ADD ANYTHING HERE OR JUST REMOVE IT…
IAT
  • IAT
  • Cursos & Certificaciones
  • Partners
  • Programas
  • Contáctanos
0 items / $0.00
Menu
IAT
0 items / $0.00
Haz click para agrandar
PL-300T00 Microsoft Power BI Data Analyst (WEST) $2,497.00 $1,997.00
Regresar a Productos
Certified Network Forensics Examiner $895.00

Certified Information Systems Security Officer

$895.00

Annual Salary Potential   $92,662 AVG/year

— O —

Share:
  • Descripción
Descripción

If you are look for the «gotta have it» cybersecurity course, then the Certified Information Systems Security Officer is for you. The C)ISSO will prepare you with a broad range of knowledge and skills required of a security officer. However, these skills can be applied across a broad range of role-based careers.

A C)ISSO is able to implement and maintain cost-effective security controls that are closely aligned with business and industry standards. The C)ISSO certification course is an ideal way to increase knowledge, expertise, and skill for managers, auditors, and INFOSEC professionals.

At Mile2 we consider the C)ISSO to be one of our flagship courses. The things you learn in this course can be applied to management, prevention teams, and recovery professionals.

Key Course Information

Language: English

Class Formats:

Self-Study

Includes:

  • Course Video
  • E-Book
  • E-Prep Guide
  • E-Lab Guide
  • Exam Simulator
  • 2 weeks Cyber Range
  • 1 Year Courseware Access

1 Year Exam Voucher

 

Suggested Prerequisites:

 

– Mile2’s C)SP

– Mile2’s C)ISSM

Modules/Lessons

Module 1 -Risk Management

Module 2 -Security Management

Module 3 -Identification and Authentication

Module 4 -Access Control

Module 5 -Security Models and Evaluation Criteria

Module 6 -Operations Security

Module 7 -Vulnerability Assessments

Module 8 -Symmetric Cryptography and Hashing Module 9 -Network Connections

Module 10 -Network Protocols and Devices

Module 11 -Telephony, VPNs, and Wireless

Module 12 through 19 – See Detailed Outline Below

Who Should Attend
– IS Security Officers
– IS Managers
– Risk Managers
– Auditors
– Info Systems Owners
– IS Control Assessors
– System Managers
– Government Employees

Accreditations

Upon Completion

Upon completion, Certified Information Systems Security Officer students will not only be able to establish industry acceptable Cyber Security & IS management standards with current best practices but also be prepared to competently take the CISSO exam.

Exam Information

The Certified Information Systems Security Officer exam is taken online through Mile2’s Learning Management System and is accessible on you Mile2.com account.  The exam will take approximately 2 hours and consist of 100 multiple choice questions.

A minimum grade of 70% is required for certification.

Re-Certification Requirements

All Mile2 certifications will be awarded a 3-year expiration date.

There are two requirements to maintain Mile2 certification:
– Pass the most current version of the exam for your respective existing certification
– Earn and submit 20 CEUs per year in your Mile2 account.

Course FAQ’s

Question:  Do I have to purchase a course to buy a certification exam?

Answer: No

Question: Do all Mile2 courses map to a role-based career path?

Answer: Yes.  You can find the career path and other courses associated with it at info@iatpr.com

Question:  Are all courses available as self-study courses?

Answer: Yes.  There is however 1 exception.  The Red Team vs Blue Team course is only available as a live class.

Question:  Are Mile2 courses transferable/shareable?

Answer: No.  The course materials, videos, and exams are not meant to be shared or transferred.

Course and Certification Learning Options

Detailed Outline:

I. Module 1 – Risk Management

  1. Risk Definitions
  2. Risk Management
  3. Risk Assessment
  4. Responding to Risk

II. Module 2 – Security Management

  1. Understanding Security
  2. Information Security Management System
  3. Roles and Responsibility
  4. Security Frameworks
  5. Human Resources

III. Module 3 – Identification and Authentication

  1. Identity Management
  2. Authentication Techniques
  3. Single Sign-on
  4. Access Control Monitoring

IV. Module 4 – Access Control

  1. Access Control Types and Characteristics
  2. Information Classification
  3. Access Control Models and Techniques
  4. Access Control Methods

V. Module 5 – security Models and Evaluation Criteria

  1. Trusted Computing Base
  2. Protection Mechanisms
  3. Security Models
  4. Evaluation Criteria

VI. Module 6 – Operations Security

  1. Administrative Management Responsibilities
  2. Product Implementation Management
  3. Redundancy and Fault Tolerance
  4. Operational Issues and Responses
  5. Threats to Operations

VII. Module 7 – Symmetric Cryptography and Hashing

  1. Cryptography Terms
  2. Historical Uses of Cryptography
  3. Cryptography Foundations
  4. Modern Cryptography
  5. Hashing

VIII. Module 8 – Asymmetric Cryptography and PKI

  1. Asymmetric Cryptography
  2. Hybrid Crypto and Digital Signatures
  3. Public Key Infrastructure
  4. Cryptography in Use
  5. Attacks on Cryptography

IX. Module 9 – Network Connections

  1. Network and Communications Security
  2. Topologies
  3. Cabling
  4. LAN and WAN

X. Module 10 – Network Protocols and Devices

  1. OSI Model
  2. Network Devices
  3. Network Security Sentries
  4. Ports, Protocols and Services

XI. Module 11 – Telephony, VPNs and Wireless

  1. Telephony
  2. VPNs
  3. Wireless
  4. Network Based Attacks

XII. Module 12 – Security Architecture and Attacks

  1. Security Architecture
  2. Architectural Models
  3. System Threats

XIII. Module 13 – Software Development Security

  1. Software Security Concerns
  2. Software Lifecycle Development Processes
  3. Web Application Security
  4. PCI-DSS Compliance

XIV. Module 14 – Database Security

  1. Database Models &Terminology
  2. Database Security Issues
  3. Artificial Intelligence

XV. Module 15 – Malware and Attacks XVI. Module 16 – Business Continuity

  1. Project Initiation
  2. Business Impact Analysis
  3. Determining Recovery Strategies
  4. Writing the Plan
  5. Preparing for a Disaster
  6. Introduction to Business Continuity Management

XVII. Module 17 – Incident Management, Law and Ethics

  1. Incident Management
  2. Law
  3. Computer Crime
  4. Evidence Handling
  5. Privacy Legislations
  6. Ethics

XVIII. Module 18 – Physical Security

  1. Facility Location and Construction
  2. Risks, Threats and Countermeasures
  3. Perimeter Protection
  4. Electrical Power Issues
  5. Fire Prevention, Detection and Suppression.
®️ Copyright 2022 by Institute Advanced Technology, LLC. Todos los derechos reservados. This site is not a part of the Facebook website or Facebook Inc. Additionally, This site is NOT endorsed by Facebook in any way. FACEBOOK is a trademark of FACEBOOK, Inc.
  • IAT
  • Cursos & Certificaciones
  • Partners
  • Programas
  • Contáctanos
Mi Carrito
cerrar
Usamos cookies para ofrecerle una mejor experiencia. Saber más
Estoy de acuerdo
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Siempre activado
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDuraciónDescripción
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
GUARDAR Y ACEPTAR