AUGUST TRAINING SCHEDULE


(CLICK HERE TO VIEW THE COURSE LISTING ON NICCS.US-CERT.GOV)


Registration CLOSES on August 20, 2018


TRAINING LOCATION

Coastal Regional Commission of Georgia
1181 Coastal Drive SW, Darien, GA 31305


COURSE DESCRIPTION
The Mile2 Certified Information Systems Security Officer certification course addresses the broad range of industry best practices, knowledge, and the skills expected of a forward-thinking cyber security professional. The candidate will learn in-depth theory of the practical implementation of core security concepts, practices, monitoring, and compliance in the full panorama of IS management. Using a risk-based approach, the CISSO can implement and maintain cost-effective security controls that are closely aligned with both business and industry standards.



The CISSO certification course has been validated by the NSA for:
CNSS-4012, National Information Assurance Training Standard for
Senior System Managers and NSTISSI-4011, National Training
Standard for Information Systems Security (INFOSEC).


(VIEW ALL MILE2 COURSES ON NICCS.US-CERT.GOV)


ABOUT THE INSTRUCTOR

Michael I. Kaplan is a Mile2 Partner Development Manager, certified Cyber Security Instructor, and a passionate advocate for military veteran issues with 21 years of experience in the security industry. His industry areas of specialization are Program Management and Implementation, IT Risk Assessment, and Information Systems Audit / Compliance. He also has a high degree of expertise regarding conformance to Cyber Security Frameworks including HIPAA Compliance (HITECH, GAPP), NIST SP 800 Series, ISO 27000 Series, PCI-DSS, SSAE 16 (SOC1, SOC2), and FedRAMP.

LEARNING OBJECTIVES



1. Risk Management

10. Network Protocols and Devices
2. Security Management

11. Telephony, VPN’s and Wireless
3. Identity Management

12. Security Architecture
4. Access Controls

13. Software Development Security
5. Security Models

14. Database Security
6. Operations Security

15. Malware and Software Attacks
7. Symmetric Cryptography and Hashing

16. Business Continuity
8. Asymmetric Cryptography and PKI

17. Incident Management
9. Network Connections

18. Physical Security

COURSE FEES INCLUDE

Materials:
 Hard Copy (Provided at Training Location)

A 15% discount is available for all
members of our military affiliated
communities. For information on
how to receive a discount code,
please contact Michael I. Kaplan:


 - Course Text / Workbook, Volume I

 - Course Text / Workbook, Volume II

 - Text: Key Security Concepts & Definitions

 - Text: Exam Prep Guide

 - Text: CISSO+ / CISSP Exam Prep Guide



 Electronic (Loaded in Student Account)

 * Access to digital content for 1-year

 - Course Text / Workbook, Volume I

 - Course Text / Workbook, Volume II

 - Course Video Series

 - CEU Completion Certificate

 - Course Prep Guide

 - Course Exam Simulator



 Exam Voucher

 - Re-Take Exam Voucher (if needed)

STUDENT COURSE FEE:
 (BEFORE DISCOUNT)

$3,000

REGISTER NOW FOR YOUR CYBER SECURITY CERTIFICATION

 Electronic Registration & Payment
 Link:

 Check / Purchase Order (Please contact Michael I. Kaplan via email or phone.)
 - PHONE: (912) 244-0394

Notify Me the NEXT Time the Course is Offered

* indicates required


DETAILED COURSE DESCRIPTION

Module 1: Risk Management



What is the Value of an Asset?

Risk Assessment NIST SP800-30
What is a Threat Source / Agent?

Risk Assessment Process
What is a Threat?

Why is Risk Assessment Difficult?
What is a Vulnerability?

Types of Risk Assessment
What is a Control?

Different Approaches to Analysis
What is Likelihood?

