{"id":11283,"date":"2024-07-08T15:39:58","date_gmt":"2024-07-08T13:39:58","guid":{"rendered":"https:\/\/cyberacademy.altaydagistan.com\/?post_type=mec-events&#038;p=11283"},"modified":"2025-11-18T16:15:43","modified_gmt":"2025-11-18T15:15:43","slug":"cisso-certified-information-system-security-officer","status":"publish","type":"mec-events","link":"https:\/\/acgcyberacademy.fr\/en\/events\/cisso-certified-information-system-security-officer\/","title":{"rendered":"C)ISSO: Certified Information System Security Officer"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"11283\" class=\"elementor elementor-11283\" data-elementor-post-type=\"mec-events\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6c0c232 e-flex e-con-boxed e-con e-child\" data-id=\"6c0c232\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-42f62ef3 e-flex e-con-boxed e-con e-child\" data-id=\"42f62ef3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1b4fad91 elementor-widget elementor-widget-image\" data-id=\"1b4fad91\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"359\" height=\"169\" src=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/07\/Mile2-logo.jpg\" class=\"attachment-large size-large wp-image-11194\" alt=\"MILE2 ACG CyberAcademy Formation\" srcset=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/07\/Mile2-logo.jpg 359w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/07\/Mile2-logo-300x141.jpg 300w\" sizes=\"(max-width: 359px) 100vw, 359px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5b0eb856 e-flex e-con-boxed e-con e-child\" data-id=\"5b0eb856\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4ad7b056 elementor-widget elementor-widget-heading\" data-id=\"4ad7b056\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Target group<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-25da03fa elementor-widget elementor-widget-text-editor\" data-id=\"25da03fa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>IS Security Officers<\/li><li>IS Managers<\/li><li>Risk Managers<\/li><li>Auditors\u00a0<\/li><li>Info Systems Owners<\/li><li>IS Control Assessors<\/li><li>System Managers<\/li><li>Government Employees<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5d6e3ac1 e-flex e-con-boxed e-con e-child\" data-id=\"5d6e3ac1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4d4b68c9 elementor-widget elementor-widget-heading\" data-id=\"4d4b68c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Description <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-57a3c7d5 elementor-widget elementor-widget-text-editor\" data-id=\"57a3c7d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>If you are look for the \"gotta have it\" cybersecurity course, then the<b> Certified Information Systems Security Officer<\/b> is for you. The C)ISSO will prepare you with a broad range of knowledge and skills required of a security officer. However, these skills can be applied across a broad range of role-based careers. A C)ISSO is able to implement and maintain cost-effective security controls that are closely aligned with business and industry standards. The C)ISSO certification course is an ideal way to increase knowledge, expertise, and skill for managers, auditors, and INFOSEC professionals. At Mile2 we consider the C)ISSO to be one of our flagship courses. The things you learn in this course can be applied to management, prevention teams, and recovery professionals.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-71419de5 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"71419de5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1ca12bed elementor-widget elementor-widget-heading\" data-id=\"1ca12bed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Program<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-10905e70 elementor-icon-list--layout-inline elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"10905e70\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-hourglass-half\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Duration : 5 days<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8268162 elementor-widget elementor-widget-n-accordion\" data-id=\"8268162\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;all_collapsed&quot;,&quot;max_items_expended&quot;:&quot;one&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Module 1: Fundamentals of System and Network Security\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1360\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1360\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 1 - Risk Management  <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1360\" class=\"elementor-element elementor-element-4209905 e-con-full e-flex e-con e-child\" data-id=\"4209905\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-34ed7555 elementor-widget elementor-widget-text-editor\" data-id=\"34ed7555\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Risk Definitions<\/li><li>Risk Management<\/li><li>Risk Assessment<\/li><li>Responding to Risk II<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1361\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1361\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 2 - Security Management  <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1361\" class=\"elementor-element elementor-element-640b294 e-con-full e-flex e-con e-child\" data-id=\"640b294\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1361\" class=\"elementor-element elementor-element-38b4cae e-flex e-con-boxed e-con