{"id":17021,"date":"2025-03-19T15:55:25","date_gmt":"2025-03-19T14:55:25","guid":{"rendered":"https:\/\/acgcyberacademy.fr\/?post_type=mec-events&#038;p=17021"},"modified":"2026-03-13T14:06:58","modified_gmt":"2026-03-13T13:06:58","slug":"isc2-certified-information-systems-security-professional-cissp","status":"publish","type":"mec-events","link":"https:\/\/acgcyberacademy.fr\/en\/events\/isc2-certified-information-systems-security-professional-cissp\/","title":{"rendered":"ISC2 Certified Information Systems Security Professional (CISSP)"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"17021\" class=\"elementor elementor-17021\" data-elementor-post-type=\"mec-events\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6c0c232 e-flex e-con-boxed e-con e-child\" data-id=\"6c0c232\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-42f62ef3 e-flex e-con-boxed e-con e-child\" data-id=\"42f62ef3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-25867c6 elementor-widget__width-initial elementor-widget elementor-widget-spacer\" data-id=\"25867c6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-50b2b49 e-con-full e-flex e-con e-child\" data-id=\"50b2b49\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2407fed elementor-widget elementor-widget-image\" data-id=\"2407fed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"295\" height=\"300\" src=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/03\/ISC2_OTP-1180x1200-1-295x300.png\" class=\"attachment-medium size-medium wp-image-17024\" alt=\"\" srcset=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/03\/ISC2_OTP-1180x1200-1-295x300.png 295w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/03\/ISC2_OTP-1180x1200-1-1007x1024.png 1007w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/03\/ISC2_OTP-1180x1200-1-768x781.png 768w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/03\/ISC2_OTP-1180x1200-1-12x12.png 12w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/03\/ISC2_OTP-1180x1200-1.png 1180w\" sizes=\"(max-width: 295px) 100vw, 295px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bf54779 elementor-widget__width-initial elementor-widget elementor-widget-spacer\" data-id=\"bf54779\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b1e68e5 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"b1e68e5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1920\" height=\"536\" src=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/03\/ISC2_CISSP_RGB__horiz_inline.jpg\" class=\"attachment-2048x2048 size-2048x2048 wp-image-17018\" alt=\"\" srcset=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/03\/ISC2_CISSP_RGB__horiz_inline.jpg 1920w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/03\/ISC2_CISSP_RGB__horiz_inline-300x84.jpg 300w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/03\/ISC2_CISSP_RGB__horiz_inline-1024x286.jpg 1024w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/03\/ISC2_CISSP_RGB__horiz_inline-768x214.jpg 768w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/03\/ISC2_CISSP_RGB__horiz_inline-1536x429.jpg 1536w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/03\/ISC2_CISSP_RGB__horiz_inline-18x5.jpg 18w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ca380f8 elementor-widget elementor-widget-spacer\" data-id=\"ca380f8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d4b68c9 elementor-widget elementor-widget-heading\" data-id=\"4d4b68c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Description <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5b0eb856 e-flex e-con-boxed e-con e-child\" data-id=\"5b0eb856\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-57a3c7d5 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"57a3c7d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Official ISC2\u00ae Training Seminar for the <b>Certified Information Systems Security Professional (CISSP\u00ae)<\/b>\u00a0provides a comprehensive review of the knowledge required to effectively design, engineer and\u00a0manage the overall security posture of an organization. This training course will help students review\u00a0and refresh their knowledge and identify areas they need to study for the CISSP exam. Content aligns\u00a0with and comprehensively covers the eight domains of the ISC2 CISSP Common Body of Knowledge\u00a0(CBK\u00ae), ensuring relevancy across all disciplines in the field of cybersecurity.<\/p><p>The <b>Certified Information Systems Security Professional (CISSP)<\/b> is the most-esteemed cybersecurity certification in the world. The <b>CISSP <\/b>recognizes information security leaders who understand cybersecurity strategy, as well as hands-on implementation. It shows you have the knowledge and experience to design, develop and manage the overall security posture of an organization.