Leader dans le secteur des formations en cybersécurité.

C)SLO: Certified Security Leadership Officer

Target group

  • C – Level Managers
  • IT Managers
  • Cyber Security Personelle
  • Engineers
  • Information Systems Owners 
  • ISSO’s
  • CISSP Students
  • ISO’s

Description

Mile2’s Certified Security Leadership Officer course is designed for mid and upper-level managers. If you are an engineer, this course will increase your knowledge in the leading information system security teams. Plus, the C)SLO will give you an essential understanding of current security issues, best practices, and technology. With this knowledge you will then be prepared to manage the security component of an information technology project. As a Security Leadership Officer, you will be the bridge between cybersecurity and business operations. * This course/certification has been validated by the NSA for: CNSSl-4014, Information Assurance Training Standard for Information Systems Security Officers.

Program

  • The Role of the CSLO
  • Business Goals and Objectives
  • Overview of Governance
    • The First Priority for the CSLO
    • bOutcomes of Governance
    • Performance and Governance
  • Organization of IT Security
  • Security Strategy
  • The Goal of Information Security
  • Defining Security Objectives
  • Security Budget
  • Security Integration
  • Architecture
  • Information Security Frameworks
  • Integration
  • COBIT 4.1
  • Deming and Quality
  • Ethics
  • Fraud
  • Hiring and Employment
  • Intellectual Property
  • Protecting IP
  • Attacks on IP
  • OECD Privacy Principles
  • PII and PHI
  • Awareness Training
  • Risk Management
  • Risk Assessment
  • Quantitative vs Qualitative Risk
  • What Is the Value of an Asset?
  • What Is a Threat/Vulnerability
  • Assess and Evaluate Risk
  • Controls
  • Comparing Cost and Benefit
  • Cost of a Countermeasure
  • Appropriate Controls
  • Documentation
  • Encryption
  • Secrecy of the Key
  • Cryptographic Functions
  • XOR Function
  • Symmetric Encryption
  • Asymmetric Algorithms
  • Hashing Algorithms
  • Digital Signatures
  • Digital Envelope
  • Public Key Infrastructure (PKI)
  • Certificates
  • Uses of Encryption in Communications
  • Auditing Encryption Implementations
  • Steganography
  • Cryptographic Attacks
  • Information Asset Classification
    • Criticality
    • Sensitivity
    • Regulations and Legislation
  • Asset Valuation
  • Information Protection
  • Storing, Retrieving, Transporting and Disposing of Confidential Information
  • Password Policy
  • Password Cracking
  • Biometrics
  • Authorization
  • Accounting/Auditability
  • Centralized Administration
  • Access Control
  • Goals of Incident Management and Response
  • Security Incident Handling and Response
  • Evidence Handling
  • What is an Incident – Intentional
  • What is an Incident – Unintentional
  • Malware
  • Attack Vectors
  • Information Warfare
  • Developing Response and Recovery Plans
  • Incident Response Functions
  • Incident Management Technologies
  • Responsibilities of the CSLO
  • Crisis Communications
  • Challenges in Developing an Incident Management Plan
    • When an Incident Occurs
    • During an Incident
    • Containment Strategies
    • The Battle Box e. Evidence Identification and Preservation
    • Post Event Reviews
    • Disaster Recovery Planning (DRP) and Business Recovery Processes
    • Development of BCP and DRP
    • Disaster Recovery Sites
    • Recovery of Communications
    • Plan Maintenance Activities
    • Techniques for Testing Security
    • Vulnerability Assessments
    • Penetration Testing
  • Operations Security
  • Specific Operations Tasks
  • Data Leakage – Object Reuse
  • Records Management
  • Change Control
  • Trusted Recovery
  • Redundant Array of Independent Disks (RAID)
  • Phases of Plan
  • BCP Risk Analysis
  • Recovery Point Objective
  • Priorities
  • OWASP Top Ten (2013)
  • Common Gateway Interface
  • How CGI Scripts Work
  • Cookies
  • Virtualization – Type 1
  • Virtualization – Type 2
  • Technologies – Databases and DBMS
  • Facilities
  • Facilities Security
  • Environmental Security
  • Physical Access Issues and Exposures
  • Controls for Environmental Exposures
  • Network Topologies– Physical Layer
  • Data Encapsulation
  • Protocols at Each Layer
  • Devices Work at Different Layers
  • Technology-based Security
  • Network Security Architecture
  • Firewalls
  • Unified Threat Management (UTM)
  • UTM Product Criteria
  • TCP/IP Suite
  • Port and Protocol Relationship
  • Network Security
  • Internet Threats and Security
  • Auditing Network Infrastructure Security
  • IPSec – Network Layer Protection
  • Wireless Technologies– Access Point

Goal

Upon completion, the Certified Security Leadership Officer candidate be able to competently take the C)SLO exam. You will be versed in implementing strong security controls and managing an organization with an industry acceptable security posture.

Prerequisites

  • 12 months professional experience in IT or 
  • 12 months professional experience in systems management

Tarif

3499 €

Demande d'information

Je souhaute obtenir plus d'informations sur vos formations

ACG Cyberacademy collecte et utilise les données fournies via ce formulaire afin de traiter vos demandes d'inscription. Les champs marqués d’un * sont indispensables. Les autres informations nous permettent d’optimiser le suivi de votre demande ainsi que la qualité de notre relation client.