e-child\" data-id=\"38b4cae\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6c90ae00 elementor-widget elementor-widget-text-editor\" data-id=\"6c90ae00\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Understanding Security<\/li><li>Information Security Management System<\/li><li>Roles and Responsibility<\/li><li>Security Frameworks<\/li><li>Human Resources III<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1362\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1362\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 3 - Identification and Authentication  <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1362\" class=\"elementor-element elementor-element-cf2516c e-con-full e-flex e-con e-child\" data-id=\"cf2516c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1362\" class=\"elementor-element elementor-element-65644bf e-flex e-con-boxed e-con e-child\" data-id=\"65644bf\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1362\" class=\"elementor-element elementor-element-7b789cd2 e-flex e-con-boxed e-con e-child\" data-id=\"7b789cd2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-460c11db elementor-widget elementor-widget-text-editor\" data-id=\"460c11db\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Identity Management<\/li><li>Authentication Techniques<\/li><li>Single Sign-on<\/li><li>Access Control Monitoring IV<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1363\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"4\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1363\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 4 - Access Control  <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1363\" class=\"elementor-element elementor-element-b0a0112 e-con-full e-flex e-con e-child\" data-id=\"b0a0112\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1363\" class=\"elementor-element elementor-element-39336508 e-flex e-con-boxed e-con e-child\" data-id=\"39336508\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-71291d4a elementor-widget elementor-widget-text-editor\" data-id=\"71291d4a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Access Control Types and Characteristics<\/li><li>Information Classification<\/li><li>Access Control Models and Techniques<\/li><li>Access Control Methods V<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1364\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"5\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1364\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 5 \u2013 Security Models and Evaluation Criteria  <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1364\" class=\"elementor-element elementor-element-ce6c52a e-con-full e-flex e-con e-child\" data-id=\"ce6c52a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1364\" class=\"elementor-element elementor-element-5b748ac e-con-full e-flex e-con e-child\" data-id=\"5b748ac\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1364\" class=\"elementor-element elementor-element-3ebbd182 e-con-full e-flex e-con e-child\" data-id=\"3ebbd182\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-600ea5cc elementor-widget elementor-widget-text-editor\" data-id=\"600ea5cc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Trusted Computing Base<\/li><li>Protection Mechanisms<\/li><li>Security Models<\/li><li>Evaluation Criteria VI<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1365\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"6\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1365\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 6 - Operations Security  <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1365\" class=\"elementor-element elementor-element-64c575a e-flex e-con-boxed e-con e-child\" data-id=\"64c575a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1365\" class=\"elementor-element elementor-element-4278763 e-con-full e-flex e-con e-child\" data-id=\"4278763\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0f4c3fa elementor-widget elementor-widget-text-editor\" data-id=\"0f4c3fa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Administrative Management Responsibilities<\/li><li>Product Implementation Management<\/li><li>Redundancy and Fault Tolerance<\/li><li>Operational Issues and Responses<\/li><li>Threats to Operations VII<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1366\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"7\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1366\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 7 - Symmetric Cryptography and Hashing  <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1366\" class=\"elementor-element elementor-element-ec2cb3c e-flex e-con-boxed e-con e-child\" data-id=\"ec2cb3c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1366\" class=\"elementor-element elementor-element-7fde13c e-con-full e-flex e-con e-child\" data-id=\"7fde13c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-53dd0a6 elementor-widget elementor-widget-text-editor\" data-id=\"53dd0a6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Cryptography Terms<\/li><li>Historical Uses of Cryptography<\/li><li>Cryptography Foundations<\/li><li>Modern Cryptography<\/li><li>Hashing VIII<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1367\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"8\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1367\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 8 - Asymmetric Cryptography and PKI  <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1367\" class=\"elementor-element