Maxtrain.com - info@maxtrain.com - 513-322-8888 - 866-595-6863
Certified Security Leadership Officer On-Demand
Description
Certified Security Leadership Officer On-Demand Introduction
Introducing the Certified Security Leadership Officer (C)SLO On-Demand course, designed to empower mid to upper-level management professionals seeking to fortify their expertise in information system security management.
Tailored for IT managers, cybersecurity specialists, and those pursuing CISSP certification, this course offers an immersive exploration into contemporary security challenges, industry-leading practices, and cutting-edge technological advancements.
Throughout the program, participants will master the art of formulating and overseeing robust security controls, bolstering their organizations’ defenses and aligning with established industry standards.
By diving into these core areas, participants will emerge equipped with the strategic insights and practical skills necessary to navigate the complex and ever-evolving landscape of cybersecurity, thereby elevating their roles as trusted leaders in their organizations and the broader industry.
Certified Security Leadership Officer On-Demand Course Objectives
- Understand Contemporary Security Challenges: Grasp the current landscape of cybersecurity threats and the strategic responses required.
- Implement Best Practices and Technologies: Learn to deploy the latest in security technologies and adhere to best practices to safeguard information systems.
- Enhance Security Controls: Develop skills to design and implement effective security controls that protect organizational assets.
- Leadership in Cybersecurity: Cultivate leadership qualities that are critical for managing and leading security teams effectively.
- Prepare for Industry Recognition: Equip yourself with the knowledge and skills needed to enhance your professional credibility and recognition in the field of information security
Prerequisites
- 12 months professional experience in IT
- 12 months professional experience in systems management
Audience
- C – Level Managers
- IT Managers
- Cyber Security Personelle
- Engineers
- Information Systems Owners
- ISSO’s
- CISSP Students
- ISO’s
Certified Security Leadership Officer On-Demand Outline
Security Management
- Role and responsibilities of the CSLO
- Aligning security with business goals and objectives
- Governance overview and outcomes
- IT security organization and strategy
- Defining security objectives and budget
- Information security frameworks and ethics
- Intellectual property protection and awareness training
Risk Management
- Introduction to risk management
- Quantitative vs. qualitative risk assessment
- Asset valuation and risk evaluation
- Controls and cost-benefit analysis
- Documentation and appropriate controls
Encryption
- Understanding encryption and cryptographic functions
- Symmetric and asymmetric encryption
- Hashing algorithms and digital signatures
- Public Key Infrastructure (PKI) and certificates
- Uses of encryption in communications and auditing
Information Security Access Control Concepts
- Information asset classification and protection
- Password policies and biometrics
- Authorization, accounting, and access control
- Regulatory compliance and asset valuation
Incident Handling and Evidence
- Goals of incident management and response
- Security incident handling and response
- Incident response functions and responsibilities
- Crisis communications and containment strategies
- Evidence identification and preservation
Operations Security
- Operations security and specific tasks
- Data leakage prevention and records management
- Change control and trusted recovery
- Disaster recovery planning and BCP
- Vulnerability assessments and penetration testing
Network Security
- Network topologies and data encapsulation
- Network security architecture and firewalls
- Unified Threat Management (UTM) and TCP/IP suite
- Internet threats, security auditing, and IPSec
- Wireless technologies and access point security
$1095.00
|
|