaikkien alan suurien nimien kanssa ja olemme saaneet lukuisia palkintoja, mm. Microsoftin Danmarki Vuoden koulutuspartneri 2010, 2011, 2012 ja 2013, Institue of IT Trainingin ”Training Company of the Year 2006, 2007, 2008” Englannissa, ISC(2):n ”Highest Performing Affiliate of the Year 2009 & 2010 – EMEA” sekä EC-Councilin ”Accredited Training Centre of the Year 2010 og 2011”, ”Newcomer of the Year 2011” ja ”Instructors Circle of Excellence”.
  7. Opit enemmän kuin pelkän teorian. Olemme kehittäneet CISSP kurssia edelleen käyttämällä laboratorioita, esimerkkitapauksia ja harjoittelukokeita varmistaaksemme, että osaat soveltaa uutta tietoa työympäristöön.
  8. Opit parhailta. Ohjaajamme CISSP kurssilla ovat alan parhaita. He tarjoavat ainutlaatuisen yhdistelmän asiantuntemusta, kokemusta ja intohimoa opetukseen.

Oletko valmis kurssin? Ota VAPAA testi mitata ja arvioida osaamisen tasoa.

Mitä

CISSP training, CISSP certification

Get CISSP certified in just six days on this accelerated course. The CISSP (certified information systems security professional) is globally recognised as the gold standard IT security certification – learn the skills you need to achieve it at twice the speed with Firebrand.

Developed by (ISC)2, the world’s leading cyber security membership association, the CISSP is key for professionals aiming for senior roles in information security. With Firebrand, you’ll build the expert knowledge needed to implement and manage an enterprise security programme.

On this accelerated course, you’ll study the eight domains of the CISSP Common Body of Knowledge (CBK):

  1. Security and Risk Management
  2. Asset Security
  3. Security Architecture and Engineering
  4. Communication and Network Security
  5. Identity and Access Management (IAM)
  6. Security Assessment and Testing
  7. Security Operations
  8. Software Development Security

On this course, you'll prepare for and sit the CISSP exam, covered by your Certification Guarantee.

Strengthen your skills as a security professional – this training is ideal for security consultants, analysts, managers, auditors and architects. Plus, the CISSP certification is highly desirable for ambitious professionals aiming to achieve Chief Information Security Officer (CISO) roles.


Train at twice the speed on this official CISSP course

Firebrand Training is an Authorised Provider of (ISC)2 training. On this accelerated course, you’ll get access to resources only available to authorised providers:

  • Expert training from authorised (ISC)2 instructors
  • Official courseware
  • Official CISSP Practice Exam and Evaluation
CISSP training with onsite CISSP exam

(ISC)2 Highest Performing Affiliate of the Year

Firebrand Training has been named as a “Highest Performing Affiliate of the Year – EMEA” by (ISC)2. Upon announcing the award, W. Hord Tipton, Executive Director of (ISC)2, stated: “This award represents Firebrand as the top performer for (ISC)2...for the EMEA region.”

Lue lisää ...

Kiinnostunut? Katso hinnat tästä tai soita meille 09 - 42 419 397

(ISC)2 Membership Benefits

(ISC)2 is an international, non-profit membership association built for security professionals. When you certify, you’ll become a member of (ISC)². As a member, you’ll join a global network of 125,000+ and get access to an array of exclusive resources, tools and peer-to-peer networking opportunities, conference and event discounts.

Become a member by earning one of (ISC)2’s gold standard certifications. Contact us to find out more.

Benefits of Firebrand’s official six-day CISSP training

  • (ISC)2 instructors present the Common Body of Knowledge Seminar
  • Study with (ISC)2 copyrighted training material, which is unavailable to non-partner organisations
  • Prepare for your CISSP exam with the official (ISC)2 practice exam
  • Receive a personal critique of your practice exam results to help you focus on topics where additional focus should be given
  • Study faster with accelerated training in a distraction-free environment
  • Sit your CISSP exam during your course at the Firebrand Training Centre

Benefits of CISSP certification for your company

  • Establish information security best practices within your organisation
  • Organisations employing CISSP-certified professionals have their data and systems safeguarded by the best in the business
  • Provides a business and technology orientation to risk management

Lue lisää ...