<\/p><p>Official courseware is developed by ISC2 \u2013 creator of the CISSP CBK \u2013 to ensure your training is\u00a0relevant and up-to-date. Our instructors are verified security experts who hold the CISSP and have\u00a0completed intensive training to teach ISC2 content.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fdbcfe6 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"fdbcfe6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Target group<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-25da03fa elementor-widget elementor-widget-text-editor\" data-id=\"25da03fa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"course-section__content\"><div class=\"course-section__rtf\"><div class=\"course-section course-section--hidden\" data-section=\"3\"><div class=\"course-section__content\"><div class=\"course-section__rtf\"><div class=\"su-column su-column-size-1-2\"><div class=\"su-column-inner su-u-clearfix su-u-trim\"><div class=\"su-list\"><p>This training course is intended for professionals who have at least five years of cumulative, paid work\u00a0experience in two or more of the eight domains of the ISC2 <b>CISSP <\/b>CBK and are pursuing CISSP training\u00a0and certification to acquire the credibility and mobility to advance within their current information\u00a0security careers. The training seminar is ideal for those working in positions such as, but not limited to:<\/p><ul><li>Security Consultant<\/li><li>Security Manager<\/li><li>IT Director\/Manager<\/li><li>Security Auditor<\/li><li>Security Architect<\/li><li>Security Analyst<\/li><li>Security Systems Engineer<\/li><li>Chief Information Security Officer<\/li><li>Security Director<\/li><li>Network Architect<\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f9471f9 elementor-widget elementor-widget-spacer\" data-id=\"f9471f9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1ca12bed elementor-widget elementor-widget-heading\" data-id=\"1ca12bed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Program<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-10905e70 elementor-icon-list--layout-inline elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"10905e70\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-hourglass-half\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Duration : 5 days<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-21bcc20 elementor-widget elementor-widget-text-editor\" data-id=\"21bcc20\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"su-column su-column-size-1-2\"><div class=\"su-column-inner su-u-clearfix su-u-trim\"><div class=\"su-list\"><ul><li><strong>Domain 1 :<\/strong> Security and Risk Management<\/li><li><b>Domain 2 :\u00a0<\/b>Asset Security<\/li><li><b>Domain 3 : <\/b>Security Architecture and Engineering<\/li><li><b>Domain 4 :<\/b> Communication and Network Security<\/li><li><strong>Domain 5 :<\/strong> Identity and Access Management (IAM)<\/li><li><strong>Domain 6 :<\/strong> Security Assessment and Testing<\/li><li><strong>Domain 7 :<\/strong> Security Operations<\/li><li><strong>Domain 8 :<\/strong> Software Development Security<\/li><\/ul><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3add2827 e-flex e-con-boxed e-con e-child\" data-id=\"3add2827\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-796b392b e-flex e-con-boxed e-con e-child\" data-id=\"796b392b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-39dfad0 elementor-widget elementor-widget-heading\" data-id=\"39dfad0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Goal<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2a33cab7 elementor-widget elementor-widget-text-editor\" data-id=\"2a33cab7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>After completing this course, the student will be able to:<\/p><ul><li>Apply fundamental concepts and methods related to the fields of information technology and\u00a0security.<\/li><li>Align overall organizational operational goals with security functions and implementations.<\/li><li>Determine how to protect assets of the organization as they go through their lifecycle.<\/li><li>Leverage the concepts, principles, structures, and standards used to design, implement,\u00a0monitor, and secure operating systems, equipment, networks, applications, and those controls\u00a0used to enforce various levels of confidentiality, integrity, and availability.<\/li><li>Apply security design principles to select appropriate mitigations for vulnerabilities present in\u00a0common information system types and architectures.<\/li><li>Explain the importance of cryptography and the security services it can provide in today\u2019s digital\u00a0and information age.<\/li><li>Evaluate physical security elements relative to information security needs.<\/li><li>Evaluate the elements that comprise communication and network security relative to information\u00a0security needs.<\/li><li>Leverage the concepts and architecture that define the associated technology and\u00a0implementation systems and protocols at Open Systems Interconnection (OSI) model layers 1\u20137\u00a0to meet information security needs.