Logo

Maxtrain.com - [email protected] - 513-322-8888 - 866-595-6863

M2-CISSOMOD

CISSO Certified Information Systems Security Officer On-Demand

Description

This self-study course is designed for forward-thinking cyber security professionals that manage or plays a key role in an organization’s information security department. The course provides CISSO certification and addresses the broad range of industry best practices, knowledge and skills expected of a security leader. The student learns BOTH the theory and the requirements for practical implementation of core security concepts, practices, monitoring and compliance. Through the use of a risk-based approach, the C)ISSO is able to implement and maintain cost-effective security controls, that are closely aligned with not only business requirements but global industry standards.  

This unique, self-study course provides you with all the training you need to prepare for and pass the Certified Information Systems Security Officer (CISSO) exam. Certified Information Systems Security Officer students will be able to establish industry acceptable Cyber Security and IS management standards with current best practices.

The self-paced course addresses the broad range of industry best practices, knowledge and skills expected of a security manager/officer. The candidate will learn in-depth theory pertaining to the practical implementation of core security concepts, practices, monitoring and compliance in the full panorama of IS management.   Through the use of a risk-based approach, the CISSO is able to implement and maintain cost-effective security controls that are closely aligned with both business and industry standards.

Whether you are responsible for the management of a Cyber Security team, a Security Officer, an IT auditor or a Business Analyst, the C)ISSO certification course is an ideal way to increase your knowledge, expertise and skill.

Ultimate Certified Information Systems Security Officer Self Study Package includes (1-year access):

  1. Individual Course Access
  2. Online Course Video
  3. E-Book
  4. Exam Simulator
  5. Exam Prep
  6. Exam 

Note: Mile2’s Certified ISSO covers ISC2’s CISSP exam objectives

Mile2 is Accredited by the NSA-CNSS, Approved on Homelands Security NICCS Framework, and is on the FBI’s Tier 1-3 Certification Training Chart.

 

Outline

Module 1 – Risk Management

  1. Risk Definitions
  2. Risk Management
  3. Risk Assessment
  4. Responding to Risk

Module 2 – Security Management

  1. Understanding Security
  2. Information Security Management System
  3. Roles and Responsibility
  4. Security Frameworks
  5. Human Resources

Module 3 – Identification and Authentication

  1. Identity Management
  2. Authentication Techniques
  3. Single Sign-on
  4. Access Control Monitoring

Module 4 – Access Control

  1. Access Control Types and Characteristics
  2. Information Classification
  3. Access Control Models and Techniques
  4. Access Control Methods

Module 5 – Security Models and Evaluation Criteria

  1. Trusted Computing Base
  2. Protection Mechanisms
  3. Security Models
  4. Evaluation Criteria

Module 6 – Operations Security

  1. Administrative Management Responsibilities
  2. Product Implementation Management
  3. Redundancy and Fault Tolerance
  4. Operational Issues and Responses
  5. Threats to Operations

 Module 7 – Symmetric Cryptography and Hashing

  1. Cryptography Terms
  2. Historical Uses of Cryptography
  3. Cryptography Foundations
  4. Modern Cryptography
  5. Hashing

Module 8 – Asymmetric Cryptography and PKI

  1. Asymmetric Cryptography
  2. Hybrid Crypto and Digital Signatures
  3. Public Key Infrastructure
  4. Cryptography in Use
  5. Attacks on Cryptography

Module 9 – Network Connections

  1. Network and Communications Security
  2. Topologies
  3. Cabling
  4. LAN and WAN

Module 10 – Network Protocols and Devices

  1. OSI Model
  2. Network Devices
  3. Network Security Sentries
  4. Ports, Protocols and Services

Module 11 – Telephony, VPNs and Wireless

  1. Telephony
  2. VPNs
  3. Wireless
  4. Network Based Attacks

Module 12 – Security Architecture and Attacks

  1. Security Architecture
  2. Architectural Models
  3. System Threats

Module 13 – Software Development Security

  1. Software Security Concerns
  2. Software Lifecycle Development Processes
  3. Web Application Security
  4. PCI-DSS Compliance

Module 14 – Database Security

  1. Database Models &Terminology
  2. Database Security Issues
  3. Artificial Intelligence

Module 15 – Malware and Attacks

Module 16 – Business Continuity

  1. Project Initiation
  2. Business Impact Analysis
  3. Determining Recovery Strategies
  4. Writing the Plan
  5. Preparing for a Disaster
  6. Introduction to Business Continuity Management

Module 17 – Incident Management, Law and Ethics

  1. Incident Management
  2. Law
  3. Computer Crime
  4. Evidence Handling
  5. Privacy Legislations
  6. Ethics

Module 18 – Physical Security

  1. Facility Location and Construction
  2. Risks, Threats and Countermeasures
  3. Perimeter Protection
  4. Electrical Power Issues
  5. Fire Prevention, Detection and Suppression.

PreRequisites

  • Mile2’s C)SP

  • Mile2’s C)ISSM

  • 12 months of Information Systems  Management Experience

Audience

  • IS Security Officers
  • IS Managers
  • Risk Managers
  • Auditors
  • Information Systems Owners
  • IS Control Assessors
  • System Managers
  • Government
$995.00 List Price


MAX Educ. Savings
Category:
Loading ...