C)ISSO: Certified Information System Security Officer
The CISSO addresses the broad range of industry best practices, knowledge and skills expected of a security manager/officer. You will learn in-depth theory pertaining to the practical implementation of core security concepts, practices, monitoring and compliance of IS management. Whether you’re responsible for the management of a Cybersecurity team, a Security Officer, an IT auditor or a Business Analyst, the C)ISSO certification course is an ideal way to increase your knowledge, expertise and skill.
Description
Overview
If you are looking for the "gotta have it" cybersecurity course, the Certified Information Systems Security Officer is for you. The C)ISSO will prepare you with a broad range of knowledge and skills required of a security officer. However, these skills can be applied across a broad range of role-based careers such as: management, prevention teams, and recovery professionals.
A C)ISSO is able to implement and maintain cost-effective security controls that are closely aligned with business and industry standards. The C)ISSO certification course is an ideal way to increase knowledge, expertise, and skill for managers, auditors, and INFOSEC professionals.
Course Objectives
Upon completion, Certified Information Systems Security Officer students be able to establish industry acceptable Cybersecurity and Information Systems management standards with current best practices.
Who Should Attend
- IS Security Officers
- IS Managers
- Risk Managers
- Auditors
- Info Systems Owners
- IS Control Assessors
- System Managers
- Government Employees
Course Outline
Module 1: Risk Management
- Risk Definitions
- Risk Management
- Risk Assessment
- Responding to Risk
Module 2: Security Management
- Understanding Security
- Information Security Management System
- Roles and Responsibility
- Security Frameworks
- Human Resources
Module 3: Identification and Authentication
- Identity Management
- Authentication Techniques
- Single Sign-on
- Access Control Monitoring
Module 4: Access Control
- Access Control Types and Characteristics
- Information Classification
- Access Control Models and Techniques
- Access Control Methods
Module 5: Security Models and Evaluation Criteria
- Trusted Computing Base
- Protection Mechanisms
- Security Models
- Evaluation Criteria
Module 6: Operations Security
- Administrative Management Responsibilities
- Product Implementation Management
- Redundancy and Fault Tolerance
- Operational Issues and Responses
- Threats to Operations
Module 7: Symmetric Cryptography and Hashing
- Cryptography Terms
- Historical Uses of Cryptography
- Cryptography Foundations
- Modern Cryptography
- Hashing
Module 8: Asymmetric Cryptography and PKI
- Asymmetric Cryptography
- Hybrid Crypto and Digital Signatures
- Public Key Infrastructure
- Cryptography in Use
- Attacks on Cryptography
Module 9: Network Connections
- Network and Communications Security
- Topologies
- Cabling
- LAN and WAN
Module 10: Network Protocols and Devices
- OSI Model
- Network Devices
- Network Security Sentries
- Ports, Protocols and Services
Module 11: Telephony, VPNs and Wireless
- Telephony
- VPNs
- Wireless
- Network Based Attacks
Module 12: Security Architecture and Attacks
- Security Architecture
- Architectural Models
- System Threats
Module 13: Software Development Security
- Software Security Concerns
- Software Lifecycle Development Processes
- Web Application Security
- PCI-DSS Compliance
Module 14: Database Security
- Database Models &Terminology
- Database Security Issues
- Artificial Intelligence
Module 15: Malware and Attacks
Module 16: Business Continuity
- Project Initiation
- Business Impact Analysis
- Determining Recovery Strategies
- Writing the Plan
- Preparing for a Disaster
- Introduction to Business Continuity Management
Module 17: Incident Management, Law and Ethics
- Incident Management
- Law
- Computer Crime
- Evidence Handling
- Privacy Legislations
- Ethics
Module 18: Physical Security
- Facility Location and Construction
- Risks, Threats and Countermeasures
- Perimeter Protection
- Electrical Power Issues
- Fire Prevention, Detection and Suppression
Prerequisites
- 12 months of Information Systems Management Experience
- C)SP: Certified Security Principles
- C)CSSM: Certified Cybersecurity Systems Manager