CISSO – Certified Information Systems Security Officer
= Guaranteed to run date
Dates are listed in Pacific Time Zone
Dates
Locations
Aug 07 6:00 AM - Aug 11 2:00 PM
Remote Live
Oct 02 6:00 AM - Oct 06 2:00 PM
Remote Live
$3,000.00
The CISSO addresses the broad range of industry best practices, knowledge and skills expected of a security manager/officer. The candidate will learn in-depth theory pertaining to the practical implementation of core security concepts, practices, monitoring and compliance in the full panorama of IS management. Through the use of a risk-based approach, the CISSO is able to implement and maintain cost-effective security controls that are closely aligned with both business and industry standards. Whether you?re responsible for the management of a Cyber Security team, a Security Officer, an IT auditor or a Business Analyst, the C)ISSO certification course is an ideal way to increase your knowledge, expertise, and skill.
The CISSO addresses the broad range of industry best practices, knowledge and skills expected of a security manager/officer. The candidate will learn in-depth theory pertaining to the practical implementation of core security concepts, practices, monitoring and compliance in the full panorama of IS management. Through the use of a risk-based approach, the CISSO is able to implement and maintain cost-effective security controls that are closely aligned with both business and industry standards. Whether you’re responsible for the management of a Cyber Security team, a Security Officer, an IT auditor or a Business Analyst, the C)ISSO certification course is an ideal way to increase your knowledge, expertise, and skill.
Prerequisite(s):
1 year experience in at least 2 modules or 1 year in IS management
Audience:
IS Security Officers, IS Managers, Risk Managers, Auditors, Information Systems Owners, IS Control Assessors, System Managers, Government
Outline:
Lesson 1: Risk Management
Lesson 2: Security Management
Lesson 3: Identification and Authentication
Lesson 4: Access Control
Lesson 5: Security Models and Evaluation Criteria
Lesson 6: Operations Security
Lesson 7: Vulnerability Assessments
Lesson 8: Symmetric Cryptography and Hashing
Lesson 9: Network Connections
Lesson 10: Network Protocols and Devices
Lesson 11: Telephony, VPNs, and Wireless
Lesson 12: Security Architecture and Attacks
Lesson 13: Software Development Security
Lesson 14: Database Security and System Development
CISSO – Certified Information Systems Security Officer
Dates are listed in Pacific Time Zone
$3,000.00
The CISSO addresses the broad range of industry best practices, knowledge and skills expected of a security manager/officer. The candidate will learn in-depth theory pertaining to the practical implementation of core security concepts, practices, monitoring and compliance in the full panorama of IS management. Through the use of a risk-based approach, the CISSO is able to implement and maintain cost-effective security controls that are closely aligned with both business and industry standards. Whether you?re responsible for the management of a Cyber Security team, a Security Officer, an IT auditor or a Business Analyst, the C)ISSO certification course is an ideal way to increase your knowledge, expertise, and skill.
Description
Overview:
The CISSO addresses the broad range of industry best practices, knowledge and skills expected of a security manager/officer. The candidate will learn in-depth theory pertaining to the practical implementation of core security concepts, practices, monitoring and compliance in the full panorama of IS management. Through the use of a risk-based approach, the CISSO is able to implement and maintain cost-effective security controls that are closely aligned with both business and industry standards. Whether you’re responsible for the management of a Cyber Security team, a Security Officer, an IT auditor or a Business Analyst, the C)ISSO certification course is an ideal way to increase your knowledge, expertise, and skill.
Prerequisite(s):
1 year experience in at least 2 modules or 1 year in IS management
Audience:
IS Security Officers, IS Managers, Risk Managers, Auditors, Information Systems Owners, IS Control Assessors, System Managers, Government
Outline:
Lesson 1: Risk Management
Lesson 2: Security Management
Lesson 3: Identification and Authentication
Lesson 4: Access Control
Lesson 5: Security Models and Evaluation Criteria
Lesson 6: Operations Security
Lesson 7: Vulnerability Assessments
Lesson 8: Symmetric Cryptography and Hashing
Lesson 9: Network Connections
Lesson 10: Network Protocols and Devices
Lesson 11: Telephony, VPNs, and Wireless
Lesson 12: Security Architecture and Attacks
Lesson 13: Software Development Security
Lesson 14: Database Security and System Development
Lesson 15: Malware and Software Attacks
Lesson 16: Business Continuity
Lesson 17: Disaster Recovery
Lesson 18: Incident Management, Law, and Ethics
Lesson 19: Physical Security
Additional information
5 days
No
Related products
Cisco – SWSA – Securing the Web with Cisco Web Security Appliance
$2,195.00 Add to cartSC-400 Microsoft Information Protection Administrator
$1,785.00 Add to cartCisco – SCOR – Implementing and Operating Cisco Security Core Technologies
$4,295.00 Add to cart