CERTIFIED INFORMATION
SYSTEMS SECURITY OFFICER
C)ISSO Certification aims to ensure that the holder has a broad base of knowledge covering a large variety of INFOSEC areas to ensure that they are able to effectively run an INFOSEC team and establish a cybersecurity culture.
An Information Systems Security Officer is able to implement and maintain cost-effective security controls that are closely aligned with business and industry standards. The C)ISSO certification course is an ideal way to increase knowledge, expertise, and skill for managers, auditors, and INFOSEC professionals.
Topics Covered
Description
Topics Covered
Module 01 | Risk Management |
Module 02 | Security Management |
Module 03 | Identification and Authentication |
Module 04 | Access Control |
Module 05 | Security Models and Evaluation Criteria |
Module 06 | Operations Security |
Module 07 | Vulnerability Assessments |
Module 08 | Symmetric Cryptography and Hashing |
Module 09 | Network Connections |
Module 10 | Network Protocols and Devices |
Module 11 | Telephony, VPNs, and Wireless |
Module 12 | Security Architecture and Attacks |
Module 13 | Software Development Security |
Module 14 | Database Security |
Module 15 | Malware and Software Attacks |
Module 16 | Business Continuity |
Module 17 | Disaster Recovery |
Module 18 | Incident Management, Law, and Ethics |
Module 19 | Physical Security |
Description
Who should attend?
- IS Security Officers
- IS Managers
- Risk Managers
- Data Analysts
- Network Technicians
Why Cyber Security ?
Confidentiality
Confidentiality measures are designed to protect against unauthorized disclosure of information.
Integrity
Integrity involves protection from unauthorized modifications (e.g., add, delete, or change) of data.
Availability
Availability is protecting the functionality of support systems and ensuring data is fully available .