Purpose of ALE Values
What is Impact

Delphi Methodology
Control Effectiveness

Qualitative Analysis – Likelihood
Risk Management

Qualitative Analysis – Impact
Reference Documents

Qualitative Analysis – Risk Level
Risk Context NIST SP800-39

Response to Identified Risk
Risk Assessment

Comparing Costs and Benefits
Risk Response / Monitoring

Cost of Countermeasures
Purpose of Risk Management

Section Summary

Module 2: Security Management



Enterprise Security Program

Security Roles and Responsibilities
Building a Foundation

Security Program Components
Planning Horizon Components

Human Resources Issues Agenda
Enterprise Security / Business Requirements

Employee Management
Components of Enterprise Security

Recruitment Issues
Control Types

Termination of Employment
“Soft” Controls

Informing Employees About Security
Technical / Logical Controls

Social Engineering
Physical Controls

Protection Against Social Engineering
Roadmap to Maturity

Security Enforcement
Senior Managements’ Role in Security

Security Enforcement Issues
Negligence and Liability

Section Summary

Module 3: Identity Management



Access Control Methodology

Smart Cards
Access Control Administration

Single Sign-On Technology
Accountability and Access Control

Different SSO Technologies
Trusted Path

Scripts as Single Sign-On Technology
Authentication Mechanisms

Directory Services as Single Sign-On Technology
Strong Authentication

Thin Clients
Authorization

Kerberos as Single Sign-On Technology
Access Criteria

Kerberos
Fraud Controls

Kerberos Tickets
Access Control Mechanisms

Kerberos Components Working Together
Biometrics Enrollment Process

Major Components of Kerberos
Downfalls to Biometric Use

Issues Pertaining to Kerberos
Biometric Error Types

Federated Authentication
Biometrics Diagram

Monitoring Access
Biometric System Types

Intrusion Detection Systems (IDS)
Passwords and PINS

Network IDS Sensors
Countermeasures to Password Cracking

Types of IDS
Cognitive Passwords

Behavioral-Based IDS
One-Time Password Authentication

IDS Response Mechanisms
Synchronous Tokens

Intrusion Prevention Systems (IPS)
Asynchronous Token Devices

IDS / IPS Issues
Cryptographic Keys

Stopping an Intruder
Passphrase Authentication

Section Summary
Memory Cards



Module 4: Access Controls



Role of Access Control

Discretionary Access Control
Access Roles and Definitions

Enforcing DAC Policy
The Reference Monitor

Mandatory Access Control
Layers of Access Control

MAC Enforcement Mechanisms / Labels
Access Control Mechanism Examples

Role-Based Access Control (RBAC)
Access Control Characteristics

Acquiring Rights and Permissions
Examples of Preventative Controls

Rule-Based Access Control
Controlling Access

Access Control Matrix
Other Ways of Controlling Access

Access Control Administration
Information Classification

Decentralized Access Control Administration
Information Classification Criteria

Remote Centralized Administration
Declassifying Information

RADIUS
Examples of Classification Levels

RADIUS Characteristics
Models for Access

TACAS+ Characteristics

Module 5: Security Models



System Protection – Trusted Computing Base

Non-Interference Model
Security Kernel Requirements

Brewer – Nash / Chinese Wall
Security Models of Operation

Take – Grant Model
System Protection – Levels of Trust

Trusted Computer System Evaluation Criteria (TCSEC)
System Protection – Process Isolation

TCSEC Rating Breakdown
System Protection – Layering

Evaluation Criteria – ITSEC
System Protection – Application Program Interface

Comparison of Rations
System Protection – Protection Rings

ITSEC – Good and Bad
What Does it Mean to Be in a Specific Ring?