elementor-element-92572dd e-flex e-con-boxed e-con e-child\" data-id=\"92572dd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1367\" class=\"elementor-element elementor-element-0cf6884 e-con-full e-flex e-con e-child\" data-id=\"0cf6884\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-eb3d216 elementor-widget elementor-widget-text-editor\" data-id=\"eb3d216\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Asymmetric Cryptography<\/li><li>Hybrid Crypto and Digital Signatures<\/li><li>Public Key Infrastructure<\/li><li>Cryptography in Use<\/li><li>Attacks on Cryptography IX<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1368\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"9\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1368\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 9 - Network Connections  <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1368\" class=\"elementor-element elementor-element-338224c e-flex e-con-boxed e-con e-child\" data-id=\"338224c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1368\" class=\"elementor-element elementor-element-0142323 e-con-full e-flex e-con e-child\" data-id=\"0142323\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-695f4d1 elementor-widget elementor-widget-text-editor\" data-id=\"695f4d1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Network and Communications Security<\/li><li>Topologies<\/li><li>Cabling<\/li><li>LAN and WAN X<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1369\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"10\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1369\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 10 - Network Protocols and Devices  <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1369\" class=\"elementor-element elementor-element-3866ead e-flex e-con-boxed e-con e-child\" data-id=\"3866ead\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1369\" class=\"elementor-element elementor-element-4216739 e-con-full e-flex e-con e-child\" data-id=\"4216739\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4947b6c elementor-widget elementor-widget-text-editor\" data-id=\"4947b6c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>OSI Model<\/li><li>Network Devices<\/li><li>Network Security Sentries<\/li><li>Ports, Protocols and Services XI<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-13610\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"11\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-13610\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 11 - Telephony, VPNs and Wireless  <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-13610\" class=\"elementor-element elementor-element-8bd45cb e-flex e-con-boxed e-con e-child\" data-id=\"8bd45cb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-13610\" class=\"elementor-element elementor-element-745d3b8 e-con-full e-flex e-con e-child\" data-id=\"745d3b8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d4d3283 elementor-widget elementor-widget-text-editor\" data-id=\"d4d3283\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Telephony<\/li><li>VPNs<\/li><li>Wireless<\/li><li>Network Based Attacks XII<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-13611\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"12\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-13611\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 12 - Security Architecture and Attacks  <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-13611\" class=\"elementor-element elementor-element-57195fc e-flex e-con-boxed e-con e-child\" data-id=\"57195fc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-13611\" class=\"elementor-element elementor-element-5495e5c e-con-full e-flex e-con e-child\" data-id=\"5495e5c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ea4b208 elementor-widget elementor-widget-text-editor\" data-id=\"ea4b208\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Security Architecture<\/li><li>Architectural Models<\/li><li>System Threats XIII<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-13612\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"13\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-13612\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 13 - Software Development Security <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-13612\" class=\"elementor-element elementor-element-8f99db9 e-flex e-con-boxed e-con e-child\" data-id=\"8f99db9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-13612\" class=\"elementor-element elementor-element-3a93dbd e-con-full e-flex e-con e-child\" data-id=\"3a93dbd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-13610ca elementor-widget elementor-widget-text-editor\" data-id=\"13610ca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Software Security Concerns<\/li><li>Software Lifecycle Development Processes<\/li><li>Web Application Security<\/li><li>PCI-DSS Compliance XIV<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-13613\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"14\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-13613\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 14 - Database Security  <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-13613\" class=\"elementor-element elementor-element-c242153 e-flex e-con-boxed e-con e-child\" data-id=\"c242153\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-13613\" class=\"elementor-element elementor-element-3d8c5f6 e-con-full e-flex e-con e-child\" data-id=\"3d8c5f6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cbc6d02 elementor-widget elementor-widget-text-editor\" data-id=\"cbc6d02\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Database Models &amp;Terminology<\/li><li>Database Security Issues<\/li><li>Artificial Intelligence XV.