C)ISSO Certified Information Systems Security Officer

The Certified Information Systems Security Officer course is designed for forward-thinking security professionals that want the advanced skillset necessary to manage and consult businesses on information security

Description

The C)ISSO addresses the broad range of industry best practices, knowledge and skills expected of a security leader. The Candidate will learn both the theory and the requirements for practical implementation of core security concepts, practices, monitoring and compliance. Through the use of a risk-based approach, a C)ISSO is able to implement and maintain cost-effective security controls that are aligned with business requirements.
Whether you are a responsible for the management of an Cyber Security team, a Security Officer, an IT auditor or a Business Analyst, the C)ISSO course is the ideal way to increase your knowledge, expertise, skill, and credibility.


The C)ISSO program standards are closely aligned with those of the ISO27001, NIST, CISM® and the CISSP® CBK® exam objectives. The C)ISSO excels by providing a well-rounded, comprehensive overview of essential security topics.

UPON COMPLETION
Students will:
 Have knowledge to detect security threats and risk
 Have knowledge to accurately report on their findings from examinations
 Have knowledge to design a security solution to mitigate risk and threats
 Be ready to sit for the C)ISSO Exam

COURSE CONTENT

  • Module 1: Risk Management Module 11: Telephony, VPNs and Wireless
  • Module 2: Security Management Module 12: Security Architecture and Attacks
  • Module 3: Identification and Authentication Module 13: Software Development Security
  • Module 4: Access Control Module 14: Database Security and Development
  • Module 5: Security Models and Evaluation Criteria Module 15: Malware and Software Attacks
  • Module 6: Operations Security Module 16: Business Continuity
  • Module 7: Symmetric Cryptography and Hashing Module 17: Disaster Recovery
  • Module 8: Asymmetric Cryptography and PKI Module 18: Incident Management, Law, and Ethics
  • Module 9: Network Connections Module 19: Physical Security
  • Module 10: Network Protocols and Devices

EXAM INFORMATION
The Certified Information Systems Security Officer exam is taken online through Mile2’s Assessment and Certification System (MACS), which is accessible on your mile2.com account. The exam will take 2 hours and consist of 100 multiple choice questions. The cost of $300 USD is INCLUDED in your course fee.

Prerequisites

A general knowledge of information systems and security

Target audience

Who Should Attend:
IT Auditors, System Administrators, IS Managers, Security Consultants

Similar courses

With your completion of the prerequisites and necessary years of experience, you are firmly grounded in the knowledge requirements of today’s security professional. This course will expand upon your knowledge by addressing the essential elements of the 10 domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process, while providing the basic skills required to prepare for CISSP certification.

More Information

CompTIA Security+ is the certification globally trusted to validate foundational, vendor-neutral IT security knowledge and skills. As a benchmark for best practices in IT security, this certification covers the essential principles for network security and risk management - making it an important stepping stone of an IT security career.

More Information

The Certified Professional Ethical Hacker course is the introductory training to mile2's line of penetration testing courses and certifications.

More Information

When a business is hit by a natural disaster, cyber crime or any other disruptive tragedy, how should the organization react? What if the network infrastructure is taken down? Will the business be able to continue operations? How much will it cost if the business is down during repairs? The answer is found in the vendor neutral Certified Disaster Recovery Engineer certification course.

More Information

The Certified Information Systems Security Manager certification course is designed to teach towards and certify a information systems professional high standard of excellence in following areas:

More Information

The Certified Penetration Testing Engineer course trains students on the 5 key elements of penetration testing: information gathering, scanning, enumeration, exploitation and reporting.

More Information

The mile2 Certified Security Sentinel training is intended for anyone that uses a computer on the internet. Attendees will understand the security threats as well as the countermeasures associated with these attacks.

More Information

The Certified Vulnerability Assessor course trains students to be proficient in conducting vulnerability assessments The vendor-neutral Certified Vulnerability Assessor certification course helps students understand the importance of vulnerability assessments by providing intricate knowledge and skills in the Vulnerability Assessment arena.

More Information

Get Certified at your own pace with these Mile 2 Cyber Security Ultimate Self-Study and Certification Bundles.Everything you need to pass 1 mile2 certification on your own time and at your own pace!

More Information

The Mile2® vendor-neutral Certified Security Awareness 1 certification course is intended for anyone that uses a computer on the internet. Attendees will understand the security threats as well as the countermeasures associated with these attacks.

More Information

The mile2 vendor neutral Certified Security Awareness 1 certification course is intended for anyone that uses a computer on the internet. Attendees will understand the security threats as well as the countermeasures associated with these attacks.

More Information

In this course, students will evaluate organizational policies, procedures, and processes to ensure that an organizations information systems align with its overall business goals and objectives.

More Information