<\/li><li>Determine appropriate access control models to meet business security requirements.<\/li><li>Apply physical and logical access controls to meet information security needs.<\/li><li>Differentiate between primary methods for designing and validating test and audit strategies\u00a0that support information security requirements.<\/li><li>Apply appropriate security controls and countermeasures to optimize an organization\u2019s\u00a0operational function and capacity.<\/li><li>Assess information systems risks to an organization\u2019s operational endeavors.<\/li><\/ul><p><strong>\u00a0<\/strong><\/p><p><strong>Note:<\/strong> Throughout this course, exam domains may be covered in several chapters. Included in the\u00a0course is a table indicating where the exam outline objectives are covered in this course.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4f051be3 e-flex e-con-boxed e-con e-child\" data-id=\"4f051be3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-52b552e6 elementor-widget elementor-widget-heading\" data-id=\"52b552e6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Recommended<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2cfa19f0 elementor-widget elementor-widget-text-editor\" data-id=\"2cfa19f0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"flex max-w-full flex-col flex-grow\"><div class=\"min-h-8 text-message flex w-full flex-col items-end gap-2 whitespace-normal break-words text-start [.text-message+&amp;]:mt-5\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"27870c5c-bcd1-46a6-88c7-04a7e41e22aa\" data-message-model-slug=\"gpt-4o\"><div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[3px]\"><div class=\"markdown prose w-full break-words dark:prose-invert light\"><div id=\"Prerequisites\" class=\"row courseBody half-vertical-gutter\"><div class=\"centralSpan\"><div class=\"courseDescription\"><p><span style=\"color: #000000;font-family: var( --e-global-typography-text-font-family ), Sans-serif;font-size: 14px;font-weight: 500;letter-spacing: 0px;text-transform: none;background-color: var( --e-global-color-c696dce )\">Basic knowledge of networks and operating systems, as well as information security. Basic knowledge of audit standards and business continuity.<\/span><span style=\"color: #000000;font-family: var( --e-global-typography-text-font-family ), Sans-serif;font-size: 14px;font-weight: 500;letter-spacing: 0px;text-transform: none;background-color: var( --e-global-color-c696dce )\">\u00a0<\/span><\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3e05670 e-flex e-con-boxed e-con e-parent\" data-id=\"3e05670\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-016fda6 e-con-full e-flex e-con e-child\" data-id=\"016fda6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2b6f4a1 elementor-button-info elementor-align-center elementor-widget__width-initial elementor-widget elementor-widget-button\" data-id=\"2b6f4a1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/03\/MAR-CISSP-Ultimate-Guide.pdf\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">View the ISC2 Ultimate Guide<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-724d5e9 e-con-full e-flex e-con e-child\" data-id=\"724d5e9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b135162 elementor-button-info elementor-align-center elementor-widget__width-initial elementor-widget elementor-widget-button\" data-id=\"b135162\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/03\/SALES-CISSP_course_outlineREBRANDT.pdf\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">View the ISC2 Course Outlines<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Description Official ISC2\u00ae Training Seminar for the Certified Information Systems Security Professional (CISSP\u00ae)\u00a0provides a comprehensive review of the knowledge required to effectively design, engineer and\u00a0manage the overall security posture of an organization. This training course will help students review\u00a0and refresh their knowledge and identify areas they need to study for the CISSP exam. Content aligns\u00a0with [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":17019,"comment_status":"closed","ping_status":"closed","template":"","tags":[142],"accesibilite":[145],"certification":[87],"duree":[153],"examen":[146],"langue":[164],"niveau":[85],"formateur":[234],"cpf":[],"organismes":[],"organisme":[],"mec_category":[78],"class_list":["post-17021","mec-events","type-mec-events","status-publish","has-post-thumbnail","hentry","tag-formation-populaire","accesibilite-oui","certification-oui","duree-5-jours","examen-oui","langue-anglais","niveau-avance","formateur-isc2","mec_category-cybersecurite"],"acf":{"taux_davis_etoile":4.9,"taux_de_reussite":4.9,"formation_populaire":false,"lien_guide_dexamen":"","liste_importance_formations":1},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>ISC2 