Site Powered by

Information Security Officer
Build skills equivalent to (ISC)2 CISSP program
  • Credit Hours: 5 Days

  • Format: Virtual Classroom - Instructor-led, Online

  • Professional Certificate: CISSP

  • Recommended for: IT consultants, managers, security policy writers, privacy officers, information security officers, network administrators, security device administrators, security engineers, and other security professionals whose positions require CISSP certification.

The Information Security Officer course prepares students for employment in the Informational Technology industry. Students will also obtain knowledge on security operations, access control, cryptography, security architecture and design, telecommunications and network security, disaster recovery and business continuity planning, legal, regulations, compliance, and investigations, and software development. This training course will be administered through a comprehensive, theory based platform. The courses curriculum satisfies the requirements needed to obtain employment and/or career advancement.

This course prepares students for employment as an Information Security Officer. According to the Bureau of Labor Statistics, employment change between 2010 and 2020 will grow by 22% greater than the annual average.

Course Outline

1. Introduction

  • Course Overview
  • CISSP Candidate Requirements

2. Security Operations

  • Operation Security Principles, Techniques, and Mechanisms
  • Principles and Practices of Good Security
  • Resource Protection Mechanisms and Techniques
  • Attacks and Prevention Methods

3. Access Control

  • Authentication
  • Authorization
  • Accountability
  • Threats to Access Control

4. Cryptography

  • History of Cryptography
  • Symmetric Encryption
  • Asymmetric Encryption
  • Hashing and Digital Signatures
  • Public Key Infrastructure
  • Cryptographic Attacks

5. Security Architecture and Design

  • Computer Architecture
  • Rings of Protection
  • Security Models
  • System Evaluation

6. Telecommunications and Network Security

  • The OSI Model
  • The TCP/IP Model
  • WAN Protocols
  • Routing
  • Wireless Systems
  • Fault Tolerance

7. Disaster Recovery and Business Continuity Planning

  • Disaster Recovery Planning
  • Business Impact Analysis
  • Business Continuity Planning
  • Backup and Off-Site Facilities

8. Legal, Regulations, Compliance, and Investigations

  • Laws and Ethics
  • Computer Crime
  • Incident Response and Forensics

9. Software Development Security

  • Database Security
  • System Development
  • Software Development Methods
  • Threats and Vulnerabilities

10. Information Security Governance and Risk Management

  • Security Management
  • Risk Analysis
  • Classification Controls

11. Physical (Environmental) Security

  • Threats to Physical Security
  • Administrative Controls
  • Environmental and Safety Controls
  • Physical and Technical Controls

Purchase this Course


Become versed as an Information Security Officer in 5 Days