Kiinnostunut? Katso hinnat tästä tai soita meille 09 - 42 419 397

Domain 1: Security and Risk Management

1.1 Understand and apply concepts of confidentiality, integrity and availability

1.2 Evaluate and apply security governance principles

  • Alignment of security function to business
  • Security control frameworks strategy, goals, mission, and objectives
  • Due care/due diligence
  • Organisational processes (e.g., acquisitions, divestitures, governance committees)
  • Organisational roles and responsibilities

1.3 Determine compliance requirements

  • Contractual, legal, industry standards, and regulatory requirements
  • Privacy requirements

1.4 Understand legal and regulatory issues that pertain to information security in a global context

  • Cyber crimes and data breaches
  • Trans-border data flow
  • Licensing and intellectual property requirements
  • Privacy
  • Import/export controls

1.5 Understand, adhere to and promote professional ethics

  • (ISC)² Code of Professional Ethics
  • Organisational code of ethics

1.6 Develop, document, and implement security policy, standards, procedures, and guidelines

1.7 Identify, analyse and prioritise Business Continuity (BC) requirements

  • Develop and document scope and plan
  • Business Impact Analysis (BIA)

1.8 Contribute to and enforce personnel security policies and procedures

  • Candidate screening and hiring
  • Compliance policy requirements
  • Employment agreements and policies
  • Privacy policy requirements
  • Onboarding and termination processes
  • Vendor, consultant, and contractor agreements and controls

1.9 Understand and apply risk management concepts

  • Identify threats and vulnerabilities
  • Security Control Assessment (SCA)
  • Risk assessment/analysis
  • Monitoring and measurement
  • Risk response
  • Asset valuation
  • Countermeasure selection and implementation
  • Reporting
  • Applicable types of controls (e.g., preventive, Continuous improvement detective, corrective)
  • Risk frameworks

1.10 Understand and apply threat modelling concepts and methodologies

  • Threat modelling methodologies
  • Threat modelling concepts

1.11 Apply risk-based management concepts to the supply chain 

  • Risks associated with hardware, software, and SERVICES            
  • Service-level requirements services
  • Third-party assessment and monitoring
  • Minimum security requirements

1.12 Establish and maintain a security awareness, education, and training program

  • Methods and techniques to present awareness and training
  • Periodic content reviews
  • Program effectiveness evaluation

Domain 2: Asset Security

2.1 Identify and classify information and assets

  • Data classification
  • Asset Classification

2.2 Determine and maintain information and asset ownership

2.3 Protect privacy

  • Data owners
  • Data remanence
  • Data processors
  • Collection limitation

2.4 Ensure appropriate asset retention

2.5 Determine data security controls

  • Understand data states
  • Standards selection
  • Scoping and tailoring
  • Data protection methods

2.6 Establish information and asset handling requirements

Domain 3: Security Architecture and Engineering

3.1 Implement and manage engineering processes using secure design principles

3.2 Understand the fundamental concepts of security models

3.3 Select controls based upon systems security requirements

3.4 Understand security capabilities of information systems (e.g., memory protection, Trusted Platform Module (TPM), encryption/decryption)

3.5 Assess and mitigate the vulnerabilities of security architectures, designs, and solution

  • Client-based systems
  • Server-based systems
  • Database systems
  • Cryptographic systems
  • Industrial Control Systems (ICS)
  • Cloud-based systems
  • Distributed systems
  • Internet of Things (IoT)

3.6 Assess and mitigate vulnerabilities in web-based systems

3.7 Assess and mitigate vulnerabilities in mobile systems

3.8 Assess and mitigate vulnerabilities in embedded devices

3.9 Apply cryptography

  • Cryptographic life cycle (e.g., key management, algorithm selection)
  • Cryptographic methods (e.g., symmetric, asymmetric, elliptic curves)
  • Public Key Infrastructure (PKI)
  • Digital signatures
  • Non-repudiation
  • Integrity (e.g., hashing)
  • Understand methods of cryptanalytic attacks
  • Digital Rights Management (DRM)
  • Key management practices

3.10 Apply security principles to site and facility design

3.11 Implement site and facility security controls

  • Wiring closets/intermediate distribution facilities
  • Server rooms/data centres
  • Media storage facilities
  • Evidence storage
  • Restricted and work area security
  • Utilities and Heating, Ventilation, and Air Conditioning (HVAC) » Environmental issues
  • Fire prevention, detection, and suppression