Certified Information Systems Security Professional (CISSP) - ACG CyberAcademy<\/title>\n<meta name=\"description\" content=\"CISSP certification \u2013 Master cybersecurity strategy and implementation, design and manage organizational security, covering all 8 CBK domains\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/acgcyberacademy.fr\/en\/events\/isc2-certified-information-systems-security-professional-cissp\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ISC2 Certified Information Systems Security Professional (CISSP) - ACG CyberAcademy\" \/>\n<meta property=\"og:description\" content=\"CISSP certification \u2013 Master cybersecurity strategy and implementation, design and manage organizational security, covering all 8 CBK domains\" \/>\n<meta property=\"og:url\" content=\"https:\/\/acgcyberacademy.fr\/en\/events\/isc2-certified-information-systems-security-professional-cissp\/\" \/>\n<meta property=\"og:site_name\" content=\"ACG CyberAcademy\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-13T13:06:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/03\/ISC2_CISSP_RGB__mark.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1920\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/isc2-certified-information-systems-security-professional-cissp\\\/\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/isc2-certified-information-systems-security-professional-cissp\\\/\",\"name\":\"ISC2 Certified Information Systems Security Professional (CISSP) - ACG CyberAcademy\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/isc2-certified-information-systems-security-professional-cissp\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/isc2-certified-information-systems-security-professional-cissp\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/ISC2_CISSP_RGB__mark.jpg\",\"datePublished\":\"2025-03-19T14:55:25+00:00\",\"dateModified\":\"2026-03-13T13:06:58+00:00\",\"description\":\"CISSP certification \u2013 Master cybersecurity strategy and implementation, design and manage organizational security, covering all 8 CBK domains\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/isc2-certified-information-systems-security-professional-cissp\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/isc2-certified-information-systems-security-professional-cissp\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/isc2-certified-information-systems-security-professional-cissp\\\/#primaryimage\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/ISC2_CISSP_RGB__mark.jpg\",\"contentUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/ISC2_CISSP_RGB__mark.jpg\",\"width\":1920,\"height\":1920,\"caption\":\"Pr\u00e9parez-vous au CISSP avec notre formation certifiante ISC2\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/isc2-certified-information-systems-security-professional-cissp\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Formations\",\"item\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"ISC2 Certified Information Systems Security Professional (CISSP)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#website\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\",\"name\":\"ACG Cyber Academy\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/acgcyberacademy.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#organization\",\"name\":\"ACG Cyber Academy\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Untitled-15-2.png\",\"contentUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Untitled-15-2.png\",\"width\":1080,\"height\":1080,\"caption\":\"ACG Cyber Academy\"},\"image\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/fr.linkedin.com\\\/company\\\/acg-cybersecurity\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ISC2 Certified Information Systems Security Professional (CISSP) - ACG CyberAcademy","description":"CISSP certification \u2013 Master cybersecurity strategy and implementation, design and manage organizational security, covering all 8 CBK domains","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/acgcyberacademy.fr\/en\/events\/isc2-certified-information-systems-security-professional-cissp\/","og_locale":"en_GB","og_type":"article","og_title":"ISC2 Certified Information Systems Security Professional (CISSP) - ACG CyberAcademy","og_description":"CISSP certification \u2013 Master cybersecurity strategy and implementation, design and manage organizational security, covering all 8 CBK domains","og_url":"https:\/\/acgcyberacademy.fr\/en\/events\/isc2-certified-information-systems-security-professional-cissp\/","og_site_name":"ACG CyberAcademy","article_modified_time":"2026-03-13T13:06:58+00:00","og_image":[{"width":1920,"height":1920,"url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/03\/ISC2_CISSP_RGB__mark.