Common Criteria
Security Models

Common Criteria Components
State Machine

First Set of Requirements
Information Flow

Second Set of Requirements
Bell – LaPadula

Package Ratings
Rules of Bell – LaPadula

Common Criteria Outline
Biba

Certification vs. Accreditation
Clark – Wilson Model

Section Summary

Module 6: Operations Security



Operations Issues

Duplexing, Mirroring and Check-Pointing
Role of Operations

Redundant Array of Independent Disks (RAID)
Administrator Access

Fault Tolerance
Computer Operations – System Administrators

Back-Ups
Security Administrators

Back-Up Types
Operational Assurance

Email Security
Audit and Compliance

Vulnerability Assessment Methodology
Threats to Computer Operations

Penetration Testing
Specific Operations Tasks

Hack and Attack Strategies
Product Implementation Concerns

Threats to Operations
Logs and Monitoring

Data Leakage – Social Engineering
Record Management

Resource Protection
Change Control

Data Leakage – Object Reuse
Controlling How Change Takes Place

Why Not Just Delete Files or Reformat the Disk?
Change Control Process

Data Leakage – Keystroke Logging
Change Control Steps

Data Leakage – Emanation
Contingency Planning

Controlling Data Leakage – Control Zone
System Controls

Controlling Data Leakage – White Noise
Trusted Recovery

Section Summary
Fault-Tolerance Agenda



Module 7: Symmetric Cryptography and Hashing



Cryptography Objectives

5-Boxes Used in Block Cipher
Cryptographic Definitions

Types of Symmetric Cipher – Stream Cipher
Binary Mathematical Functions

XOR Encryption Process
128-Bit vs. 64-Bit Protection

Strength of a Stream Cipher
Symmetric Cryptography – Use of Secret Keys

Symmetric Key Cryptography
Asymmetric Cryptography – Use of Key Pairs

Symmetric Downfalls
Cryptography Uses: Yesterday and Today

Symmetric Key Management Issues
Historical Uses of Symmetric Cryptography

Symmetric Algorithms – DES
Substitution Cipher

Evolution of 3DES
Vigenere Cipher

Different Modes of Block Ciphers – ECB
Vigenere Table Example

Block Cipher Modes – CBC
Enigma Machine

Block Cipher Modes – CFB and OFB
Vernam Cipher

CTR Mode
One-Time Pad Characteristics

Symmetric Cipher – AES
Running Key and Concealment

Other Symmetric Algorithms
Determining Strength in a Cryptosystem

Hashing Algorithms
Characteristics of Strong Algorithms

Protecting the Integrity of Data
Open or Closed More Secure?

Data Integrity Mechanisms
Types of Ciphers Used Today

Security Issues in Hashing
Encryption / Decryption Methods

Simple MAC
Symmetric Characteristics

Weakness in using Only Hashing Algorithms
Symmetric Algorithm Examples

HMAC – Sender
Types of Symmetric Cipher – Block Cipher

HMAC – Receiver

Module 8: Asymmetric Cryptography and PKI



Asymmetric Cryptography

PKI and Its Components
Asymmetric Algorithm: Diffie – Hellman

CA and RA Roles
Asymmetric Algorithm: RSA

Digital Certificates
Asymmetric Algorithms: El Gamal and ECC

Components of PKI: Repository and CRL’s
Public Key Cryptography Advantages

What Do You Do with a Certificate?
When to Use Which Key?

Key Management
Asymmetric Algorithm Disadvantages

Link vs. End-to-End Encryption
Symmetric vs. Asymmetric

Network Layer Protection
Examples of Hybrid Cryptography

IPSec Key Management
Digital Signatures

IPSec Handshaking Process
SA’s in Use

Encrypted Messages
IPSec is a Suite of Protocols

Secure Email Standards
IPSec Datagrams

Attacks on Cryptosystems
SSL / TLS Hybrid Encryption

Ways of Breaking Cryptosystems: Brute Force
SSH Security Protocol

Ways of Breaking Cryptosystems: More Attacks
Email Standards

Section Summary
Why Do We Need a PKI?