Domain 4: Communication and Network Security

4.1 Implement secure design principles in network architectures

  • Open System Interconnection (OSI) and Transmission Control Protocol/Internet Protocol (TCP/IP) models
  • Internet Protocol (IP) networking
  • Implications of multilayer protocols
  • Software-defined networks
  • Wireless networks
  • Converged protocols

4.2 Secure network components             

  • Operation of hardware
  • Transmission media
  • Network Access Control (NAC) devices
  • Endpoint security
  • Content-distribution networks

4.3 Implement secure communication channels according to design

  • Voice
  • Multimedia collaboration
  • Remote access
  • Data communications
  • Virtualised networks

Domain 5: Identity and Access Management (IAM)

5.1 Control physical and logical access to assets

  • Information
  • Systems
  • Devices
  • Facilities

5.2 Manage identification and authentication of people, devices, and services

  • Identity management implementation
  • Registration and proofing of identity
  • Single/multi-factor authentication
  • Federated Identity Management (FIM)
  • Accountability
  • Credential management systems
  • Session management

5.3 Integrate identity as a third-party service

  • On-premise
  • Cloud
  • Federated

5.4 Implement and manage authorisation mechanisms

  • Role Based Access Control (RBAC)
  • Discretionary Access Control (DAC)
  • Rule-based access control
  • Attribute Based Access Control (ABAC)
  • Mandatory Access Control (MAC)

5.5 Manage the identity and access provisioning lifecycle

  • User access review
  • System account access review
  • Provisioning and deprovisioning

Domain 6: Security Assessment and Testing 

6.1 Design and validate assessment, test, and audit strategies

  • Internal
  • External
  • Third-party

6.2 Conduct security control testing

  • Vulnerability assessment
  • Code review and testing
  • Penetration testing
  • Misuse case testing
  • Log reviews
  • Test coverage analysis
  • Synthetic transactions
  • Interface testing

6.3 Collect security process data (e.g., technical and administrative)

  • Account management
  • Training and awareness
  • Management review and approval
  • Disaster Recovery (DR) and Business Continuity
  • Key performance and risk indicators (BC)
  • Backup verification data

6.4 Analyse test output and generate report

6.5 Conduct or facilitate security audits

  • Internal
  • External
  • Third-party

Domain 7: Security Operations

7.1 Understand and support investigations

  • Evidence collection and handling
  • Investigative techniques
  • Reporting and documentation
  • Digital forensics tools, tactics, and procedures

7.2 Understand requirements for investigation types

  • Administrative
  • Regulatory
  • Criminal
  • Industry standards
  • Civil

7.3 Conduct logging and monitoring activities

  • Intrusion detection and prevention
  • Continuous monitoring
  • Security Information and Event Management
  • Egress monitoring (SIEM)

7.4 Securely provisioning resources

  • Asset inventory
  • Asset management
  • Configuration management

7.5 Understand and apply foundational security operations concepts

  • Need-to-know/least privileges
  • Job rotation
  • Separation of duties and responsibilities
  • Information lifecycle
  • Privileged account management
  • Service Level Agreements (SLA)

7.6 Apply resource protection techniques

  • Media management
  • Hardware and software asset management

7.7 Conduct incident management

  • Detection
  • Recovery
  • Response
  • Remediation
  • Mitigation
  • Lessons learned
  • Reporting

7.8 Operate and maintain detective and preventative measures

  • Firewalls
  • Sandboxing
  • Intrusion detection and prevention systems
  • Honeypots/honeynets
  • Whitelisting/blacklisting
  • Anti-malware
  • Third-party provided security services

7.9 Implement and support patch and vulnerability management

7.10 Understand and participate in change management processes

7.11 Implement recovery strategies

  • Backup storage strategies
  • System resilience, high availability, Quality of
  • Recovery site strategies Service (QoS), and fault tolerance
  • Multiple processing sites

7.12 Implement Disaster Recovery (DR) processes

  • Response
  • Personnel
  • Communications

7.13 Test Disaster Recovery Plans (DRP)               

  • Assessment
  • Restoration
  • Training and awareness
  • Read-through/tabletop
  • Walkthrough
  • Simulation
  • Parallel
  • Full interruption

7.14 Participate in Business Continuity (BC) planning and exercises

7.15 Implement and manage physical security

  • Perimeter security controls
  • Internal security controls

7.16 Address personnel safety and security concerns

  • Travel
  • Emergency management
  • Security training and awareness
  • Duress

Domain 8: Software Development Security

8.1 Understand and integrate security in the Software Development Life Cycle (SDLC)

  • Development methodologies
  • Change management
  • Maturity models
  • Integrated product team
  • Operation and maintenance

8.2 Identify and apply security controls in development environments

  • Security of the software environments
  • Configuration management as an aspect of secure coding
  • Security of code repositories

8.3 Assess the effectiveness of software security

  • Auditing and logging of changes
  • Risk analysis and mitigation

8.4 Assess security impact of acquired software

8.5 Define and apply secure coding guidelines and standards

  • Security weaknesses and vulnerabilities at the source-code level
  • Security of application programming interfaces
  • Secure coding practices

Lue lisää ...