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-13614\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"15\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-13614\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 15 - Malware and Attacks XVI <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-13614\" class=\"elementor-element elementor-element-541d4c9 e-flex e-con-boxed e-con e-child\" data-id=\"541d4c9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-13614\" class=\"elementor-element elementor-element-210fd28 e-con-full e-flex e-con e-child\" data-id=\"210fd28\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-13615\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"16\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-13615\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 16 - Business Continuity  <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-13615\" class=\"elementor-element elementor-element-90f3983 e-flex e-con-boxed e-con e-child\" data-id=\"90f3983\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-13615\" class=\"elementor-element elementor-element-f0e2c8a e-con-full e-flex e-con e-child\" data-id=\"f0e2c8a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b37c967 elementor-widget elementor-widget-text-editor\" data-id=\"b37c967\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Project Initiation<\/li><li>Business Impact Analysis<\/li><li>Determining Recovery Strategies<\/li><li>Writing the Plan<\/li><li>Preparing for a Disaster<\/li><li>Introduction to Business Continuity Management XVII<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-13616\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"17\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-13616\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 17 - Incident Management, Law and Ethics  <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-13616\" class=\"elementor-element elementor-element-5e8be89 e-flex e-con-boxed e-con e-child\" data-id=\"5e8be89\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-13616\" class=\"elementor-element elementor-element-5fe8618 e-con-full e-flex e-con e-child\" data-id=\"5fe8618\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-46b2681 elementor-widget elementor-widget-text-editor\" data-id=\"46b2681\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Incident Management<\/li><li>Law<\/li><li>Computer Crime<\/li><li>Evidence Handling<\/li><li>Privacy Legislations<\/li><li>Ethics XVIII.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-13617\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"18\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-13617\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 18 - Physical Security  <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-13617\" class=\"elementor-element elementor-element-039fff7 e-flex e-con-boxed e-con e-child\" data-id=\"039fff7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-13617\" class=\"elementor-element elementor-element-a80a82e e-con-full e-flex e-con e-child\" data-id=\"a80a82e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3796766 elementor-widget elementor-widget-text-editor\" data-id=\"3796766\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Facility Location and Construction<\/li><li>Risks, Threats and Countermeasures<\/li><li>Perimeter Protection<\/li><li>Electrical Power Issues<\/li><li>Fire Prevention, Detection and Suppression.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3add2827 e-flex e-con-boxed e-con e-child\" data-id=\"3add2827\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-796b392b e-flex e-con-boxed e-con e-child\" data-id=\"796b392b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-39dfad0 elementor-widget elementor-widget-heading\" data-id=\"39dfad0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Goal<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2a33cab7 elementor-widget elementor-widget-text-editor\" data-id=\"2a33cab7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Upon completion, Certified Information Systems Security Officer students be able to establish industry acceptable Cyber Security and Information Systems management standards with current best practices.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4f051be3 e-flex e-con-boxed e-con e-child\" data-id=\"4f051be3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-52b552e6 elementor-widget elementor-widget-heading\" data-id=\"52b552e6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Prerequisites<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2cfa19f0 elementor-widget elementor-widget-text-editor\" data-id=\"2cfa19f0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><div><div><div><ul><li>Mile2's C)SP\u00a0<\/li><li>Mile2's C)SIMS\u00a0<\/li><li>12 months of Information Systems Management Experience<\/li><\/ul><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5b52a59 e-flex e-con-boxed e-con e-parent\" data-id=\"5b52a59\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-158a494 elementor-button-info elementor-align-center elementor-widget