ISSO Information Systems Security Officer

ISSO Information Systems Security Officer

$59.00

TRY IT FREE FOR 48 HOURS

Access our entire library for 48 hours.
Just fill out the form below.

 

Try it free for 48 Hours

No Credit Card Required.

Get Free Trial

This ISSO course covers a broad range of industry best practices, knowledge and skills expected of a security manager/officer.  the candidate will learn in-depth theory pertaining to the practical implementation of core security concepts, practices, monitoring and compliance in the spectrum of information systms management.  Through the use of risk-baed approch, the ISSO is able to implement and maintain cost-effective security controls that are closely aligned with both business and industry standards.  Whether you're responsible for the management of a Cyber Security team, a Security Officer, an IT auditor, or a Business Analyst, this ISSO certification course is an ideal way to increase your knowledge, expertise, and skill.  

This course is an ideal pathway to earn credentials for those with proven deep technical and managerial competence, skills, experience, and credibility to design, engineer, implement, and manage their overall information security program to protect organizations from growing sophisticated attacks.

Introduction

Module 1 Security and Risk Management

1.1 CIA Triad Security Governance

1.2 Compliance Legal And Regulatory Issues

1.3 Understanding Professional Ethics

1.4 Risk Management

1.5 Threat Modeling Acquisition Strategy And Practice Security Awareness And Training

 

Module 2 Asset Security

2.1 Asset Security

 

Module 3 Security Engineering 

3.1 Engineering And Management Of Security Part 1

3.2 Engineering And Management Of Security Part 2

3.3 Engineering And Management Of Security Part 3

 

Module 4 Communication and Network Security

4.1 Apply Secure Design Principles To Networks Part 1

4.2 Apply Secure Design Principles To Networks Part 2

4.3 Securing Network Components

4.4 Design And Establish Secure Communication Channels

 

Module 5 Identity and Access Management

5.1 Controlling Access And Managing Identity Part 1

5.2 Controlling Access And Managing Identity Part 2

 

Module 6 Security Assessment Testing

6.1 Designing Performing And Analyzing Security Testing

 

Module 7 Security Operations

7.1 Foundational Concepts And Investigations

7.2 Incident Management And Preventative Measures

7.3 Disaster Recovery Process

 

Module 8 Software Development Security

8.1 Understanding Applying And Enforcing Software Security Part 1

8.2 Understanding Applying And Enforcing Software Security Part 2

 

Summary