Vendor: Mile2
Tehnologije: Cyber Security
CISSO može implementirati i održavati troškovno učinkovite sigurnosne kontrole koje su usklađene s poslovnim i industrijskim standardima. Ova edukacija idealna je način povećanja znanja, stručnosti i vještina menadžera, revizora i INFOSEC profesionalaca. CISSO certifikacija jamči provjerenu sposobnost pojedinca da upravlja i vodi sigurnosne funkcije organizacija. Certifikacija profesionalcima osigurava posjedovanje tehničke dubine, ali i menadžerske razine kompetencija za učinkovito upravljanje sigurnosnom strategijom i operacijama organizacije. CISSO Common Body of Knowledge (CBK®) pokriva široku lepezu tema, osiguravajući relevantnost na svim područjima informacijske sigurnosti. Uspješni kandidati pokazati će stručnost u jedanaest domena (Risk Management; Security Management; Identification, Authentication, Authorization and Accounting; Operations Security; Symmetric Cryptography, Asymmetric Cryptography and Hashing; Network Concepts, Design and Attacks; Enterprise Security Architecture and Attacks; Software Development Security; Malware and Attacks; Business Continuity; Incident Management, Law and Ethics).
Osnovne informacije
- Voditelji informacijske sigurnosti
- Menadžeri rizika
- Revizori
- Procjenitelji kontrole informacijske sigurnosti
- Upravitelji sustava
- Iskustvo u upravljanju informacijskim sustavima ne manje od godinu dana.
- Poznavanje koncepata i principa kibernetičke sigurnosti.
Certifikacijski ispit
- Certified Information Systems Security Officer
Certifikat
- Certified Information Systems Security Officer
Differences and similarities between Mile2 CISSO and ISC2’s CISSP certification →
Moduli koji će se izvoditi
- Risk Definitions
- Risk Management
- Risk Assessment
- Responding to Risk
- Understanding Security
- Information Security Management System
- Roles and Responsibility
- Security Frameworks
- Human Resources
- Identity Management
- Authentication Techniques
- Single Sign-on
- Access Control Monitoring
- Access Control Types and Characteristics
- Information Classification
- Access Control Models and Techniques
- Access Control Methods
- Trusted Computing Base
- Protection Mechanisms
- Security Models
- Evaluation Criteria
- Administrative Management Responsibilities
- Product Implementation Management
- Redundancy and Fault Tolerance
- Operational Issues and Responses
- Threats to Operations
- Cryptography Terms
- Historical Uses of Cryptography
- Cryptography Foundations
- Modern Cryptography
- Hashing
- Asymmetric Cryptography
- Hybrid Crypto and Digital Signatures
- Public Key Infrastructure
- Cryptography in Use
- Attacks on Cryptography
- Network and Communications Security
- Topologies
- Cabling
- LAN and WAN
- OSI Model
- Network Devices
- Network Security Sentries
- Ports, Protocols and Services
- Telephony
- VPNs
- Wireless
- Network Based Attacks
- Security Architecture
- Architectural Models
- System Threats
- Software Security Concerns
- Software Lifecycle Development Processes
- Web Application Security
- PCI-DSS Compliance
- Database Models &Terminology
- Database Security Issues
- Artificial Intelligence
- Project Initiation
- Business Impact Analysis
- Determining Recovery Strategies
- Writing the Plan
- Preparing for a Disaster
- Introduction to Business Continuity Management
- Incident Management
- Law
- Computer Crime
- Evidence Handling
- Privacy Legislations
- Ethics
- Facility Location and Construction
- Risks, Threats and Countermeasures
- Perimeter Protection
- Electrical Power Issues
- Fire Prevention, Detection and Suppression
Brzi upit
"*" indicates required fields
Prijavite se
Lokacija
Brzi upit
"*" indicates required fields