If you are look for the «gotta have it» cybersecurity course, then the Certified Information Systems Security Officer is for you. The C)ISSO will prepare you with a broad range of knowledge and skills required of a security officer. However, these skills can be applied across a broad range of role-based careers.
A C)ISSO is able to implement and maintain cost-effective security controls that are closely aligned with business and industry standards. The C)ISSO certification course is an ideal way to increase knowledge, expertise, and skill for managers, auditors, and INFOSEC professionals.
At Mile2 we consider the C)ISSO to be one of our flagship courses. The things you learn in this course can be applied to management, prevention teams, and recovery professionals.
Key Course Information
Language: English
Class Formats:
Self-Study
Includes:
- Course Video
- E-Book
- E-Prep Guide
- E-Lab Guide
- Exam Simulator
- 2 weeks Cyber Range
- 1 Year Courseware Access
1 Year Exam Voucher
Suggested Prerequisites:
– Mile2’s C)SP
– Mile2’s C)ISSM
Modules/Lessons
Module 1 -Risk Management
Module 2 -Security Management
Module 3 -Identification and Authentication
Module 4 -Access Control
Module 5 -Security Models and Evaluation Criteria
Module 6 -Operations Security
Module 7 -Vulnerability Assessments
Module 8 -Symmetric Cryptography and Hashing Module 9 -Network Connections
Module 10 -Network Protocols and Devices
Module 11 -Telephony, VPNs, and Wireless
Module 12 through 19 – See Detailed Outline Below
Who Should Attend
– IS Security Officers
– IS Managers
– Risk Managers
– Auditors
– Info Systems Owners
– IS Control Assessors
– System Managers
– Government Employees
Accreditations

Upon Completion
Upon completion, Certified Information Systems Security Officer students will not only be able to establish industry acceptable Cyber Security & IS management standards with current best practices but also be prepared to competently take the CISSO exam.
Exam Information
The Certified Information Systems Security Officer exam is taken online through Mile2’s Learning Management System and is accessible on you Mile2.com account. The exam will take approximately 2 hours and consist of 100 multiple choice questions.
A minimum grade of 70% is required for certification.
Re-Certification Requirements
All Mile2 certifications will be awarded a 3-year expiration date.
There are two requirements to maintain Mile2 certification:
– Pass the most current version of the exam for your respective existing certification
– Earn and submit 20 CEUs per year in your Mile2 account.
Course FAQ’s
Question: Do I have to purchase a course to buy a certification exam?
Answer: No
Question: Do all Mile2 courses map to a role-based career path?
Answer: Yes. You can find the career path and other courses associated with it at info@iatpr.com
Question: Are all courses available as self-study courses?
Answer: Yes. There is however 1 exception. The Red Team vs Blue Team course is only available as a live class.
Question: Are Mile2 courses transferable/shareable?
Answer: No. The course materials, videos, and exams are not meant to be shared or transferred.
Course and Certification Learning Options

Detailed Outline:
- Risk Definitions
- Risk Management
- Risk Assessment
- Responding to Risk
- Understanding Security
- Information Security Management System
- Roles and Responsibility
- Security Frameworks
- Human Resources
- Identity Management
- Authentication Techniques
- Single Sign-on
- Access Control Monitoring
- Access Control Types and Characteristics
- Information Classification
- Access Control Models and Techniques
- Access Control Methods
- Trusted Computing Base
- Protection Mechanisms
- Security Models
- Evaluation Criteria
- Administrative Management Responsibilities
- Product Implementation Management
- Redundancy and Fault Tolerance
- Operational Issues and Responses
- Threats to Operations
- Cryptography Terms
- Historical Uses of Cryptography
- Cryptography Foundations
- Modern Cryptography
- Hashing
- Asymmetric Cryptography
- Hybrid Crypto and Digital Signatures
- Public Key Infrastructure
- Cryptography in Use
- Attacks on Cryptography
- Network and Communications Security
- Topologies
- Cabling
- LAN and WAN
- OSI Model
- Network Devices
- Network Security Sentries
- Ports, Protocols and Services
- Telephony
- VPNs
- Wireless
- Network Based Attacks
- Security Architecture
- Architectural Models
- System Threats
- Software Security Concerns
- Software Lifecycle Development Processes
- Web Application Security
- PCI-DSS Compliance
- Database Models &Terminology
- Database Security Issues
- Artificial Intelligence
- Project Initiation
- Business Impact Analysis
- Determining Recovery Strategies
- Writing the Plan
- Preparing for a Disaster
- Introduction to Business Continuity Management
- Incident Management
- Law
- Computer Crime
- Evidence Handling
- Privacy Legislations
- Ethics
- Facility Location and Construction
- Risks, Threats and Countermeasures
- Perimeter Protection
- Electrical Power Issues
- Fire Prevention, Detection and Suppression.
