C)ISSO: Information Systems Security Officer

If you are look for the "gotta have it" cybersecurity course, then the Certified Information Systems Security Officer is for you. The C)ISSO will prepare you with a broad range of knowledge and skills required of a security officer. However, these skills can be applied across a broad range of role-based careers.

A C)ISSO is able to implement and maintain cost-effective security controls that are closely aligned with business and industry standards. The C)ISSO certification course is an ideal way to increase knowledge, expertise, and skill for managers, auditors, and INFOSEC professionals.

C)ISSO is considered to be one of Mile2s flagship courses. The things you learn in this course can be applied to management, prevention teams, and recovery professionals.

Key takeaways

Upon completion, Certified Information Systems Security Officer students be able to establish industry acceptable Cyber Security and Information Systems management standards with current best practices.

By completing this course you will earn 40 CEUs.

Prerequisites

Suggested Prerequisites:

  • Mile2’s C)SP
  • Mile2’s C)ISSM
  • 12 months of Information Systems  Management Experience  

Target audience

  • IS Security Officers
  • IS Managers
  • Risk Managers
  • Auditors
  • Info Systems Owners
  • IS Control Assessors
  • System Managers
  • Government Employees

 

 

Modules:

  • Module 1 -Risk Management
  • Module 2 -Security Management
  • Module 3 -Identification and Authentication
  • Module 4 -Access Control
  • Module 5 -Security Models and Evaluation Criteria
  • Module 6 -Operations Security
  • Module 7 -Vulnerability Assessments
  • Module 8 -Symmetric Cryptography and Hashing
  • Module 9 -Network Connections
  • Module 10 -Network Protocols and Devices
  • Module 11 -Telephony, VPNs, and Wireless
  • Module 12 through 19 – See Detailed Outline Below

Detailed Outline:

Course Introduction

  • Module 1 – Risk Management
    1. Risk Definitions
    2. Risk Management
    3. Risk Assessment
    4. Responding to Risk
  • Module 2 – Security Management
    1. Understanding Security
    2. Information Security Management System
    3. Roles and Responsibility
    4. Security Frameworks
    5. Human Resources
  • Module 3 – Identification and Authentication
    1. Identity Management
    2. Authentication Techniques
    3. Single Sign-on
    4. Access Control Monitoring
  • Module 4 – Access Control
    1. Access Control Types and Characteristics
    2. Information Classification
    3. Access Control Models and Techniques
    4. Access Control Methods
  • Module 5 – Security Models and Evaluation Criteria
    1. Trusted Computing Base
    2. Protection Mechanisms
    3. Security Models
    4. Evaluation Criteria
  • Module 6 – Operations Security
    1. Administrative Management Responsibilities
    2. Product Implementation Management
    3. Redundancy and Fault Tolerance
    4. Operational Issues and Responses
    5. Threats to Operations
  • Module 7 – Symmetric Cryptography and Hashing
    1. Cryptography Terms
    2. Historical Uses of Cryptography
    3. Cryptography Foundations
    4. Modern Cryptography
    5. Hashing
  • Module 8 – Asymmetric Cryptography and PKI
    1. Asymmetric Cryptography
    2. Hybrid Crypto and Digital Signatures
    3. Public Key Infrastructure
    4. Cryptography in Use
    5. Attacks on Cryptography
  • Module 9 – Network Connections
    1. Network and Communications Security
    2. Topologies
    3. Cabling
    4. LAN and WAN
  • Module 10 – Network Protocols and Devices
    1. OSI Model
    2. Network Devices
    3. Network Security Sentries
    4. Ports, Protocols and Services
  • Module 11 – Telephony, VPNs and Wireless
    1. Telephony
    2. VPNs
    3. Wireless
    4. Network Based Attacks
  • Module 12 – Security Architecture and Attacks
    1. Security Architecture
    2. Architectural Models
    3. System Threats
  • Module 13 – Software Development Security
    1. Software Security Concerns
    2. Software Lifecycle Development Processes
    3. Web Application Security
    4. PCI-DSS Compliance
  • Module 14 – Database Security
    1. Database Models &Terminology
    2. Database Security Issues
    3. Artificial Intelligence
  • Module 15 – Malware and Attacks
  • Module 16 – Business Continuity
    1. Project Initiation
    2. Business Impact Analysis
    3. Determining Recovery Strategies
    4. Writing the Plan
    5. Preparing for a Disaster
    6. Introduction to Business Continuity Management
  • Module 17 – Incident Management, Law and Ethics
    1. Incident Management
    2. Law
    3. Computer Crime

 

 

 

 

  1. Evidence Handling
  2. Privacy Legislations
  3. Ethics
  • Module 18 – Physical Security
    1. Facility Location and Construction
    2. Risks, Threats and Countermeasures
    3. Perimeter Protection
    4. Electrical Power Issues
    5. Fire Prevention, Detection and Suppression.

