Certified Information Systems Security Officer (CISSO)
4.2 (95 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
722 students enrolled

Certified Information Systems Security Officer (CISSO)

Certified Information Systems Security Officer (CISSO) Certification Exam Prep Course
4.2 (95 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
722 students enrolled
Last updated 8/2019
English
English [Auto-generated]
Current price: $139.99 Original price: $199.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 20.5 hours on-demand video
  • 19 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Confidently take the CISSO certification exam
  • Establish industry acceptable Cyber Security & IS management standards
Requirements
  • 1 year experience in at least 2 modules or
  • 1 year in IS management
Description

Upon completion, Certified Information Systems Security Officer students will not only be able to establish industry acceptable Cyber Security & IS management standards with current best practices but also be prepared to competently take the CISSO exam.

The Certified Information Systems Security Officer certification training was a direct initiative of the DND – Department of National Defence of Canada in cooperation with the DOD – Department of Defense of the United States; defined in the dual initiative titled CANUS CDISM MOU - ID#: 1974100118.

In the CANUS CDISM MOU, it stated the following: I. The CDRSN National Information System Security Officer (ISSO) is the focal point for all security issues pertaining to this network. II. The Director Information Management Security (DIMSECUR) is the DND authority for security assessment of the CDRSN, including the approval of Interim Authority to Process (IAP) and Authority to Communicate. With these initiatives in mind, Mile2 created the Certified ISSO. The CISSO addresses the broad range of industry best practices, knowledge and skills expected of a security manager/officer. The candidate will learn in-depth theory pertaining to the practical implementation of core security concepts, practices, monitoring and compliance in the full panorama of IS management. 

Through the use of a risk-based approach, the CISSO is able to implement and maintain cost-effective security controls that are closely aligned with both business and industry standards. Whether you’re responsible for the management of a Cyber Security team, a Security Officer, an IT auditor or a Business Analyst, the C)ISSO certification course is an ideal way to increase your knowledge, expertise, and skill.  

  • ACCREDITED by the NSA CNSS 4011-4016
  • MAPPED to NIST / Homeland Security NICCS's Cyber Security Workforce Framework
  • APPROVED on the FBI Cyber Security Certification Requirement list (Tier 1-3)

Exam Information

The Certified Information Systems Security Officer exam is taken online through Mile2’s Assessment and Certification System (“MACS”), which is accessible on your mile2 account. The exam will take 2 hours and consist of 100 multiple choice questions. The cost is $400 USD and must be purchased from Mile2.


Who this course is for:
  • IS Security Officers
  • IS Managers
  • Risk Managers
  • Auditors
  • Information Systems Owners
  • IS Control Assessors
  • System Managers
  • Government
Course content
Expand all 74 lectures 20:20:36
+ Module 01 - Risk Management
3 lectures 57:56

Download Supporting files here

Preview 19:20
Risk Management
19:21
Quantitative Analysis
19:15
Chapter 01 Quiz
5 questions
+ Module 02 - Security Management
4 lectures 58:12

Download Supporting files here

Security Management
18:00
Roadmap to Maturity
17:27
Human Resources Issues
09:38
Chapter 02 Quiz
5 questions
+ Module 03 -Authentication
4 lectures 01:01:45

Download Supporting files here

Authentication
17:02
Memory Cards
13:27
Issues Pertaining to Kerberos
12:18
Chapter 03 Quiz
5 questions
+ Module 04 - Access Control
6 lectures 01:20:02

Download Supporting files here

Access Control
15:42
Access Control Characteristics
20:13
Information Classification
09:59
Discretionary Access Control Model
14:16
Access Control Administration
13:05
Chapter 04 Quiz
4 questions
+ Module 05 - Security Models
4 lectures 01:01:43

Download Supporting files here

Security Models and Evaluation Criteria
19:21
What Does It Mean to Be in a Specific Ring
17:18
Non-Interference Model
14:08
ITSEC - Good and Bad
10:56
Chapter 05 Quiz
4 questions
+ Module 06 - Operations Security
4 lectures 01:10:44

Download Supporting files here

Information Classification
18:55
Product Implementation Concerns
17:27
Redundant Array of Independent Disk (RAID)
16:07
Methodology
18:15
Chapter 06 Quiz
4 questions
+ Module 07 - Symmetric Cryptography and Hashing
4 lectures 01:19:13

Download Supporting files here

Symmetric Cryptography and Hashing
18:42
Historical Uses of Symmetric Cryptography: Vernam Cipher
16:42
Information Classification
20:12
Symmetric Algorithms - DS
23:37
Chapter 07 Quiz
2 questions
+ Module 08 - Asymmetric Cryptography and PKI
6 lectures 01:50:46

Download Supporting files here

Asymmetric Cryptography and PKI
19:24
Example of Hybrid Cryptography
18:19
CA and RA Roles
18:25
Link versus End-to-End Encryption
18:46
IPSec Handshaking Process
16:22
Types of Physical IDS
19:30
Chapter 08 Quiz
2 questions
+ Module 09 - Network Connections
5 lectures 01:28:42

Download Supporting files here

Information Classification
19:40
Summary of Topologies
19:10
Transmission Types - Number of Recievers
18:10
Network Topologies
17:33
WAN Technologies - DSL
14:09
Chapter 09 Quiz
4 questions
+ Module 10 - Network Protocols and Devices
5 lectures 01:31:41

Download Supporting files here

Information Classification
17:43
Transport Layer
18:43
Repeater
21:52
Firewall Types - Circuit - Level Proxy Firewall
17:09
TCP/IP Suite
16:14
Chapter 10 Quiz
2 questions