Hotline: 1800 PROGRESO (1800 776 4737)


Information Systems Security Officer (CISSO)
 
The Certified Information Systems Security Officer course is designed for forward-thinking security professionals that want the advanced skillset necessary to manage and consult businesses on information security.
 
The C)ISSO addresses the broad range of industry best practices, knowledge and skills expected of a security leader. The Candidate will learn both the theory and the requirements for practical implementation of core security concepts, practices, monitoring and compliance. Through the use of a risk-based approach, a C)ISSO is able to implement and maintain cost-effective security controls that are aligned with business requirements. 
 
Whether you are a responsible for the management of an Cyber Security team, a Security Officer, an IT auditor or a Business Analyst, the 
C)ISSO course is the ideal way to increase your knowledge, expertise, skill, and credibility.
 
The C)ISSO program  standards are closely aligned with those of the ISO27001, NIST, CISM® and the CISSP® CBK® exam objectives. The C)ISSO excels by providing a well-rounded, comprehensive overview of essential security topics.
 
 
Objectives

Upon Completion, students will:

  • Have knowledge to detect security threats and risk
  • Have knowledge to design a security solution to mitigate risk and threats
  • Have knowledge to accurately report on their findings from examinations
  • Be ready to sit for the C)ISSO Exam
 
Course Pre-Requisites
 
1 Year experience in at least 2 modules or 1 year in IS Management.
 
Who Should Attend
 
The C)ISSO course is a security leadership course designed for those who already know a little bit about security. We recommend a knowledge of what is covered in our C)SS: Certified Secruity Sentinel course as a prerequisite. People who are in or are going into the following professional roles will especially benefit from our course:
  • IS Security Officers
  • IS Managers
  • Risk Managers 
  • Auditors
  • Information Systems Owners
  • IS Control Assessors
  • System Managers
  • Government 
 
Course Outline
 
Module 1: Risk Management   
Module 2: Security Management        
Module 3: Identification and Authentication         
Module 4: Access Control   
Module 5: Security Models and Evaluation Criteria   
Module 6: Operations Security
Module 7: Symmetric Cryptography and Hashing
Module 8: Asymmetric Cryptography and PKI   
Module 9: Network Connections
Module 10: Network Protocols and Devices
Module 11: Telephony, VPNs and Wireless
Module 12: Security Architecture and Attacks
Module 13: Software Development Security
Module 14: Database Security and Development
Module 15: Malware and Software AttacksModule 16: Business Continuity
Module 16: Business Continuity
Module 17: Disaster Recovery
Module 18: Incident Management, Law, and Ethics
Module 19: Physical Security
 
For more information on course modules, please refer to our brochure.
 
 
Funding
  • Productivity and Innovation Credit (PIC) scheme
*Enjoy up to 40% tax deduction or 60% cash payout under the Productivity and Innovation Credit (PIC) scheme for Staff Training.
Find out more here!
 
Terms and conditions apply. Please contact IRAS for assistance or clarification on PIC.
 
 
 
Download Course Brochure Download Registration Form Course Schedule
Related Courses
Penetration Testing Engineer (CPTE)
The Certified Penetration Testing Engineer course trains students on the 5 key elements of penetration testing: information gathering, scanning,...
Certified Penetration Testing Consultant (CPTC) - Live Virtual Training
The C)PTC is designed for cyber security professionals and IT network administrators who are interested in conducting Penetration tests against...
Certified Disaster Recovery Engineer (CDRE) - Live Virtual Training
The Certified Disaster Recovery Engineer certification course will prepare individuals to help their business handle the unexpected, while...
Certified Digital Forensics Examiner (CDFE) - Live Virtual Training
The Certified Digital Forensics Examiner course will benefit organizations, individuals, government offices, and law enforcement agencies in...
Certified Network Forensics Examiner (CNFE) - Live Virtual Training
The Certified Network Forensics Examiner will take your digital forensic skill set to the next level by navigating through over twenty modules of...
Certified Secure Web Application Engineer (CSWAE) - Live Virtual Training
The Certified Secure Web Application Engineer course is designed to equip students with the knowledge and tools needed to identify and defend...
Certified Incident Handling Engineer (CIHE) - Live Virtual Training
The Certified Incident Handling Engineer course is designed to help incident handlers, system administrators, and general security engineers...
Certified Wireless Security Engineer (CWSE)
The Certified Wireless Security Engineer is prepared to identify those risk that wireless networks present for a business and to create and...
Certified Security Sentinel (CSS)
The Certified Security Sentinel certification course trains students on how attacks are performed, how to identify an attack, and how to secure...
Certified Vulnerability Assessor (CVA)
The Certified Vulnerability Assessor training help students understand the importance of vulnerability assessments.
Certified Security Leadership Officer (CSLO) - Live Virtual Training
The Certified Security Leadership Officer course is designed to give management an essential understanding of current security issues, best...
Certified Professional Ethical Hacker (CPEH) - Live Virtual Training
The Certified Professional Ethical Hacker course is the introductory training to mile2’s line of penetration testing courses and certifications.
Certified Virtual Machine Engineer (CVME 5.5)
The Certified Virtual Machine Engineer course is designed for those who need to understand virtualization and the impacts it can have on an...
Certified Information Security Management Systems - Lead Auditor (CISMS-LA) - Live Virtual Training
The Certified Information Security Management Systems—Lead Auditor certification course prepares students to competently lead audits of...
Certified Information Security Management Systems Lead Implementer (CISMS-LI) - Live Virtual Training
The Certified Information Security Management Systems—Lead Implementer certification course prepares students to help any organization through...
Fundamentals of Cybersecurity Incident Handling
Basic introduction to the main incident handling tasks and critical thinking skills that will help an incident handler perform their daily work.
Secure Coding Bootcamp
Combination of lecture, security testing and code review. You will learn the most common threats against applications and how to design and code...
 
Your Name
Contact No
E-mail
Subject
Message
Text Limit :
Security Code
 
15
830
126