reed.co.uk Courses

Header

Certified Information Systems Security Officer (CISSO)


Stone River eLearning

Summary

Price
£300 inc VAT
Study method
Online, self-paced
Duration
21 Hours
Qualification
No formal qualification

Add to basket or enquire

Overview

Upon completion, CISSO*Certified Information Systems Security Officer students will not only be able to establish industry acceptable Cyber Security & IS management standards with current best practices but also be prepared to competently take the CISSO exam.

The Certified Information Systems Security Officer certification training was a direct initiative of the DND – Department of National Defence of Canada in cooperation with the DOD – Department of Defense of the United States; defined in the dual initiative titled CANUS CDISM MOU - ID#: 1974100118.

In the CANUS CDISM MOU, it stated the following: I. The CDRSN National Information System Security Officer (ISSO) is the focal point for all security issues pertaining to this network. II. The Director Information Management Security (DIMSECUR) is the DND authority for security assessment of the CDRSN, including the approval of Interim Authority to Process (IAP) and Authority to Communicate. With these initiatives in mind, Mile2 created the Certified ISSO. The CISSO addresses the broad range of industry best practices, knowledge and skills expected of a security manager/officer. The candidate will learn in-depth theory pertaining to the practical implementation of core security concepts, practices, monitoring and compliance in the full panorama of IS management.

Through the use of a risk-based approach, the CISSO is able to implement and maintain cost-effective security controls that are closely aligned with both business and industry standards. Whether you’re responsible for the management of a Cyber Security team, a Security Officer, an IT auditor or a Business Analyst, the C)ISSO certification course is an ideal way to increase your knowledge, expertise, and skill.

Exam Information

The Certified Information Systems Security Officer exam is taken online through Mile2’s Assessment and Certification System (“MACS”), which is accessible on your mile2 account. The exam will take 2 hours and consist of 100 multiple choice questions. The cost is $400 USD and must be purchased from Mile2.

Mile2 is:

  • ACCREDITED by the NSA CNSS 4011-4016
  • MAPPED to NIST / Homeland Security NICCS's Cyber Security Workforce Framework
  • APPROVED on the FBI Cyber Security Certification Requirement list (Tier 1-3)

What You'll Learn

  • Confidently take the CISSO certification exam
  • Establish industry acceptable Cyber Security & IS management standards

Description

Course Content

Module 01 - Risk Management (57:56)
Agenda (19:20)
Risk Management (19:21)
Quantitative Analysis (19:15)
Chapter 01 Quiz (5 questions)

Module 02 - Security Management (58:12)
Security Management (18:00)
Enterprise Security Program (13:07)
Roadmap to Maturity (17:27)
Human Resources Issues (09:38)
Chapter 02 Quiz (5 questions)

Module 03 -Authentication (01:01:45)
Authentication (17:02)
Biometrics Error Types (18:58)
Memory Cards (13:27)
Issues Pertaining to Kerberos (12:18)
Chapter 03 Quiz (5 questions)

Module 04 - Access Control (01:20:02)
Access Control (15:42)
Access Control Characteristics (20:13)
Threats to Access Control (06:47)
Information Classification (09:59)
Discretionary Access Control Model (14:16)
Access Control Administration (13:05)
Chapter 04 Quiz (4 questions)

Module 05 - Security Models (01:01:43)
Security Models and Evaluation Criteria (19:21)
What Does It Mean to Be in a Specific Ring (17:18)
Non-Interference Model (14:08)
ITSEC - Good and Bad (10:56)
Chapter 05 Quiz (4 questions)

Module 06 - Operations Security (01:10:44)
Information Classification (18:55)
Product Implementation Concerns (17:27)
Redundant Array of Independent Disk (RAID) (16:07)
Methodology (18:15)
Chapter 06 Quiz (4 questions)

Module 07 - Symmetric Cryptography and Hashing (01:19:13)
Symmetric Cryptography and Hashing (18:42)
Historical Uses of Symmetric Cryptography: Vernam Cipher (16:42)
Information Classification (20:12)
Symmetric Algorithms - DS (23:37)
Chapter 07 Quiz (2 questions)

Module 08 - Asymmetric Cryptography and PKI (01:50:46)
Asymmetric Cryptography and PKI (19:24)
Example of Hybrid Cryptography (18:19)
CA and RA Roles (18:25)
Link versus End-to-End Encryption (18:46)
IPSec Handshaking Process (16:22)
Types of Physical IDS (19:30)
Chapter 08 Quiz (2 questions)

Module 09 - Network Connections (01:28:42)
Information Classification (19:40)
Summary of Topologies (19:10)
Transmission Types - Number of Recievers (18:10)
Network Topologies (17:33)
WAN Technologies - DSL (14:09)
Chapter 09 Quiz (4 questions)

Module 10 - Network Protocols and Devices (01:31:41)
Information Classification (17:43)
Transport Layer (18:43)
Repeater (21:52)
Firewall Types - Circuit - Level Proxy Firewall (17:09)
TCP/IP Suite (16:14)
Chapter 10 Quiz (2 questions)

Module 11 - Telephony, VPNs and Wireless (01:13:19)
Information Classification (18:23)
PBX Vulnerabilities (12:18)
SSL/TLS (08:37)
Wireless Network Topologies (18:02)
WPA and WPA2 Mode Types (15:59)
Chapter 11 Quiz (2 questions)

Module 12 - Security Architecture (01:02:57)
Information Classification (16:59)
Integrated Security is Designed Security (19:52)
System Functionality (12:41)
Attacking Through Applications (13:25)
Chapter 12 Quiz (4 questions)

Module 13 - Software Development Security (01:05:12)
Information Classification (18:38)
Development Methodologies (14:06)
Security Issues (14:52)
Linking Through COM (17:36)
Chapter 13 Quiz 2 (questions)

Module 14 - Database Security and System Development (59:46)
Information Classification (19:19)
Artificial Intelligence (19:40)
Virus (09:51)
DDoS (10:56)
Chapter 14 Quiz (2 questions)

Module 15 - Malware and Software Attacks (16:40)
Malware and Attacks (16:40)
Chapter 15 Quiz (4 questions)

Module 16 - Business Continuity (43:43)
Information Classification (19:48)
How to Identify the Most Critical Company Functions (13:38)
Facility Backups - Hot Site (10:17)
Chapter 16 Quiz (2 questions)

Module 17 - Disaster Recovery (53:15)
Disaster Recovery (15:07)
Recovery Plan (23:05)
Return to Normal Operations (15:03)
Chapter 17 Quiz (2 questions)

Module 18 - Incident Management, Law, and Ethics (01:06:25)
Information Classification (18:20)
Intellectual Property Law (17:54)
Countries Working Together (17:21)
Privacy of Sensitive Data (12:50)
Chapter 18 Quiz (4 questions)

Module 19 – Physical (18:35)
Information Classification (18:35)
Chapter 19 Quiz (4 questions)

Who is this course for?

  • IS Security Officers
  • IS Managers
  • Risk Managers
  • Auditors
  • Information Systems Owners
  • IS Control Assessors
  • System Managers
  • Government

Requirements

  • 1 year experience in at least 2 modules or
  • 1 year in IS management

Career path

Information Systems Security Officer

Questions and answers


No questions or answers found containing ''.


Abiodun Ayo Efuwape asked:

How much total cost of this course with exam fees.

Answer:

Hi, You can get all the exam related details from Mile2 Site. The fee is from $400 to $600

This was helpful. Thank you for your feedback.

Rating and reviews

There haven't been any reviews for this course yet.

Leave a review

Modals