 

Exam information:

The exam is taken online through Mile2’s Learning Management System and is accessible on your Mile2.com account. The exam will take approximately 2 hours and consist of 100 multiple choice questions. 

A minimum grade of 70% is required for certification.

Your exam is included in the course fee!

Re-certification requirements:

  • Submit CEUs and Purchase Certification Renewal
      1. Earn and submit 60 CEUs over three years in your Mile2 account.
      2. Purchase Certification Renewal
  • Retake Current Certification Exam

 

1. Hvem passer dette kurset for?

For informasjonssikkerhetsansvarlige og IT-ledere, risikostyrere, revisorer, system-/informasjons­eiere, kontrolltestere, systemmanagere og offentlig ansatte som trenger helhetlig forståelse av sikkerhetsstyring og kontroller.

2. Hvilke forkunnskaper bør jeg ha?

Anbefalt: Mile2 C)SP, Mile2 C)ISSM og/eller ca. 12 måneders erfaring med IT/ISO-ledelse.

3. Hva lærer jeg i kurset?

Du bygger bred kompetanse innen risikostyring, sikkerhetsstyring, identitet/ autentisering og tilgangskontroll, sikkerhetsmodeller og evaluering, driftssikkerhet, kryptografi (symmetrisk/asymmetrisk, PKI), nettverk/telefoni/VPN/trådløst, sikkerhetsarkitektur og angrep, programvaresikkerhet/SDLC/OWASP, databasesikkerhet/AI, malware, BC/DR, hendelseshåndtering, jus og etikk, samt fysisk sikkerhet. Målet er å kunne etablere og drifte kostnadseffektive kontroller i tråd med virksomhetsmål og standarder.

4. Hvordan foregår kurset?

Leveres som klasseromskurs, live virtuelt eller bedriftsinternt/skreddersøm. Varighet: 5 dager, og fullført kurs gir 40 CEUs.

5. Er dette kurset praktisk?

Ja. Fokus er på anvendte kontroller og prosesser du tar rett inn i drift og ledelse: fra risikovurdering og policy/rammeverk til nettverks- og kryptokontroller, hendelseshåndtering og kontinuitetsplaner – med mål om forretningsnært og kostnadseffektivt sikkerhetsarbeid.

6. Hvor mye koster kurset?

Kursavgiften er 35 000 NOK, og eksamen er inkludert i prisen.

7. Hva slags materiell får jeg?

Du får tilgang til Mile2 sitt digitale læringssystem, offisielt kursmateriell, videoer og øvelser.

8. Gir kurset sertifisering?

Ja – kurset inkluderer sertifiseringseksamnen Certified Information Systems Security Officer.

  • Eksamen varer ca. 2 timer og består av 100 multiple-choice spørsmål

  • Du må ha minst 70 % riktig for å bestå.

Eksamen tas online via Mile2 sin læringsplattform.

9. Hvor lenge varer sertifiseringen?

Sertifiseringen er gyldig i 3 år. For å beholde den må du:

  1. Bestå den nyeste versjonen av eksamen
  2. Opparbeide og registrere 60 CEUs over 3 år i Mile2-kontoen din

10. Kan jeg delta digitalt?

Ja – kurset tilbys både som fysisk kurs i klasserom og som live, virtuelt kurs.

11. Kan jeg få kurset spesialtilpasset?

Ja – kurset kan tilbys bedriftsinternt og tilpasses organisasjonens behov.

12. Kan jeg bestille kurset for min organisasjon?

Ja – vi tilbyr bedriftsinterne kurs både fysisk og virtuelt.

Andre relevante kurs

5 dager
Classroom Virtual
5 dager
Classroom Virtual
4 dager
Classroom Virtual