C)ISSO: C)ISSO

Become an EPIC Affiliate

To view the class schedule you need to become an Affiliate

  • Largest “Guaranteed To Run” public technical training schedules available
  • Easy to become an Affiliate – no charge or fee
Become an EPIC Affiliate

already an Affiliate?  Login

About this Course

M2’s vendor neutral Certified Information Systems Security Officer certification training was a direct initiative of the DND – Department of National Defence of Canada in cooperation with the DOD – Department of Defense of the United States; defined in the dual initiative titled CANUS CDISM MOU – ID#: 197410011 8 found
at: http://www.state.gov/documents/organization/111449.pdf. In the CANUS CDISM MOU, it stated the following: I. The CDRSN National Information System Security Officer (ISSO) is the focal point for all security issues pertaining to this network. II. The Director Information Management Security (DIMSECUR) is the DND authority for security assessment of the CDRSN, including the approval of Interim Authority to Process (IAP) and Authority to Communicate.With these initiatives in mind, Mile2 created the Certified ISSO.
The CISSO addresses the broad range of industry best practices, knowledge and skills expected of a security manager/officer. The candidate will learn in-depth theory pertaining to the practical implementation of core security concepts, practices, monitoring and compliance in the full panorama of IS management.   Through the use of a risk-based approach, the CISSO is able to implement and maintain cost-effective security controls that are closely aligned with both business and industry standards.
Whether you’re responsible for the management of a Cyber Security team, a Security Officer, an IT auditor or a Business Analyst, the C)ISSO certification course is an ideal way to increase your knowledge, expertise and skill.
 Mile2 Accreditations: 
  1. Accredited by the NSA CNSS 4011-4016
  2. Is approved and has been placed on Homeland Security’s National Initiative for Cyber Security Careers and Studies (NICCS) training providers and maps to the National Cybersecurity Workforce Framework
  3. Preferred cyber certification for the FBI

Audience Profile

IS Security Officers
IS Managers
Risk Managers 
Auditors
Information Systems Owners
IS Control Assessors
System Managers
Government 

At Course Completion

Upon completion, Certified Information Systems Security Officer students will not only be able to establish industry acceptable Cyber Security & IS management standards with current best practices but also be prepared to competently take the CISSO exam.

Outline

Module 1: Risk Management

Module 2: Security Management

Module 3: Identification and Authentication

Module 4: Access Control

Module 5: Security Models and Evaluation Criteria

Module 6: Operations Security

Module 7: Symmetric Cryptography and Hashing

Module 8: Asymmetric Cryptography and PKI

Module 9: Network Connections

Module 10: Network Protocols and Devices

Module 11: Telephony, VPNs and Wireless
Module 12: Security Architecture and Attacks

Module 13: Software Development Security

Module 14: Database Security and System Development

Module 15: Malware and Software Attacks

Module 16: Business Continuity

Module 17: Disaster Recovery

Module 18: Incident Management, Law, and Ethics

Module 19: Physical Security

Prerequisites

1 Year experience in at least 2 modules or
1 year in IS Management