Kiinnostunut? Katso hinnat tästä tai soita meille 09 - 42 419 397

What is a CISSP Boot Camp?

Firebrand’s CISSP Boot Camp is an accelerated course that will prepare you to take the challenging CISSP exam. Accelerated training is fast, but this is not a crash course – you’ll learn from a real-world security expert and study everything you need to know to pass the exam.

You’ll study the eight CISSP CBK (Common Body of Knowledge) domains using the most up-to-date curriculum and revision materials.

Firebrand’s CISSP bootcamp is ideal for experienced security professionals, including managers, auditors and consultants – or anyone aiming to achieve CISO roles.


Does Firebrand offer CISSP online training?

Firebrand does not provide online training for the CISSP certification. Instead, Firebrand’s CISSP course provides students with an opportunity to learn in-person from expert security instructors.


How much does CISSP training cost?

To find out the cost of this accelerated CISSP course and others, visit our prices page.


What is the CISSP CBK?

The CISSP Common Body of Knowledge (CBK) is an established information security framework covering security terminology, principles and a library of cyber security topics. It is sometimes referred to as the CISSP syllabus.

Created by (ISC)2, the CBK is used to assess a student’s level of security knowledge when preparing for and sitting the CISSP exam.

CISSPs are subject matter experts (SMEs) who work within two or more of these eight domains and possess advanced knowledge, skills, and experience gained through certification. 


What are the CISSP domains?

The CISSP exam covers 8 domains in 2018 which are:

  • Security and Risk Management
  • Asset Security
  • Security Engineering
  • Communications & Network Security
  • Identity & Access Management
  • Security Assessment & Testing
  • Security Operations
  • Software Development Security

What are the CISSP prerequisites?

To achieve this certification, you must have at least five years of cumulative, paid and full-time work experience in two or more of the eight CISSP CBK domains.

However, if you don’t meet these requirements, you can get a one-year experience waiver with:

  • A four-year college degree (or regional equivalent)
  • An approved credential from (ISC)2’s experience waiver list

You may also opt to take and sit the CISSP exam without the required experience. If you do pass the exam without the prerequisite experience, you will become an Associate of (ISC)2. You’ll then have six years to earn the work experience required, at which point you will receive your CISSP certification.


What does the CISSP exam cost in the UK?

The CISSP exam costs £560 in the UK.


How many hours is the CISSP exam?

The CISSP CAT exam duration is three hours. Exceptions can be provided to candidates with medical accommodations that are pre-approved by (ISC)2.

There is no minimum exam duration and students may proceed through the exam at their own pace.


What is the salary for a CISSP professional?

The average annual salary for professionals holding the CISSP certification is £60,000 – according to data from ITJobsWatch.

Lue lisää ...

Kiinnostunut? Katso hinnat tästä tai soita meille 09 - 42 419 397

On this accelerated course, you'll prepare for and sit your CISSP exam at the Firebrand Training Centre, covered by your Certification Guarantee.

  • CISSP exam
    • Exam length: up to three hours
    • Number of questions: 100-150
    • Format: Multiple choice and advanced innovative questions
    • Passing grade: 700 out of 1000 points
    • Languages: English, French, German, Brazilian Portuguese, Spanish, Japanese, Simplified Chinese and Korean. The exam is also available in a format for Visually Impaired students.

You'll be tested on the eight CISSP domains:

  1. Security and Risk Management - 15%
  2. Asset Security - 10%
  3. Security Architecture and Engineering - 13%
  4. Communication and Network Security - 14%
  5. Identity and Access Management (IAM) - 13%
  6. Security Assessment and Testing - 12%
  7. Security Operations - 13%
  8. Software Development Security - 10%

After passing your exam

Once you have successfully passed your certification exam, you'll receive your certificate and ID card. Upon receiving notification of your exam success, you will be required to subscribe to the (ISC)2 Code of Ethics and have your application endorsed before the credential can be awarded.

