Chat with us, powered by LiveChat
+233 (0) 302 999981 [email protected]

Certified Information Systems Security Officer (CISSO)

The training cost is GHS 3000.00 and that of the final certification exam is $450.00

Click to Register

Overview:  

The CISSO course is designed to equip professionals to acquire a complete knowledge in cyber risk management, authentication, security management, access control, operations security, security models, etc.  Participants will learn in-depth theory pertaining to the practical implementation of core security concepts, practices, monitoring and compliance in the full panorama of IS management.  

Through the use of a risk-based approach, the CISSO is able to implement and maintain cost-effective security controls that are closely aligned with both business and industry standards.  The C)ISSO certification course is an ideal way to increase your knowledge, expertise, and skill.  The Bureau’s technical professionals will in this in-person training provide participants with both the role-based approach and the requirements for the best practice implementation of core cybersecurity concepts, policies, practices, monitoring and compliance. 

 

Couse Objectives: 

  • To prepare participants for multiple managerial roles inside the information security community 
  • To enable participants, understand the theories in security concept, practices, monitoring, and compliance in information security management 
  • To provide participants with the knowledge on how to implement and maintain cost-effective security controls that are closely aligned with business and industry standards 
  • To ensure participants get in-depth knowledge on a wide range of information security topics to ensure they are able to effectively manage an information security team and establish a resilient security culture. 

 

Couse Modules: 

  • Risk Management 
  • Security Management 
  • Identification and Authentication 
  • Access Control 
  • Security Models and Evaluation Criteria 
  • Operations Security 
  • Vulnerability Assessments 
  • Symmetric Cryptography and Hashing 
  • Network Connections 
  • Network Protocols and Devices 
  • Telephony, VPNs and Wireless 
  • Security Architecture and Attacks 
  • Software Development Security 
  • Database Security 
  • Malware and Software Attacks 
  • Business Continuity 
  • Disaster Recovery 
  • Incident Management, Law and Ethics 
  • Physical Security 

 

Target Audience: 

  • IT Managers/Technical Officers,  
  • Forensics Investigators,  
  • CISOs,  
  • Information Security Professional,  
  • Forensic Auditors,  
  • Risk Managers/Analyst,  
  • Security Managers,  
  • Other professionals interested in cybercrime prevention and detection. 

Date

Aug 18 - 22 2025

Time

8:00 am - 4:30 pm

Cost

¢3,000.00

Location

Virtual Instructor-Led

Submit a Comment

Your email address will not be published. Required fields are marked *