Skip to content

The CISSO addresses the broad range of industry best practices, knowledge and skills expected of a security manager/officer. The candidate will learn in-depth theory pertaining to the practical implementation of core security concepts, practices, monitoring and compliance in the full panorama of IS management. Through the use of a risk-based approach, the CISSO is able to implement and maintain cost-effective security controls that are closely aligned with both business and industry standards. Whether you?re responsible for the management of a Cyber Security team, a Security Officer, an IT auditor or a Business Analyst, the C)ISSO certification course is an ideal way to increase your knowledge, expertise, and skill.

Select a date below

Categories:
Topics:

Dates are listed in Pacific Time Zone

= Guaranteed to run date

Description

Print Friendly, PDF & Email

Overview:

The CISSO addresses the broad range of industry best practices, knowledge and skills expected of a security manager/officer. The candidate will learn in-depth theory pertaining to the practical implementation of core security concepts, practices, monitoring and compliance in the full panorama of IS management. Through the use of a risk-based approach, the CISSO is able to implement and maintain cost-effective security controls that are closely aligned with both business and industry standards. Whether you’re responsible for the management of a Cyber Security team, a Security Officer, an IT auditor or a Business Analyst, the C)ISSO certification course is an ideal way to increase your knowledge, expertise, and skill.

Prerequisite(s):

1 year experience in at least 2 modules or 1 year in IS management

Audience:

IS Security Officers, IS Managers, Risk Managers, Auditors, Information Systems Owners, IS Control Assessors, System Managers, Government

Outline:

Lesson 1: Risk Management

Lesson 2: Security Management

Lesson 3: Identification and Authentication

Lesson 4: Access Control

Lesson 5: Security Models and Evaluation Criteria

Lesson 6: Operations Security

Lesson 7: Vulnerability Assessments

Lesson 8: Symmetric Cryptography and Hashing

Lesson 9: Network Connections

Lesson 10: Network Protocols and Devices

Lesson 11: Telephony, VPNs, and Wireless

Lesson 12: Security Architecture and Attacks

Lesson 13: Software Development Security

Lesson 14: Database Security and System Development

Lesson 15: Malware and Software Attacks

Lesson 16: Business Continuity

Lesson 17: Disaster Recovery

Lesson 18: Incident Management, Law, and Ethics

Lesson 19: Physical Security

Additional information

Length

5 days

Guaranteed to run

No