elementor-widget-button\" data-id=\"158a494\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/07\/CISSO-Web-Outline.pdf\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">See the brochure for this course<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Target group IS Security Officers IS Managers Risk Managers Auditors\u00a0 Info Systems Owners IS Control Assessors System Managers Government Employees Description If you are look for the \u00ab\u00a0gotta have it\u00a0\u00bb cybersecurity course, then the Certified Information Systems Security Officer is for you. The C)ISSO will prepare you with a broad range of knowledge and skills [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":11284,"comment_status":"closed","ping_status":"closed","template":"","tags":[150],"accesibilite":[145],"certification":[87],"duree":[153],"examen":[146],"langue":[164],"niveau":[107],"formateur":[103],"mec_category":[115],"class_list":["post-11283","mec-events","type-mec-events","status-publish","has-post-thumbnail","hentry","tag-formation-du-moment","accesibilite-oui","certification-oui","duree-5-jours","examen-oui","langue-anglais","niveau-level-300","formateur-mile2","mec_category-auditing-information-systems-security-auditor"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>C)ISSO: Certified Information System Security Officer - ACG CyberAcademy<\/title>\n<meta name=\"description\" content=\"Gain essential cybersecurity skills with the Certified Information Systems Security Officer (CISSO) course - deal for managers, auditors, and INFOSEC professionals seeking industry-aligned expertise\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/acgcyberacademy.fr\/en\/events\/cisso-certified-information-system-security-officer\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"C)ISSO: Certified Information System Security Officer - ACG CyberAcademy\" \/>\n<meta property=\"og:description\" content=\"Gain essential cybersecurity skills with the Certified Information Systems Security Officer (CISSO) course - deal for managers, auditors, and INFOSEC professionals seeking industry-aligned expertise\" \/>\n<meta property=\"og:url\" content=\"https:\/\/acgcyberacademy.fr\/en\/events\/cisso-certified-information-system-security-officer\/\" \/>\n<meta property=\"og:site_name\" content=\"ACG CyberAcademy\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-18T15:15:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/07\/cisso-badgeAsset-9.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"304\" \/>\n\t<meta property=\"og:image:height\" content=\"241\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/cisso-certified-information-system-security-officer\\\/\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/cisso-certified-information-system-security-officer\\\/\",\"name\":\"C)ISSO: Certified Information System Security Officer - ACG CyberAcademy\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/cisso-certified-information-system-security-officer\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/cisso-certified-information-system-security-officer\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/cisso-badgeAsset-9.webp\",\"datePublished\":\"2024-07-08T13:39:58+00:00\",\"dateModified\":\"2025-11-18T15:15:43+00:00\",\"description\":\"Gain essential cybersecurity skills with the Certified Information Systems Security Officer (CISSO) course - deal for managers, auditors, and INFOSEC professionals seeking industry-aligned expertise\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/cisso-certified-information-system-security-officer\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/cisso-certified-information-system-security-officer\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/cisso-certified-information-system-security-officer\\\/#primaryimage\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/cisso-badgeAsset-9.webp\",\"contentUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/cisso-badgeAsset-9.webp\",\"width\":304,\"height\":241,\"caption\":\"Gain essential cybersecurity skills with the Certified Information Systems Security Officer (CISSO) course\u2014ideal for managers, auditors, and INFOSEC professionals seeking industry-aligned expertise\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/cisso-certified-information-system-security-officer\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Formations\",\"item\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"C)ISSO: Certified Information System Security Officer\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#website\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\",\"name\":\"ACG Cyber Academy\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/acgcyberacademy.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#organization\",\"name\":\"ACG Cyber Academy\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Untitled-15-2.png\",\"contentUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Untitled-15-2.png\",\"width\":1080,\"height\":1080,\"caption\":\"ACG Cyber Academy\"},\"image\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/fr.linkedin.com\\\/company\\\/acg-cybersecurity\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"C)ISSO: Certified Information System Security Officer - ACG CyberAcademy","description":"Gain essential cybersecurity skills with the Certified Information Systems Security Officer (CISSO) course - deal for managers, auditors, and INFOSEC professionals seeking industry-aligned