BEGIN:VCALENDAR
VERSION:2.0
METHOD:PUBLISH
CALSCALE:GREGORIAN
PRODID:-//WordPress - MECv6.5.6//EN
X-ORIGINAL-URL:https://e-crimetrainingacademy.com/
X-WR-CALNAME:e-Crime Training Academy
X-WR-CALDESC:e-Crime Bureau Training Website
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-PUBLISHED-TTL:PT1H
X-MS-OLK-FORCEINSPECTOROPEN:TRUE
BEGIN:VEVENT
CLASS:PUBLIC
UID:MEC-0f7d880a848accb75228ccde43daae6a@e-crimetrainingacademy.com
DTSTART:20260818T080000Z
DTEND:20260822T163000Z
DTSTAMP:20240110T051200Z
RRULE:FREQ=YEARLY
CREATED:20240110
LAST-MODIFIED:20250124
PRIORITY:5
TRANSP:OPAQUE
SUMMARY:Certified Information Systems Security Officer (CISSO)
DESCRIPTION:The training cost is GHS 3000.00 and that of the final certification exam is $450.00\nClick to Register\nOverview:  \nThe CISSO course is designed to equip professionals to acquire a complete knowledge in cyber risk management, authentication, security management, access control, operations security, security models, etc.  Participants will learn in-depth theory pertaining to the practical implementation of core security concepts, practices, monitoring and compliance in the full panorama of IS management.  \nThrough the use of a risk-based approach, the CISSO is able to implement and maintain cost-effective security controls that are closely aligned with both business and industry standards.  The C)ISSO certification course is an ideal way to increase your knowledge, expertise, and skill.  The Bureau’s technical professionals will in this in-person training provide participants with both the role-based approach and the requirements for the best practice implementation of core cybersecurity concepts, policies, practices, monitoring and compliance. \n \nCouse Objectives: \n\nTo prepare participants for multiple managerial roles inside the information security community \n\n\nTo enable participants, understand the theories in security concept, practices, monitoring, and compliance in information security management \n\n\nTo provide participants with the knowledge on how to implement and maintain cost-effective security controls that are closely aligned with business and industry standards \n\n\nTo ensure participants get in-depth knowledge on a wide range of information security topics to ensure they are able to effectively manage an information security team and establish a resilient security culture. \n\n \nCouse Modules: \n\nRisk Management \n\n\nSecurity Management \n\n\nIdentification and Authentication \n\n\nAccess Control \n\n\nSecurity Models and Evaluation Criteria \n\n\nOperations Security \n\n\nVulnerability Assessments \n\n\nSymmetric Cryptography and Hashing \n\n\nNetwork Connections \n\n\nNetwork Protocols and Devices \n\n\nTelephony, VPNs and Wireless \n\n\nSecurity Architecture and Attacks \n\n\nSoftware Development Security \n\n\nDatabase Security \n\n\nMalware and Software Attacks \n\n\nBusiness Continuity \n\n\nDisaster Recovery \n\n\nIncident Management, Law and Ethics \n\n\nPhysical Security \n\n \nTarget Audience: \n\nIT Managers/Technical Officers,  \n\n\nForensics Investigators,  \n\n\nCISOs,  \n\n\nInformation Security Professional,  \n\n\nForensic Auditors,  \n\n\nRisk Managers/Analyst,  \n\n\nSecurity Managers,  \n\n\nOther professionals interested in cybercrime prevention and detection. \n\n
URL:https://e-crimetrainingacademy.com/events/certified-information-systems-security-officer-cisso-2-587/
CATEGORIES:Certification,Continuing Professional Development,Professional,Technical Training
LOCATION:Virtual Instructor-Led
ATTACH;FMTTYPE=:https://e-crimetrainingacademy.com/wp-content/uploads/2021/09/cisso-badgeAsset-9.webp
END:VEVENT
END:VCALENDAR