An endorsement form for this purpose must be completed and signed by an (ISC)2 certified professional who is an active member, and who can attest to your professional experience. You are required to become certified within nine months of the date of your exam.

If you do not become certified or an Associate of (ISC)2 within 9 months of the date of your exam, you will be required to retake the exam in order to become certified. It is possible for (ISC)2 to endorse you if you cannot find a certified individual to act as one.

Maintenance Requirements

The CISSP certification has annual and three-year CPE requirements. To maintain your certification you must:

  • Earn and submit a minimum of 40 Continuing Professional Education (CPE) credits each year of the three year certification cycle
  • Gain a minimum of 120 CPE credits every three years
  • Pay the annual maintenance fee (AMF) of USD$85 each year of your three-year certification cycle
  • Fully support and abide by the (ISC)2 Code of Ethics

Please note: Passing candidates may be randomly selected and audited by (ISC)2 Member Services prior to issuance of a certification. Attaining multiple certifications may result in a candidate being audited more than once. Firebrand Training will provide support for candidates that are audited.

Lue lisää ...

Kiinnostunut? Katso hinnat tästä tai soita meille 09 - 42 419 397

On your accelerated CISSP course, you'll get access to resources only available to authorised (ISC)2 training providers:

  • Authorised (ISC)2 instructors vetted by (ISC)2 and trained to deliver (ISC)2 certification courses
  • Official and up-to-date courseware, including "The Official (ISC)2 CISSP CBK Review Seminar - Student Handbook"
  • Official Practice Exam

Firebrand will also provide you with:

  • Personal exam-readiness evaluation
  • Supplementary material designed to further strengthen your knowledge in preparation for the exam

Please note: If you are funding this accelerated course through the MOD's Enhanced Learning Credits (ELC) scheme, you must pay separately for accommodation and meals. For more information, contact us on 080 80 800 888.

Lue lisää ...

Kiinnostunut? Katso hinnat tästä tai soita meille 09 - 42 419 397

To achieve this certification, you must have:

  • At least five years cumulative, paid, full-time work experience in two or more of the eight (ISC)2 CISSP Body of Knowledge (CBK) domains

If you don’t meet the work experience requirement you can get a one year experience waiver with:

  • A four-year college degree (or regional equivalent)
  • An approved credential from (ISC)2’s experience waiver list

Alternatively, you may opt to take and sit the CISSP exam without the required experience. Pass the exam and you will become an Associate of (ISC)2 – you’ll then have six years to earn the work experience required. Upon gaining the experience you will receive your full CISSP certification.

Kiinnostunut? Katso hinnat tästä tai soita meille 09 - 42 419 397

Milloin

Milloin haluat käydä pikakurssin?

Alkaa

Loppuu

Saatavuus

Rekisteröidy

Päättynyt

 

Päättynyt

 

Päättynyt

 

Päättynyt

 

Meneillään

 

Odotuslista

 

Rajoitettu määrä paikkoja

Rekisteröidy

Odotuslista

 

Arvioinnit

Olemme kouluttaneet kymmenen vuoden aikana yli 68.075 opiskelijaa. Heitä kaikkia on pyydetty arvioimaan pikakurssimme. Tällä hetkellä 96,72% on sitä mieltä, että Firebrand on ylittänyt heidän odotuksensa:

"Good structure and very focused training both from instructor side and student side. Intresting discussions and everyone was focused to the goal of the class.."
J.H.. - (ISC)2 CISSP Boot Camp (6 päivää)

"The on-site support by Firebrand was great, proactive and timely, and I did not miss anything. The training could proceed undisturbed. The course faciliator was great!"
Raits Misins. - (ISC)2 CISSP Boot Camp (6 päivää) (27/6/2016 - 3/7/2016)

"Really good training concept. The instructor was very skilled and the facilities were perfect for the purpose."
Anonyymi - (ISC)2 CISSP Boot Camp (6 päivää) (27/6/2016 - 3/7/2016)

"The CISSP course did give a good overview of the different domains. "
Anonyymi - (ISC)2 CISSP Boot Camp (6 päivää) (4/4/2016 - 10/4/2016)

"Fast paced, demanding"
Anonyymi - (ISC)2 CISSP Boot Camp (6 päivää) (4/4/2016 - 10/4/2016)

