Certified Information Systems Security Officer (CISSO)
Course no: CISSO
Exam no: CISSO
Duration: 5 days
Type: Hybrid
Price: € 3375 excl. VAT
Certified Information Systems Security Officer (CISSO)
The Certified Information Systems Security Officer (CISSO) training provides a comprehensive foundation in cybersecurity and information security management. This course prepares professionals to design, implement, and manage security controls, risk management programs, cryptographic solutions, network security, compliance frameworks, and more. It is ideal for security professionals seeking advanced security governance and technical skills.
Prepares for this certification
This training prepares participants for the official CISSO certification by Mile2.
Description
The CISSO course teaches participants how to implement and maintain cost-effective security controls aligned with business objectives and industry standards. It covers central domains of cybersecurity, including risk management, cryptography, operations security, physical security, network security, and incident response. This program is well-suited for security officers, managers, auditors, and IT professionals responsible for securing enterprise systems.
Objectives
After completing this course, you will be able to:
Perform and evaluate risk management processes
Develop and maintain security management programs
Apply identification, authentication, and access control mechanisms
Understand and evaluate security architectures
Use symmetric and asymmetric cryptography effectively
Implement and assess network security controls
Analyze cyber threats, malware, and attack methods
Create business continuity and disaster recovery strategies
Implement incident management and response strategies
Assess and apply physical security controls
Target Audience
Ideal for:
Information Security Officers
Security Managers
Risk Managers
Auditors
Information Systems Owners
IT Control Assessors
Government Employees
List of Subjects
Module 1 – Introduction to IT Security
Understanding Security
Responsibilities
Building a Security Program
CIA Triad
Governance, Risk, Compliance
State of Security Today
Module 2 – Risk Management
Risk Management
Risk Assessment
Types of Risk, Threats and Vulnerabilities
Mitigating Attacks
Discovering Vulnerabilities and Threats
Responding to Risk
Module 3 – Understanding of Cryptography
Understanding Cryptography
Symmetric Encryption
Asymmetric Encryption
Hashing
PKI
Cryptography in Use
Module 4 – Understanding Identity and Access Management
Identity Management
Authentication Techniques
Single Sign-on
Access Control Monitoring
Module 5 – Managing Data Security
Virtualization Principles
Key Components Mapped to Cloud Layer
Key Security Concerns
Other Technologies Used in the Cloud
The Layers
Relevant CCM Controls
Module 6 – Data Security
Different Types of Storage
Encryption Options
Data Management
Module 7 – Managing Server/Host Security
The Operating Systems
Hardening the OS
Physical Security
Virtualization and Cloud Technologies
Module 8 – Application Security for Non-Developers
Application Security Principles
Software Development Life Cycle
OWASP Top 10
Hardening Web Applications
Patch/Update/Configuration Management
Module 9 – Understanding Mobile Device Security (IoT)
What Devices Are We Talking About?
What Is the Risk?
Hardening Mobile/IoT Devices
Corporate Management
Module 10 – Managing Day to Day Security
Company Responsibilities
Product Management
Prerequisites
Recommended but not required:
Mile2’s CSSP
Mile2’s CISSM
12 months of information systems management experience
Course Materials
Participants receive:
Student Guide (comprehensive coursebook)
Hands-on lab workbook
Knowledge check questions and answers
Reference materials
Access to digital learning materials via Mile2 learning platform
Not satisfied? You will get your money back without questions, without explanation. We want you to be always satisfied. Read more about money back guarantee.
Always certification guarantee via LAI CertProtect
If an employee leaves your organization within 6 months of a training, you can register another employee for the same training free of charge. This way you protect your investment! Read more about LAI CertProtect.
Always the best teachers
LAI has experienced and certified teachers who understand the art of explaining difficult topics in a fun and understandable way. Our teachers are still active in the professional field as consultants on a daily basis.
Always comprehensive advice
Courses and certifications can be complicated. Let our certification experts create a training program for your employees free of charge.
What our students tell us:
{
Excellent trainer and training center, everyone's are very nice and kind and perfect professionals!
5
Tihomir Shirov
CNSys PLC
{
Wonderful treatment, kind hosts and the perfect place to gain knowledge.
5
Boyko Kolev
CNSys PLC
{
One of the best trainings I ever had - If not the best! Hans did a really good job at presenting everything in a timely fashion. Really enjoyed it! Can´t recommend any suggestions for improvements, Hans and the LAI Team did a really good job!
Very good training and highly recommended, good handout material.
5
Harry Willemsen
Senior Technical Consultant
Ingram Micro
LAI in numbers
30.000+
students
9.8
customer satisfaction
100%
money back guarantee
1987
more than 35 years of experience
Questions about this course
If you have any questions about this training, please contact us via [email protected], +31 10 2042220 or via the “get in touch” form below. After we have processed your registration, you will receive a registration confirmation and an invoice that can be paid by bank transfer or credit card.