Maxtrain.com - info@maxtrain.com - 513-322-8888 - 866-595-6863
Certified Information System Security Officer
Description
Certified Information System Security Officer Course Overview:
Welcome to the Certified Information Systems Security Officer (C)ISSO course, designed for professionals seeking comprehensive cybersecurity training that opens doors to multiple managerial roles within the INFOSEC community. This course covers a wide range of topics, providing you with in-depth knowledge of security concepts, practices, monitoring, and compliance in Information Systems (IS) management.
An Information Systems Security Officer plays a critical role in implementing and maintaining cost-effective security controls aligned with industry standards. The C)ISSO certification course is the ideal way to expand your knowledge, expertise, and skills, making it a valuable investment for managers, auditors, and INFOSEC professionals. Considered one of our flagship courses, the knowledge you gain here can be applied to management, prevention teams, and recovery professionals.
Certified Information System Security Officer Course Objectives:
In the C)ISSO course, you will:
- Gain expertise in risk management.
- Develop skills in security management.
- Understand identification and authentication principles.
- Learn about access control mechanisms.
- Explore security models and evaluation criteria.
- Master operations security concepts.
- Conduct vulnerability assessments.
- Understand symmetric cryptography and hashing.
- Explore network connections and protocols.
- Gain knowledge of telephony, VPNs, and wireless security.
- Learn about security architecture and attacks.
- Understand software development security.
- Explore database security.
- Learn about malware and software attacks.
- Understand business continuity and disaster recovery planning.
- Explore incident management, law, and ethics.
- Master physical security principles.
Certified Information System Security Officer Course Highlights:
- Accredited by the NSA’s CNSS.
- Approved by Homeland Security NICCS Framework.
- Included on the FBI’s Tier 1-3 Certification Training Chart.
- Comprehensive coverage of IS management and cybersecurity.
- Preparation for managerial roles in the INFOSEC community.
- In-depth exploration of risk management, security practices, and compliance.
- Examination of identification and authentication principles.
- Detailed study of access control mechanisms.
- Overview of security models and evaluation criteria.
- Focus on operations security, vulnerability assessments, and cryptography.
- In-depth exploration of network security, protocols, and wireless technologies.
- Knowledge of security architecture, software development, and database security.
- Understanding of malware, software attacks, and incident management.
- Training on business continuity and disaster recovery planning.
- Emphasis on legal and ethical aspects of information security.
- The Self-Study Package includes 1-year access to various study materials, including videos, an e-book, an exam simulator, exam prep, and the exam itself.
Certified Information System Security Officer Course Outline:
- Module 1 – Risk Management
- Module 2 – Security Management
- Module 3 – Identification and Authentication
- Module 4 – Access Control
- Module 5 – Security Models and Evaluation Criteria
- Module 6 – Operations Security
- Module 7 – Vulnerability Assessments
- Module 8 – Symmetric Cryptography and Hashing
- Module 9 – Network Connections
- Module 10 – Network Protocols and Devices
- Module 11 – Telephony, VPNs, and Wireless
- Module 12 – Security Architecture and Attacks
- Module 13 – Software Development Security
- Module 14 – Database Security
- Module 15 – Malware and Software Attacks
- Module 16 – Business Continuity
- Module 17 – Disaster Recovery
- Module 18 – Incident Management, Law, and Ethics
- Module 19 – Physical Security
Prepare to excel in managerial roles within the INFOSEC community by enrolling in the Certified Information Systems Security Officer (C)ISSO course. Gain the knowledge, skills, and certification needed to become a proficient Information Systems Security Officer and make a significant impact in the field of cybersecurity.
Mile2 is Accredited by the NSA-CNSS, Approved on Homelands Security NICCS Framework, and is on the FBI’s Tier 1-3 Certification Training Chart.
Outline
Module 1 – Risk Management
Module 2 – Security Management
Module 3 – Identification and Authentication
Module 4 – Access Control
Module 5 – Security Models and Evaluation Criteria
Module 6 – Operations Security
Module 7 – Vulnerability Assessments
Module 8 – Symmetric Cryptography and Hashing
Module 9 – Network Connections
Module 10 – Network Protocols and Devices
Module 11 – Telephony, VPNs, and Wireless
Module 12 – Security Architecture and Attacks
Module 13 – Software Development Security
Module 14 – Database Security
Module 15 – Malware and Software Attacks
Module 16 – Business Continuity
Module 17 – Disaster Recovery
Module 18 – Incident Management, Law, and Ethics
Module 19 – Physical Security
PreRequisites
- 1 Year experience in at least 2 modules or
- 1 year in IS Management
Audience
- IS Security Officers
- IS Managers
- Risk Managers
- Auditors
- Information Systems Owners
- IS Control Assessors
- System Managers
- Government
$3500.00
|
5 Days Course |