"Great experience. Everything was taken care of which it possible for us to focus on studying without worrying about anything else."
Anonyymi - (ISC)2 CISSP Boot Camp (6 päivää) (4/4/2016 - 10/4/2016)

"Firebrand always focus to get you through the training/course in your best way"
Anonyymi - (ISC)2 CISSP Boot Camp (6 päivää) (4/4/2016 - 10/4/2016)

"Important to be 100% focused on training"
Anonyymi - (ISC)2 CISSP Boot Camp (6 päivää) (4/4/2016 - 10/4/2016)

"This is a highpaced with LOTS of information and you will benefit from reading through the domains before attending"
Anonyymi - (ISC)2 CISSP Boot Camp (6 päivää) (4/4/2016 - 10/4/2016)

"Well-structured training with focused learning"
Anders Rosdahl, Volvo Cars. - (ISC)2 CISSP Boot Camp (6 päivää) (4/4/2016 - 10/4/2016)

"Good facility, no distruptions"
Anonyymi - (ISC)2 CISSP Boot Camp (6 päivää) (2/11/2015 - 8/11/2015)

"Simply put, Firebrand combines professionalism, extraordinary good instructor and a relaxed environment, to put you in a state to perform your very best."
Per Gustavsson , Combitech. - (ISC)2 CISSP Boot Camp (6 päivää) (14/9/2015 - 20/9/2015)

"A good way to get through an extensive course with an excellent instructor. The format of living at the training facilities is a huge + when studying long hours."
Anonyymi - (ISC)2 CISSP Boot Camp (6 päivää) (14/9/2015 - 20/9/2015)

"It´s a hard course but its worth it."
Anonyymi - (ISC)2 CISSP Boot Camp (6 päivää) (14/9/2015 - 20/9/2015)

"Fastest way of getting information on what you need to pass the CISSP examination."
Urban Molander, Länsförsäkringar Bank AB. - (ISC)2 CISSP Boot Camp (6 päivää) (14/9/2015 - 20/9/2015)

"Good way to learn - Less distractions"
Hasan Rahman . - (ISC)2 CISSP Boot Camp (6 päivää) (6/7/2015 - 12/7/2015)

"A really challenging but effective way of learning. Everything has been taken care of, you focus on your studies."
Jimmy Larsson, ATEA Sweden. - (ISC)2 CISSP Boot Camp (6 päivää) (6/7/2015 - 12/7/2015)

"This is my second time attending a course provided by Firebrand training and I whitness consistency in quality of instructors, facilities and everything around the training is provided so I can focus on what is important. "
Jimmy Johansson . - (ISC)2 CISSP Boot Camp (6 päivää) (6/7/2015 - 12/7/2015)

"Helpful and nice personal. Good food. The instructor had very good experience and knowledge. The site manager has been very professional and kind!"
Anonyymi - (ISC)2 CISSP Boot Camp (6 päivää) (6/7/2015 - 12/7/2015)

"Very competent course instructor."
Anonyymi - (ISC)2 CISSP Boot Camp (6 päivää) (6/7/2015 - 12/7/2015)

"A very thorogh imnersive Learning experiense. The facility provided a distraction-free enviroment. And the instructor was excellent - knowledgeble and personable"
Richard Brice, Cyber Consulting. - (ISC)2 CISSP Boot Camp (6 päivää) (4/5/2015 - 10/5/2015)

"Firebrand facilities and accommondations Keep you focused on your goal. Failure is not a option!"
Daniel Gustafsson , ATEA Sverige AB. - (ISC)2 CISSP Boot Camp (6 päivää) (4/5/2015 - 10/5/2015)

"Intense, but rally valuable"
Tomas Sageland , Syscore. - (ISC)2 CISSP Boot Camp (6 päivää) (4/5/2015 - 10/5/2015)

"Good setup for Learning & certifications"
Anonyymi - (ISC)2 CISSP Boot Camp (6 päivää) (4/5/2015 - 10/5/2015)

"You can really immerse yourself"
Thomas Weisdorf , Cura IT. - (ISC)2 CISSP Boot Camp (6 päivää) (4/5/2015 - 10/5/2015)

"The course has been pro!"
Anonyymi - (ISC)2 CISSP Boot Camp (6 päivää) (2/3/2015 - 8/3/2015)

"Tough Schedule and condensed but very valuable information and highly skilled teacher. "
Niclas Westerlund , SEB. - (ISC)2 CISSP Boot Camp (6 päivää) (2/3/2015 - 8/3/2015)

