The visual above shows which specialization tracks branch out from this course. This link will take you to an overview of all Mile2 courses.

Short Description

This course covers the theory, concepts and best practices of security implementation, monitoring and compliance for IS management.

Expanded Description

The candidate will learn in-depth theory pertaining to the practical implementation of core security concepts, practices, monitoring and compliance in the full panorama of IS management. Through the use of a risk-based approach, the CISSO is able to implement and maintain cost-effective security controls that are closely aligned with both business and industry standards. Whether you’re responsible for the management of a Cyber Security team, a Security Officer, an IT auditor or a Business Analyst, the C)ISSO certification course is an ideal way to increase your knowledge, expertise, and skill.


  1. C)ISSO Online Video
  2. C)ISSO Electronic Boek (Workbook)
  3. C)ISSO+ A Prep Guide om het CISSP examen te halen
  4. C)ISSO Exam
  5. C)ISSO Exam Simulator
  6. C)ISSO Exam Prep vragen
  7. C)ISSP Online Exam Prep Video


A student needs to meet the following prequisites in order to fully benefit from the course:

  • 1 year experience in function areas covered by at least of 2 of the course modules or
  • 1 year in IS management

Who should attend

This course was designed for the benefit of the following organization roles:

  • IS Security Officers
  • IS Managers; Risk Managers
  • Auditors; Information Systems Owners
  • IS Control Assessors; System Managers
  • Government

Course Outcome

Upon completion, Certified Information Systems Security Officer students will be able to establish Cyber Security & IS management standards in line with current industry standards and best practices.

Note: Mile2’s Certified ISSO behandeld  ISC2’s CISSP exam objectives

Course Outline:

  • Module 1: Risk Management
  • Module 2: Security Management
  • Module 3: Identification and Authentication
  • Module 4: Access Control
  • Module 5: Security Models and Evaluation Criteria
  • Module 6: Operations Security
  • Module 7: Symmetric Cryptography and Hashing
  • Module 8: Asymmetric Cryptography and PKI
  • Module 9: Network Connections
  • Module 10: Network Protocols and Devices
  • Module 11: Telephony, VPNs and Wireless
  • Module 12: Security Architecture and Attacks
  • Module 13: Software Development Security
  • Module 14: Database Security and System Development
  • Module 15: Malware and Software Attacks
  • Module 16: Business Continuity
  • Module 17: Disaster Recovery
  • Module 18: Incident Management, Law, and Ethics
  • Module 19: Physical Security


 875,00 (excl. BTW)
Offerte aanvragen