Certification: CISSO Certified Information Systems Security Officer

Category
Security
Level
Advanced
Lessons
38
Duration
20h 21m 12s
Last Updated: 2018-06-19
This training path covers everything you need to know about becoming a Certified Information Systems Security Officer. Participants will learn about risk management, security management, authentication, access control, security models, operations security, symmetric cryptography and hashing, asymmetric cryptography and PKI, network connections, network protocols and devices, telephony, VPNs and wireless, security architecture, software development security, database security and system development, business continuity, disaster recovery, incident management, law, ethics, and physical security. This path will fully prepare you to take the CISSP exam.

Career Path: Professional roles include Security Consultants, Security Auditors, System Administrators, IT Management, and Chief Security Officers.
Being a Certified Information Systems Security Officer will provide you with the advanced skill set necessary to manage and consult businesses on information security. You will possess the knowledge and skills expected of a security leader. Through the use of a risk-based approach, a C)ISSO is able to implement and maintain cost-effective security controls that are aligned with business requirements. Becoming a C)ISSO is the ideal way to increase your knowledge, expertise, skill, and credibility.

Certification Exam Details:
This path will fully prepare participants to take the CISSP exam. Learn more about this certification exam.  
Category
Security
Level
Advanced
Lessons
38
Duration
20h 21m 12s
Certified Information Systems Security Officer Module 01 - Risk Management
Risk Management
2 lessons57m 58sCompleted 0 / 2
Certified Information Systems Security Officer Module 02 - Security Management
Certified Information Systems Security Officer Module 03 - Authentication
Certified Information Systems Security Officer Module 04 - Access Control
Certified Information Systems Security Officer Module 05 - Security Models
Certified Information Systems Security Officer Module 06 - Operations Security
Certified Information Systems Security Officer Module 07 - Symmetric Cryptography and Hashing
Certified Information Systems Security Officer Module 08 - Asym. Cryptography
Certified Information Systems Security Officer Module 09 - Network Connections
Certified Information Systems Security Officer Module 10 - Net. Protocols and Devices
Certified Information Systems Security Officer Module 11 - VPNs and Wireless
Certified Information Systems Security Officer Module 12 - Security Architecture
Certified Information Systems Security Officer Module 13 - Software Security
Certified Information Systems Security Officer Module 14 - Database Security
Certified Information Systems Security Officer Module 15 - Software Attacks
Certified Information Systems Security Officer Module 16 - Business Continuity
Certified Information Systems Security Officer Module 17 - Disaster Recovery
Certified Information Systems Security Officer Module 18 - Law and Ethics
Certified Information Systems Security Officer Module 19 - Physical
Kevin Henry
I’m an international author, consultant, and speaker. I’m the official course development writer for ISC2 CISSP, ISACA CRISC, and mile2®’s C)ISSO. I’ve been educating IT professionals for over 30 years. I also provides cybersecurity consulting and support services for organizations around the world. I assist them with setting up Information Security programs and addressing areas of concern, ranging from in-depth risk analysis to policy creation and security awareness. Recently, I authored the latest C)PTE - Certified Penetration Testing Engineer prep guide titled: ISBN# 978-1-84928-371-7
Kevin HenryInternational Author, Consultant, and Speaker
Other Courses by Kevin Henry