Maxtrain.com - info@maxtrain.com - 513-322-8888 - 866-595-6863
Certified Security Leadership Officer On-Demand
Description
The Certified Security Leadership Officer (CSLO) On-Demand course is designed for mid and upper-level managers seeking to enhance their information system security management skills. Whether you’re an IT manager, cybersecurity expert, or CISSP student, this course equips you with vital knowledge about current security issues, best practices, and technology. By mastering this course, you’ll become proficient in implementing robust security controls and overseeing organizations with an industry-recognized security posture.
Outline
Module 1: Security Management
- Role and responsibilities of the CSLO
- Aligning security with business goals and objectives
- Governance overview and outcomes
- IT security organization and strategy
- Defining security objectives and budget
- Information security frameworks and ethics
- Intellectual property protection and awareness training
Module 2: Risk Management
- Introduction to risk management
- Quantitative vs. qualitative risk assessment
- Asset valuation and risk evaluation
- Controls and cost-benefit analysis
- Documentation and appropriate controls
Module 3: Encryption
- Understanding encryption and cryptographic functions
- Symmetric and asymmetric encryption
- Hashing algorithms and digital signatures
- Public Key Infrastructure (PKI) and certificates
- Uses of encryption in communications and auditing
Module 4: Information Security Access Control Concepts
- Information asset classification and protection
- Password policies and biometrics
- Authorization, accounting, and access control
- Regulatory compliance and asset valuation
Module 5: Incident Handling and Evidence
- Goals of incident management and response
- Security incident handling and response
- Incident response functions and responsibilities
- Crisis communications and containment strategies
- Evidence identification and preservation
Module 6: Operations Security
- Operations security and specific tasks
- Data leakage prevention and records management
- Change control and trusted recovery
- Disaster recovery planning and BCP
- Vulnerability assessments and penetration testing
Module 7: Network Security
- Network topologies and data encapsulation
- Network security architecture and firewalls
- Unified Threat Management (UTM) and TCP/IP suite
- Internet threats, security auditing, and IPSec
- Wireless technologies and access point security
PreRequisites
- 12 months professional experience in IT
- 12 months professional experience in systems management
Audience
- C – Level Managers
- IT Managers
- Cyber Security Personelle
- Engineers
- Information Systems Owners
- ISSO’s
- CISSP Students
- ISO’s
$1095.00
|
|