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/acgcyberacademy.fr\/events\/isc2-certified-information-systems-security-professional-cissp\/","url":"https:\/\/acgcyberacademy.fr\/events\/isc2-certified-information-systems-security-professional-cissp\/","name":"ISC2 Certified Information Systems Security Professional (CISSP) - ACG CyberAcademy","isPartOf":{"@id":"https:\/\/acgcyberacademy.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/acgcyberacademy.fr\/events\/isc2-certified-information-systems-security-professional-cissp\/#primaryimage"},"image":{"@id":"https:\/\/acgcyberacademy.fr\/events\/isc2-certified-information-systems-security-professional-cissp\/#primaryimage"},"thumbnailUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/03\/ISC2_CISSP_RGB__mark.jpg","datePublished":"2025-03-19T14:55:25+00:00","dateModified":"2026-03-13T13:06:58+00:00","description":"CISSP certification \u2013 Master cybersecurity strategy and implementation, design and manage organizational security, covering all 8 CBK domains","breadcrumb":{"@id":"https:\/\/acgcyberacademy.fr\/events\/isc2-certified-information-systems-security-professional-cissp\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/acgcyberacademy.fr\/events\/isc2-certified-information-systems-security-professional-cissp\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/acgcyberacademy.fr\/events\/isc2-certified-information-systems-security-professional-cissp\/#primaryimage","url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/03\/ISC2_CISSP_RGB__mark.jpg","contentUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/03\/ISC2_CISSP_RGB__mark.jpg","width":1920,"height":1920,"caption":"Pr\u00e9parez-vous au CISSP avec notre formation certifiante ISC2"},{"@type":"BreadcrumbList","@id":"https:\/\/acgcyberacademy.fr\/events\/isc2-certified-information-systems-security-professional-cissp\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/acgcyberacademy.fr\/"},{"@type":"ListItem","position":2,"name":"Formations","item":"https:\/\/acgcyberacademy.fr\/events\/"},{"@type":"ListItem","position":3,"name":"ISC2 Certified Information Systems Security Professional (CISSP)"}]},{"@type":"WebSite","@id":"https:\/\/acgcyberacademy.fr\/#website","url":"https:\/\/acgcyberacademy.fr\/","name":"ACG Cyber Academy","description":"","publisher":{"@id":"https:\/\/acgcyberacademy.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/acgcyberacademy.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/acgcyberacademy.fr\/#organization","name":"ACG Cyber Academy","url":"https:\/\/acgcyberacademy.fr\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/acgcyberacademy.fr\/#\/schema\/logo\/image\/","url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/10\/Untitled-15-2.png","contentUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/10\/Untitled-15-2.png","width":1080,"height":1080,"caption":"ACG Cyber Academy"},"image":{"@id":"https:\/\/acgcyberacademy.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/fr.linkedin.com\/company\/acg-cybersecurity"]}]}},"_links":{"self":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events\/17021","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events"}],"about":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/types\/mec-events"}],"author":[{"embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/comments?post=17021"}],"version-history":[{"count":19,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events\/17021\/revisions"}],"predecessor-version":[{"id":22658,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events\/17021\/revisions\/22658"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/media\/17019"}],"wp:attachment":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/media?parent=17021"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/tags?post=17021"},{"taxonomy":"accesibilite","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/accesibilite?post=17021"},{"taxonomy":"certification","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/certification?post=17021"},{"taxonomy":"duree","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/duree?post=17021"},{"taxonomy":"examen","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/examen?post=17021"},{"taxonomy":"langue","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/langue?post=17021"},{"taxonomy":"niveau","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/niveau?post=17021"},{"taxonomy":"formateur","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/formateur?post=17021"},{"taxonomy":"cpf","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/cpf?post=17021"},{"taxonomy":"organismes","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/organismes?post=17021"},{"taxonomy":"organisme","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/organisme?post=17021"},{"taxonomy":"mec_category","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec_category?post=17021"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}