TRY IT FREE FOR 48 HOURS
Access our entire library for 48 hours.
Just fill out the form below.

This ISSO course covers a broad range of industry best practices, knowledge and skills expected of a security manager/officer. the candidate will learn in-depth theory pertaining to the practical implementation of core security concepts, practices, monitoring and compliance in the spectrum of information systms management. Through the use of risk-baed approch, the ISSO is able to implement and maintain cost-effective security controls that are closely aligned with both business and industry standards. Whether you're responsible for the management of a Cyber Security team, a Security Officer, an IT auditor, or a Business Analyst, this ISSO certification course is an ideal way to increase your knowledge, expertise, and skill.
This course is an ideal pathway to earn credentials for those with proven deep technical and managerial competence, skills, experience, and credibility to design, engineer, implement, and manage their overall information security program to protect organizations from growing sophisticated attacks.
Introduction
Module 1 Security and Risk Management
1.1 CIA Triad Security Governance
1.2 Compliance Legal And Regulatory Issues
1.3 Understanding Professional Ethics
1.4 Risk Management
1.5 Threat Modeling Acquisition Strategy And Practice Security Awareness And Training
Module 2 Asset Security
2.1 Asset Security
Module 3 Security Engineering
3.1 Engineering And Management Of Security Part 1
3.2 Engineering And Management Of Security Part 2
3.3 Engineering And Management Of Security Part 3
Module 4 Communication and Network Security
4.1 Apply Secure Design Principles To Networks Part 1
4.2 Apply Secure Design Principles To Networks Part 2
4.3 Securing Network Components
4.4 Design And Establish Secure Communication Channels
Module 5 Identity and Access Management
5.1 Controlling Access And Managing Identity Part 1
5.2 Controlling Access And Managing Identity Part 2
Module 6 Security Assessment Testing
6.1 Designing Performing And Analyzing Security Testing
Module 7 Security Operations
7.1 Foundational Concepts And Investigations
7.2 Incident Management And Preventative Measures
7.3 Disaster Recovery Process
Module 8 Software Development Security
8.1 Understanding Applying And Enforcing Software Security Part 1
8.2 Understanding Applying And Enforcing Software Security Part 2
Summary