Oreilly - Mile 2 Certified Information Systems Security Officer (CISSO)
by Integrity Training | Publisher: Stone River eLearning | Release Date: April 2018 | ISBN: 300000006A0217
Upon completion, Certified Information Systems Security Officer students will not only be able to establish industry acceptable Cyber Security & IS management standards with current best practices but also be prepared to competently take the CISSO exam. The Certified Information Systems Security Officer certification training was a direct initiative of the DND – Department of National Defence of Canada in cooperation with the DOD – Department of Defense of the United States; defined in the dual initiative titled CANUS CDISM MOU - ID#: 1974100118. In the CANUS CDISM MOU, it stated the following: I. The CDRSN National Information System Security Officer (ISSO) is the focal point for all security issues pertaining to this network. II. The Director Information Management Security (DIMSECUR) is the DND authority for security assessment of the CDRSN, including the approval of Interim Authority to Process (IAP) and Authority to Communicate. With these initiatives in mind, Mile2 created the Certified ISSO. The CISSO addresses the broad range of industry best practices, knowledge and skills expected of a security manager/officer. The candidate will learn in-depth theory pertaining to the practical implementation of core security concepts, practices, monitoring and compliance in the full panorama of IS management. Through the use of a risk-based approach, the CISSO is able to implement and maintain cost-effective security controls that are closely aligned with both business and industry standards. Whether you’re responsible for the management of a Cyber Security team, a Security Officer, an IT auditor or a Business Analyst, the C)ISSO certification course is an ideal way to increase your knowledge, expertise, and skill. ACCREDITED by the NSA CNSS 4011-4016 MAPPED to NIST / Homeland Security NICCS's Cyber Security Workforce Framework APPROVED on the FBI Cyber Security Certification Requirement list (Tier 1-3)
- Risk Management
- Agenda 00:19:21
- Risk Management 00:19:22
- Quantitative Analysis 00:19:16
- Security Management
- Security Management 00:18:00
- Enterprise Security Program 00:13:07
- Roadmap to Maturity 00:17:28
- Human Resources Issues 00:09:39
- Authentication
- Authentication 00:17:03
- Biometrics Error Types 00:18:59
- Memory Cards 00:13:28
- Issues Pertaining to Kerberos 00:12:18
- Access Control
- Access Control 00:15:42
- Access Control Characteristics 00:20:14
- Threats to Access Control 00:06:48
- Information Classification 00:09:59
- Discretionary Access Control Model 00:14:17
- Access Control Administration 00:13:06
- Security Models
- Security Models and Evaluation Criteria 00:19:22
- What Does It Mean to Be in a Specific Ring 00:17:18
- Non-Interference Model 00:14:08
- ITSEC - Good and Bad 00:10:56
- Operations Security
- Information Classification 00:18:55
- Product Implementation Concerns 00:17:27
- Redundant Array of Independent Disk (RAID) 00:16:07
- Methodology 00:18:16
- Symmetric Cryptography and Hashing
- Symmetric Cryptography and Hashing 00:18:43
- Historical Uses of Symmetric Cryptography: Vernam Cipher 00:16:43
- Information Classification 00:20:13
- Symmetric Algorithms - DS 00:23:38
- Asymmetric Cryptography and PKI
- Asymmetric Cryptography and PKI 00:19:24
- Example of Hybrid Cryptography 00:18:19
- CA and RA Roles 00:18:26
- Link versus End-to-End Encryption 00:18:46
- IPSec Handshaking Process 00:16:22
- Network Connections
- Information Classification 00:19:41
- Summary of Topologies 00:19:10
- Transmission Types - Number of Recievers 00:18:10
- Network Topologies 00:17:33
- WAN Technologies - DSL 00:14:10
- Network Protocols and Devices
- Information Classification 00:17:44
- Transport Layer 00:18:44
- Repeater 00:21:53
- Firewall Types - Circuit - Level Proxy Firewall 00:17:09
- TCP/IP Suite 00:16:15
- Telephony, VPNs and Wireless
- Information Classification 00:18:23
- PBX Vulnerabilities 00:12:19
- SSL/TLS 00:08:38
- Wireless Network Topologies 00:18:03
- WPA and WPA2 Mode Types 00:16:00
- Security Architecture
- Information Classification 00:17:00
- Integrated Security is Designed Security 00:19:53
- System Functionality 00:12:41
- Attacking Through Applications 00:13:25
- Software Development Security
- Information Classification 00:18:39
- Development Methodologies 00:14:06
- Security Issues 00:14:52
- Linking Through COM 00:17:36
- Database Security and System Development
- Information Classification 00:19:19
- Artificial Intelligence 00:19:40
- Virus 00:09:52
- DDoS 00:10:57
- Malware and Software Attacks
- Malware and Attacks 00:16:41
- Business Continuity
- Information Classification 00:19:48
- How to Identify the Most Critical Company Functions 00:13:38
- Facility Backups - Hot Site 00:10:17
- Disaster Recovery
- Disaster Recovery 00:15:08
- Recovery Plan 00:23:06
- Return to Normal Operations 00:15:03
- Incident Management, Law, and Ethics
- Information Classification 00:18:21
- Intellectual Property Law 00:17:54
- Countries Working Together 00:17:21
- Privacy of Sensitive Data 00:12:50
- Physical
- Information Classification 00:18:35
- Types of Physical IDS 00:19:30
300000006A0217.Mile.2.Certified.Information.Systems.Security.Officer.CISSO.part1.OR.rar
300000006A0217.Mile.2.Certified.Information.Systems.Security.Officer.CISSO.part2.OR.rar
300000006A0217.Mile.2.Certified.Information.Systems.Security.Officer.CISSO.part3.OR.rar
300000006A0217.Mile.2.Certified.Information.Systems.Security.Officer.CISSO.part4.OR.rar
300000006A0217.Mile.2.Certified.Information.Systems.Security.Officer.CISSO.part5.OR.rar