Description
Who Should Attend?
IS Security Officers
IS Managers
Risk Managers
Auditors
Information Systems Owners
IS Control Assessors
System Managers
Government
Course Outline
Module 1 – Risk Management
Module 2 – Security Management
Module 3 – Identification and Authentication
Module 4 – Access Control
Module 5 – Security Models and Evaluation Criteria
Module 6 – Operations Security
Module 7 – Vulnerability Assessments
Module 8 – Symmetric Cryptography and Hashing
Module 9 – Network Connections
Module 10 – Network Protocols and Devices
Module 11 – Telephony, VPNs, and Wireless
Module 12 – Security Architecture and Attacks
Module 13 – Software Development Security
Module 14 – Database Security and System Development
Module 15 – Malware and Software Attacks
Module 16 – Business Continuity
Module 17- Disaster Recovery
Module 18 – Incident Management, Law, and Ethics
Module 19 – Physical Security
Upon Completion
Upon completion, Certified Information Systems Security Officer students will not only be able to establish industry acceptable Cyber Security & IS management standards with current best practices but also be prepared to competently take the CISSO exam.