"Focus from start until end of course."
Anders Toft , Region Hovedstaden. - (ISC)2 CISSP Boot Camp (6 päivää) (2/3/2015 - 8/3/2015)

"This has been a well spent 7 days preparing for the CISSP exam. It is well paced and the discussions embodying different perspectives are invaluable"
Kofi Ayirebi , NNIT. - (ISC)2 CISSP Boot Camp (6 päivää) (2/3/2015 - 8/3/2015)

"You know me by now :) "
Stefan Bäcklin , Ninta. - (ISC)2 CISSP Boot Camp (6 päivää) (2/3/2015 - 8/3/2015)

"Very, very comprehensive! Even overwhelming at times, but you will most definitely get your money´s worth!"
patrik Björkenheim . - (ISC)2 CISSP Boot Camp (6 päivää) (2/3/2015 - 8/3/2015)

"Intense training for a week, great structure to learn whats needed as long as you put the work in. "
Benjamin Särkkä . - (ISC)2 CISSP Boot Camp (6 päivää) (1/12/2014 - 7/12/2014)

"Effective and efficient course with comprehensive scope of security tophies, allowing to advance own and companys development in best way."
Eugene Gryazin , Nordea. - (ISC)2 CISSP Boot Camp (6 päivää) (1/12/2014 - 7/12/2014)

"Well organised, great teacher and great accommodation"
Anonyymi - (ISC)2 CISSP Boot Camp (6 päivää) (1/12/2014 - 7/12/2014)

"Really good environment to study in"
Anonyymi - (ISC)2 CISSP Boot Camp (6 päivää) (1/12/2014 - 7/12/2014)

"Very intense and effective learning process"
Christoffer Eskilsson . - (ISC)2 CISSP Boot Camp (6 päivää) (1/12/2014 - 7/12/2014)

"In the normal work/home enviroment I woild not get the focus needed."
Anonyymi - (ISC)2 CISSP Boot Camp (6 päivää) (8/9/2014 - 14/9/2014)

"Professional, structured and helpful all the way through. Highly recommended."
Anonyymi - (ISC)2 CISSP Boot Camp (6 päivää) (23/6/2014 - 29/6/2014)

"Great teacher. Managed to keep everything interesting."
Michael Andersson . - (ISC)2 CISSP Boot Camp (6 päivää) (23/6/2014 - 29/6/2014)

"Great instructor, Great facilities, resonable price"
Anonyymi - (ISC)2 CISSP Boot Camp (6 päivää) (23/6/2014 - 29/6/2014)

"Good instructor - Fast."
Anonyymi - (ISC)2 CISSP Boot Camp (6 päivää) (10/3/2014 - 16/3/2014)

"Very intense course, goes straight to whats important."
Anonyymi - (ISC)2 CISSP Boot Camp (6 päivää) (10/3/2014 - 16/3/2014)

"Best and fastest way to get a knowledge."
Anonyymi - (ISC)2 CISSP Boot Camp (6 päivää) (10/3/2014 - 16/3/2014)

"It was a great learning experience. I was allowed to submerge completely into the material. The instructor did a fantastic job. "
Anonyymi - (ISC)2 CISSP Boot Camp (6 päivää) (10/3/2014 - 16/3/2014)

"Good effective training with a clear goal. "
Anonyymi - (ISC)2 CISSP Boot Camp (6 päivää) (10/3/2014 - 16/3/2014)

"Everything was perfect."
Anonyymi - (ISC)2 CISSP Boot Camp (6 päivää) (10/3/2014 - 16/3/2014)

"Great course. Very experienced and engaged instructor. "
Anonyymi - (ISC)2 CISSP Boot Camp (6 päivää) (9/12/2013 - 15/12/2013)

"Highly recommended"
Anonyymi - (ISC)2 CISSP Boot Camp (6 päivää) (9/12/2013 - 15/12/2013)

"Very good enviroment for training and studying."
Anonyymi - (ISC)2 CISSP Boot Camp (6 päivää) (23/9/2013 - 29/9/2013)

"This is the best training enviroment I have ever trained at. Instructor was top notch and the facilities were Hotel-grade. I will come again for sure."
Brian Petersen . - (ISC)2 CISSP Boot Camp (6 päivää) (23/9/2013 - 29/9/2013)

Katso hinnat