expertise","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/acgcyberacademy.fr\/en\/events\/cisso-certified-information-system-security-officer\/","og_locale":"en_GB","og_type":"article","og_title":"C)ISSO: Certified Information System Security Officer - ACG CyberAcademy","og_description":"Gain essential cybersecurity skills with the Certified Information Systems Security Officer (CISSO) course - deal for managers, auditors, and INFOSEC professionals seeking industry-aligned expertise","og_url":"https:\/\/acgcyberacademy.fr\/en\/events\/cisso-certified-information-system-security-officer\/","og_site_name":"ACG CyberAcademy","article_modified_time":"2025-11-18T15:15:43+00:00","og_image":[{"width":304,"height":241,"url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/07\/cisso-badgeAsset-9.webp","type":"image\/webp"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/acgcyberacademy.fr\/events\/cisso-certified-information-system-security-officer\/","url":"https:\/\/acgcyberacademy.fr\/events\/cisso-certified-information-system-security-officer\/","name":"C)ISSO: Certified Information System Security Officer - ACG CyberAcademy","isPartOf":{"@id":"https:\/\/acgcyberacademy.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/acgcyberacademy.fr\/events\/cisso-certified-information-system-security-officer\/#primaryimage"},"image":{"@id":"https:\/\/acgcyberacademy.fr\/events\/cisso-certified-information-system-security-officer\/#primaryimage"},"thumbnailUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/07\/cisso-badgeAsset-9.webp","datePublished":"2024-07-08T13:39:58+00:00","dateModified":"2025-11-18T15:15:43+00:00","description":"Gain essential cybersecurity skills with the Certified Information Systems Security Officer (CISSO) course - deal for managers, auditors, and INFOSEC professionals seeking industry-aligned expertise","breadcrumb":{"@id":"https:\/\/acgcyberacademy.fr\/events\/cisso-certified-information-system-security-officer\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/acgcyberacademy.fr\/events\/cisso-certified-information-system-security-officer\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/acgcyberacademy.fr\/events\/cisso-certified-information-system-security-officer\/#primaryimage","url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/07\/cisso-badgeAsset-9.webp","contentUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/07\/cisso-badgeAsset-9.webp","width":304,"height":241,"caption":"Gain essential cybersecurity skills with the Certified Information Systems Security Officer (CISSO) course\u2014ideal for managers, auditors, and INFOSEC professionals seeking industry-aligned expertise"},{"@type":"BreadcrumbList","@id":"https:\/\/acgcyberacademy.fr\/events\/cisso-certified-information-system-security-officer\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/acgcyberacademy.fr\/"},{"@type":"ListItem","position":2,"name":"Formations","item":"https:\/\/acgcyberacademy.fr\/events\/"},{"@type":"ListItem","position":3,"name":"C)ISSO: Certified Information System Security Officer"}]},{"@type":"WebSite","@id":"https:\/\/acgcyberacademy.fr\/#website","url":"https:\/\/acgcyberacademy.fr\/","name":"ACG Cyber Academy","description":"","publisher":{"@id":"https:\/\/acgcyberacademy.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/acgcyberacademy.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/acgcyberacademy.fr\/#organization","name":"ACG Cyber Academy","url":"https:\/\/acgcyberacademy.fr\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/acgcyberacademy.fr\/#\/schema\/logo\/image\/","url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/10\/Untitled-15-2.png","contentUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/10\/Untitled-15-2.png","width":1080,"height":1080,"caption":"ACG Cyber Academy"},"image":{"@id":"https:\/\/acgcyberacademy.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/fr.linkedin.com\/company\/acg-cybersecurity"]}]}},"_links":{"self":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events\/11283","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events"}],"about":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/types\/mec-events"}],"author":[{"embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/comments?post=11283"}],"version-history":[{"count":4,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events\/11283\/revisions"}],"predecessor-version":[{"id":18470,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events\/11283\/revisions\/18470"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/media\/11284"}],"wp:attachment":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/media?parent=11283"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/tags?post=11283"},{"taxonomy":"accesibilite","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/accesibilite?post=11283"},{"taxonomy":"certification","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/certification?post=11283"},{"taxonomy":"duree","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/duree?post=11283"},{"taxonomy":"examen","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/examen?post=11283"},{"taxonomy":"langue","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/langue?post=11283"},{"taxonomy":"niveau","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/niveau?post=11283"},{"taxonomy":"formateur","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/formateur?post=11283"},{"taxonomy":"mec_category","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec_category?post=11283"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}