C)ISSO (Certified Information Systems Security Officer)

Security/Informatie Beveiliging trainingen

> Security

Beschikbare leervormen - Available learning methods C)ISSO training
Course duration                 Course price                   Corresponding exam
5 days   EUR 2.995,00 excl. BTW/VAT   C)ISSO: Certified Information Systems Information Officer

Course Overview

The C)ISSO training is designed for forward-thinking security professionals that want the advanced skillset necessary to manage and consult businesses on information security.

The C)ISSO addresses the broad range of industry best practices, knowledge and skills expected of a security leader. The Candidate will learn both the theory and the requirements for practical implementation of core security concepts, practices, monitoring and compliance. Through the use of a risk-based approach, a C)ISSO is able to implement and maintain cost-effective security controls that are aligned with businessrequirements.

Experience Level:
Geen data hier?:
Vraag een sessie aan via info@one2train.nl

Whether you are a responsible for the management of an Cyber Security team, a Security Officer, an IT auditor or a Business Analyst, the C)ISSO course is the ideal way to increase your knowledge, expertise, skill, and credibility.

The C)ISSO program standards are closely aligned with those of the ISO27001, NIST, CISM® and the CISSP® CBK® exam objectives. The C)ISSO excels by providing a well-rounded, comprehensive overview of essential security topics.

Course objectives

Upon completion students will:

  • Have knowledge to detect security threats and risk
  • Have knowledge to accurately report on their findings from examinations
  • Have knowledge to design a security solution to mitigate risk and threats
  • Be ready to sit for the C)ISSO Exam


A general knowledge of information systems and security.

Certification Exam

C)ISSO: Certified Information Systems Information Officer

Certification Track

C)ISSO: Certified Information Systems Information Officer

Course Content

Module 1: Risk Management
Module 2: Security Management
Module 3: Identification and Authentication
Module 4: Access Control
Module 5: Security Models and Evaluation Criteria
Module 6: Operations Security
Module 7: Symmetric Cryptography and Hashing
Module 8: Asymmetric Cryptography and PKI
Module 9: Network Connections
Module 10: Network Protocols and Devices
Module 11: Telephony, VPNs and Wireless
Module 12: Security Architecture and Attacks
Module 13: Software Development Security
Module 14: Database Security and Development
Module 15: Malware and Software Attacks
Module 16: Business Continuity
Module 17: Disaster Recovery
Module 18: Incident Management, Law, and Ethics
Module 19: Physical Security