Maxtrain.com - info@maxtrain.com - 513-322-8888 - 866-595-6863
Certified Information System Security Officer On-Demand
Description
Certified Information System Security Officer On-Demand Introduction:
Welcome to the Certified Information Systems Security Officer (CISSO) On-Demand course, tailored for proactive cybersecurity professionals who hold pivotal roles within their organization’s information security division. This comprehensive course not only leads to CISSO certification but also delves into a wide spectrum of industry best practices, knowledge, and practical skills that are essential for individuals aspiring to become security leaders.
Throughout this self-paced program, you will not only grasp the theoretical foundations but also gain hands-on experience in implementing core security concepts, monitoring techniques, and compliance measures. A Certified Information Systems Security Officer plays a critical role in aligning cost-effective security controls with the unique needs of their organization and adhering to global industry standards.
By enrolling in this course, you will equip yourself with the necessary training to excel in the CISSO exam, establishing your proficiency in cybersecurity and information security management based on the most current best practices.
Prepare to thrive in information security management roles by enrolling in the Certified Information Systems Security Officer (CISSO) On-Demand course. This program will empower you with the knowledge, skills, and certification required to excel as a proficient Information Systems Security Officer and make a significant impact in the dynamic field of cybersecurity.
Course Highlights:
- Accredited by the NSA’s CNSS.
- Approved by Homeland Security NICCS Framework.
- Included on the FBI’s Tier 1-3 Certification Training Chart.
- Comprehensive coverage of cybersecurity and information security management.
- Preparation for managerial roles in the information security field.
- In-depth exploration of risk management, security practices, and compliance.
- Examination of identification, authentication, and access control.
- Focus on security models, cryptography, and network security.
- Knowledge of software development security, database security, and malware.
- Training on incident management, law, ethics, and physical security.
- The Self-Study Package includes 1-year access to various study materials, including videos, an e-book, an exam simulator, exam prep, and the exam itself.
Prerequisites
- Mile2’s C)SP
- Mile2’s C)ISSM
- 12 months of Information Systems Management Experience
Audience
- IS Security Officers
- IS Managers
- Risk Managers
- Auditors
- Information Systems Owners
- IS Control Assessors
- System Managers
- Government
Certified Information System Security Officer On-Demand Outline:
Risk Management
- Risk Definitions
- Risk Management
- Risk Assessment
- Responding to Risk
Security Management
- Understanding Security
- Information Security Management System
- Roles and Responsibility
- Security Frameworks
- Human Resources
Identification and Authentication
- Identity Management
- Authentication Techniques
- Single Sign-on
- Access Control Monitoring
Access Control
- Access Control Types and Characteristics
- Information Classification
- Access Control Models and Techniques
- Access Control Methods
Security Models and Evaluation Criteria
- Trusted Computing Base
- Protection Mechanisms
- Security Models
- Evaluation Criteria
Operations Security
- Administrative Management Responsibilities
- Product Implementation Management
- Redundancy and Fault Tolerance
- Operational Issues and Responses
- Threats to Operations
Symmetric Cryptography and Hashing
- Cryptography Terms
- Historical Uses of Cryptography
- Cryptography Foundations
- Modern Cryptography
- Hashing
Asymmetric Cryptography and PKI
- Asymmetric Cryptography
- Hybrid Crypto and Digital Signatures
- Public Key Infrastructure
- Cryptography in Use
- Attacks on Cryptography
Network Connections
- Network and Communications Security
- Topologies
- Cabling
- LAN and WAN
Network Protocols and Devices
- OSI Model
- Network Devices
- Network Security Sentries
- Ports, Protocols and Services
Telephony, VPNs and Wireless
- Telephony
- VPNs
- Wireless
- Network Based Attacks
Security Architecture and Attacks
- Security Architecture
- Architectural Models
- System Threats
Software Development Security
- Software Security Concerns
- Software Lifecycle Development Processes
- Web Application Security
- PCI-DSS Compliance
Database Security
- Database Models & Terminology
- Database Security Issues
- Artificial Intelligence
Malware and Attacks
Business Continuity
- Project Initiation
- Business Impact Analysis
- Determining Recovery Strategies
- Writing the Plan
- Preparing for a Disaster
- Introduction to Business Continuity Management
Incident Management, Law and Ethics
- Incident Management
- Law
- Computer Crime
- Evidence Handling
- Privacy Legislations
- Ethics
Physical Security
- Facility Location and Construction
- Risks, Threats and Countermeasures
- Perimeter Protection
- Electrical Power Issues
- Fire Prevention, Detection and Suppression.
Note: Mile2’s Certified ISSO covers ISC2’s CISSP exam objectives
Mile2 is Accredited by the NSA-CNSS, Approved on Homelands Security NICCS Framework, and is on the FBI’s Tier 1-3 Certification Training Chart.
$1095.00
|
|