Learn your way! Get started

CISSO Certified Information Systems Officer

with expert Kevin Henry

Course at a glance

Release date 3/16/2018
eBooks / courseware N/A
Hands-on labs N/A
Sample code N/A
Exams Included

Enterprise Solutions

Need reporting, custom learning tracks, or SCORM? Learn More

Course description

This Official Mile2® cyber security certification training series covers everything you need to know about becoming a Certified Information Systems Security Officer. Students will learn about risk management, security management, authentication, access control, security models, operations security, symmetric cryptography and hashing, asymmetric cryptography and PKI, network connections, network protocols and devices, telephony, VPNs and wireless, security architecture, software development security, database security and system development, business continuity, disaster recovery, incident management, law, and ethics, and physical security.



Meet the expert

Kevin is an international author, consultant and international
speaker. He is the official course development writer for ISC2 CISSP, ISACA CRISC and mile2’s C)ISSO. Kevin has been educating IT professionals for over 30 years. He also provides cyber security consulting and support services for organizations around the world. Assisting them with setting up Information Security programs and addressing areas ranging from in-depth risk analysis to policy creation and security awareness.

Course outline

Part 1: Risk and Security Management (1-2 hours)

Module 1: Risk and Security (01:20:00)
  • Risk Management (01:20:00)
  • Security Management (00:00)

Part 2: Authentication and Access (1-2 hours)

Module 1: Authentication and Access (01:00:00)
  • Authentication (01:00:00)
  • Access Control (00:00)

Part 3: Models and Operations (1-2 hours)

Module 1: Models and Operations (01:20:00)
  • Security Models (01:20:00)
  • Operations Security (00:00)

Part 4: Cryptography (1-2 hours)

Module 1: Cryptography (01:20:00)
  • Symmetric Cryptography and Hashing (01:20:00)
  • Asymmetric Cryptography and PKI (00:00)

Part 6: Telephony and Architecture (1-2 hours)

Module 1: Networks (01:00:00)
  • Network Connections (01:00:00)
  • Network Protocols and Devices (00:00)
Module 1: Telephony (00:00)
  • Telephony, VPNs and Wireless (00:00)
  • Security Architecture (00:00)

Part 7: Software and Database (1-2 hours)

Module 1: Software and Database (01:20:00)
  • Software Development Security (01:20:00)
  • Database Security and System Development (00:00)

Part 8: Disaster Recovery (1-2 hours)

Module 1: Disaster Recovery (01:00:00)
  • Malware and Software Attacks (01:00:00)
  • Business Continuity (00:00)

Part 9: Incidents, Physical Security (1-2 hours)

Module 1: Incidents (01:20:00)
  • Disaster Recovery (01:20:00)
  • Incident Management, Law, and Ethics (00:00)