Mile2’s Certified Information Systems Security Officer addresses the broad range of industry best practices, knowledge, and skills expected of a security manager/officer. The candidate will learn in-depth theory pertaining to the practical implementation of core security concepts, practices, monitoring, and compliance in the full panorama of IS management. Through the use of a risk-based approach, the CISSO is able to implement and maintain cost-effective security controls that are closely aligned with both business and industry standards. Whether you’re responsible for the management of a Cyber Security team, a Security Officer, an IT auditor, or a Business Analyst, the C)ISSO certification course is an ideal way to increase your knowledge, expertise, and skill.
This CISSO course covers the theory, concepts, and best practices of security implementation, monitoring and compliance for IS management.
Duration: 5 Days (40 Hours)
A student needs to meet the following prerequisites in order to fully benefit from the course:
- 1-year experience in function areas covered by at least 2 of the course modules or
- 1 year in IS management
Upon completion, Certified Information Systems Security Officer students will be able to establish Cyber Security & IS management standards in line with current industry standards and best practices.
Note: Mile2’s Certified ISSO behandeld ISC2’s CISSP exam objectives
Who should attend
This course was designed for the benefit of the following organization roles:
- IS Security Officers
- IS Managers
- Risk Managers
- Information Systems Owners
- IS Control Assessors; System Managers
Key facts about Mile2
- Mile2 has a strong military connection. Their Certified Penetration Testing Engineer (CPTE) certification played a pivotal role in assisting the United States Air Force (USAF) improve their security protocols. This course was originally designed for the USAF.
- Mile2’s certification courses are accredited by the National Security Agency (NSA) and Committee on National Security Systems (CNSS). They are also on the FBI’s Preferred Tier 1-3 certification training list for prospective FBI agents specialising in cyber crime.
- CompTIA recognises and acknowledges Mile2 courses as Expert Level, e.g. Mile2 CPTE.
- Mile2 have their own IT Security Penetration Testing magazine called PenTest Magazine, which is published several times a year.
- All Mile2 courses count as Continuing Education Units (CEUs) toward (ISC)2, ISACA, and SANS ongoing certification requirements.
- Module 1: Risk Management
- Module 2: Security Management
- Module 3: Identification and Authentication
- Module 4: Access Control
- Module 5: Security Models and Evaluation Criteria
- Module 6: Operations Security
- Module 7: Symmetric Cryptography and Hashing
- Module 8: Asymmetric Cryptography and PKI
- Module 9: Network Connections
- Module 10: Network Protocols and Devices
- Module 11: Telephony, VPNs, and Wireless
- Module 12: Security Architecture and Attacks
- Module 13: Software Development Security
- Module 14: Database Security and System Development
- Module 15: Malware and Software Attacks
- Module 16: Business Continuity
- Module 17: Disaster Recovery
- Module 18: Incident Management, Law, and Ethics
- Module 19: Physical Security