Leader dans le secteur des formations en cybersécurité.

C)ISSO: Certified Information System Security Officer

Target group

  • IS Security Officers
  • IS Managers
  • Risk Managers
  • Auditors 
  • Info Systems Owners
  • IS Control Assessors
  • System Managers
  • Government Employees

Description

If you are look for the « gotta have it » cybersecurity course, then the Certified Information Systems Security Officer is for you. The C)ISSO will prepare you with a broad range of knowledge and skills required of a security officer. However, these skills can be applied across a broad range of role-based careers. A C)ISSO is able to implement and maintain cost-effective security controls that are closely aligned with business and industry standards. The C)ISSO certification course is an ideal way to increase knowledge, expertise, and skill for managers, auditors, and INFOSEC professionals. At Mile2 we consider the C)ISSO to be one of our flagship courses. The things you learn in this course can be applied to management, prevention teams, and recovery professionals.

Program

  • Risk Definitions
  • Risk Management
  • Risk Assessment
  • Responding to Risk II
  • Understanding Security
  • Information Security Management System
  • Roles and Responsibility
  • Security Frameworks
  • Human Resources III
  • Identity Management
  • Authentication Techniques
  • Single Sign-on
  • Access Control Monitoring IV
  • Access Control Types and Characteristics
  • Information Classification
  • Access Control Models and Techniques
  • Access Control Methods V
  • Trusted Computing Base
  • Protection Mechanisms
  • Security Models
  • Evaluation Criteria VI
  • Administrative Management Responsibilities
  • Product Implementation Management
  • Redundancy and Fault Tolerance
  • Operational Issues and Responses
  • Threats to Operations VII
  • Cryptography Terms
  • Historical Uses of Cryptography
  • Cryptography Foundations
  • Modern Cryptography
  • Hashing VIII
  • Asymmetric Cryptography
  • Hybrid Crypto and Digital Signatures
  • Public Key Infrastructure
  • Cryptography in Use
  • Attacks on Cryptography IX
  • Network and Communications Security
  • Topologies
  • Cabling
  • LAN and WAN X
  • OSI Model
  • Network Devices
  • Network Security Sentries
  • Ports, Protocols and Services XI
  • Telephony
  • VPNs
  • Wireless
  • Network Based Attacks XII
  • Security Architecture
  • Architectural Models
  • System Threats XIII
  • Software Security Concerns
  • Software Lifecycle Development Processes
  • Web Application Security
  • PCI-DSS Compliance XIV
  • Database Models &Terminology
  • Database Security Issues
  • Artificial Intelligence XV.
  • Project Initiation
  • Business Impact Analysis
  • Determining Recovery Strategies
  • Writing the Plan
  • Preparing for a Disaster
  • Introduction to Business Continuity Management XVII
  • Incident Management
  • Law
  • Computer Crime
  • Evidence Handling
  • Privacy Legislations
  • Ethics XVIII.
  • Facility Location and Construction
  • Risks, Threats and Countermeasures
  • Perimeter Protection
  • Electrical Power Issues
  • Fire Prevention, Detection and Suppression.

Goal

Upon completion, Certified Information Systems Security Officer students be able to establish industry acceptable Cyber Security and Information Systems management standards with current best practices.

Prerequisites

  • Mile2’s C)SP 
  • Mile2’s C)ISSM 
  • 12 months of Information Systems Management Experience

Tarif

2999 €

Demande d'information

Je souhaute obtenir plus d'informations sur vos formations

ACG Cyberacademy collecte et utilise les données fournies via ce formulaire afin de traiter vos demandes d'inscription. Les champs marqués d’un * sont indispensables. Les autres informations nous permettent d’optimiser le suivi de votre demande ainsi que la qualité de notre relation client.