CISSO – Certified Information Systems Security Officer
= Guaranteed to run date
Dates are listed in Pacific Time Zone
Dates
Locations
Jan 29 6:00 AM - Feb 02 2:00 PM
Bellevue WA + Remote
$3,000.00
The CISSO addresses the broad range of industry best practices, knowledge and skills expected of a security manager/officer. The candidate will learn in-depth theory pertaining to the practical implementation of core security concepts, practices, monitoring and compliance in the full panorama of IS management. Through the use of a risk-based approach, the CISSO is able to implement and maintain cost-effective security controls that are closely aligned with both business and industry standards. Whether you?re responsible for the management of a Cyber Security team, a Security Officer, an IT auditor or a Business Analyst, the C)ISSO certification course is an ideal way to increase your knowledge, expertise, and skill.
The CISSO addresses the broad range of industry best practices, knowledge and skills expected of a security manager/officer. The candidate will learn in-depth theory pertaining to the practical implementation of core security concepts, practices, monitoring and compliance in the full panorama of IS management. Through the use of a risk-based approach, the CISSO is able to implement and maintain cost-effective security controls that are closely aligned with both business and industry standards. Whether you’re responsible for the management of a Cyber Security team, a Security Officer, an IT auditor or a Business Analyst, the C)ISSO certification course is an ideal way to increase your knowledge, expertise, and skill.
Prerequisite(s):
1 year experience in at least 2 modules or 1 year in IS management
Audience:
IS Security Officers, IS Managers, Risk Managers, Auditors, Information Systems Owners, IS Control Assessors, System Managers, Government
Outline:
Lesson 1: Risk Management
Lesson 2: Security Management
Lesson 3: Identification and Authentication
Lesson 4: Access Control
Lesson 5: Security Models and Evaluation Criteria
Lesson 6: Operations Security
Lesson 7: Vulnerability Assessments
Lesson 8: Symmetric Cryptography and Hashing
Lesson 9: Network Connections
Lesson 10: Network Protocols and Devices
Lesson 11: Telephony, VPNs, and Wireless
Lesson 12: Security Architecture and Attacks
Lesson 13: Software Development Security
Lesson 14: Database Security and System Development
CISSO – Certified Information Systems Security Officer
Dates are listed in Pacific Time Zone
$3,000.00
The CISSO addresses the broad range of industry best practices, knowledge and skills expected of a security manager/officer. The candidate will learn in-depth theory pertaining to the practical implementation of core security concepts, practices, monitoring and compliance in the full panorama of IS management. Through the use of a risk-based approach, the CISSO is able to implement and maintain cost-effective security controls that are closely aligned with both business and industry standards. Whether you?re responsible for the management of a Cyber Security team, a Security Officer, an IT auditor or a Business Analyst, the C)ISSO certification course is an ideal way to increase your knowledge, expertise, and skill.
Description
Overview:
The CISSO addresses the broad range of industry best practices, knowledge and skills expected of a security manager/officer. The candidate will learn in-depth theory pertaining to the practical implementation of core security concepts, practices, monitoring and compliance in the full panorama of IS management. Through the use of a risk-based approach, the CISSO is able to implement and maintain cost-effective security controls that are closely aligned with both business and industry standards. Whether you’re responsible for the management of a Cyber Security team, a Security Officer, an IT auditor or a Business Analyst, the C)ISSO certification course is an ideal way to increase your knowledge, expertise, and skill.
Prerequisite(s):
1 year experience in at least 2 modules or 1 year in IS management
Audience:
IS Security Officers, IS Managers, Risk Managers, Auditors, Information Systems Owners, IS Control Assessors, System Managers, Government
Outline:
Lesson 1: Risk Management
Lesson 2: Security Management
Lesson 3: Identification and Authentication
Lesson 4: Access Control
Lesson 5: Security Models and Evaluation Criteria
Lesson 6: Operations Security
Lesson 7: Vulnerability Assessments
Lesson 8: Symmetric Cryptography and Hashing
Lesson 9: Network Connections
Lesson 10: Network Protocols and Devices
Lesson 11: Telephony, VPNs, and Wireless
Lesson 12: Security Architecture and Attacks
Lesson 13: Software Development Security
Lesson 14: Database Security and System Development
Lesson 15: Malware and Software Attacks
Lesson 16: Business Continuity
Lesson 17: Disaster Recovery
Lesson 18: Incident Management, Law, and Ethics
Lesson 19: Physical Security
Additional information
5 days
No
Related products
SC-400 Microsoft Information Protection Administrator
$2,380.00 Add to cartCisco – SASAA – Implementing Advanced Cisco ASA Security
$3,895.00 Add to cartCisco – SWSA – Securing the Web with Cisco Web Security Appliance
$2,195.00 Add to cart