Module 9: Network Connections



Transmission Types: Analog and Digital

Cabling Types: Coaxial
Network Topologies: Physical Layer

Cabling Types: Twisted Pair
Comparison of Topologies

Cabling Types: Optical Fiber
LAN Media Access Technologies

Cabling Issues: Plenum Rating
Goals of Media Access Technologies

Types of Networks
Two Types of Carrier Sense Multiple Access

Network Technologies
Media Access Technologies: Token Passing

Network Configurations
Media Access technologies: Polling

MAN Technologies: SONET
Transmission Types: Synchronous and Asynchronous

Wide Area Network Technologies (WAN)
Transmission Types: Number of Receivers

WAN Technologies: Circuit or Packet Switched
Cabling

Multiplexing
Signal and Cable Issues

Network Services

Module 10: Network Protocols and Devices



OSI Model

Firewall Types: Stateful
Comparison of Models

Firewall Types: Dynamic Packet Filtering
Data Encapsulation

Firewall Types: Kernel Proxies
OSI: Application Layer

Firewall Placement
OSI: Presentation Layer

Firewall Architecture: Multi- or Dual-Homed
OSI: Session Layer

Firewall Architecture: Screened Subnet
OSI: Transport Layer

IDS: Second Line of Defense
OSI: Network Layer

IPS: Last Line of Defense?
OSI: Data-Link Layer

HIPS
OSI: Physical Layer

Unified Threat Management (UTM)
Devices Work at Different Layers

UTM Product Criteria
Repeaters

Network Protocols
Switches

Port and Protocol Relationship
Virtual LAN’s

Internet Protocol: IPv4
Routers

UDP vs. TCP
Gateways

TCP / IP Suite
Bastion Hosts

Protocols: ARP
Firewalls

Protocols: ICMP
Firewall – First Line of Defense

Protocols: SNMP
Firewall Types: Packet Filtering

Protocols: SMTP
Firewall Types: Proxies

Protocols: FTP, TFTP and Telnet
Firewall Types: Circuit-Level Proxies

Network Services: DNS
Firewall Types: Application-Layer Proxies

Section Summary

Module 11: Telephony, VPN’s and Wireless



PSTN

802.11i / WPA2
Remote Access

WPA and WPA2 Mode Types
Dial-Up and Authentication Protocols

WPA – PSK Encryption
Dial-Up Protocol: PPP

Wireless Technologies: WAP
Authentication Protocols: PAP and CHAP

Wireless Technologies: WTLS
Authentication Protocol: EAP

Wireless Technologies: Common Attacks
Voice Over IP (VOIP)

Kismet
Virtual Private Network Technologies

Wireless Technologies: Countermeasures
What is a Tunneling Protocol?

Network-Based Attacks
Tunneling Protocols: PPTP

Network-Based Attack Types
Tunneling Protocols: L2TP

Network-Based Attacks: Additional Types
Tunneling Protocols: IPSec

Host Name resolution Attacks
IPSec: Network Layer Protection

Watching Network Traffic
SSL / TLS

Network Traffic Analysis
Wireless Technologies: Access Point

DDoS Issues
Wireless Network Topologies

Man-in-the-Middle Attacks
Types of Wireless Networks

Traceroute Operations
Wireless LAN Security

Section Summary

Module 12: Security Architecture



ESA Definition

Disclosing Data in an Unauthorized Manner
What is Architecture?

Circumventing Access Controls
Architecture Components

Attacks: Overview
Key Architecture Concepts: Planning

Types of Attacks: Race Condition
Objectives of Security Architecture

Types of Attacks: Data Validation
Technology Domain Modeling

How Buffers and Stacks are Supposed to Work
Integrated Security is Designed Security

Types of Attacks: Buffer Overflows
Security by Design

How a Buffer Overflow Works
Architecture Models

Attack Characteristics
Virtual Machines

Escalation of Privilege
Cloud Computing

Section Summary
Types of Compromises



Module 13: Software Development Security



Device vs. Software Security

Modularity of Objects
Why Are We Not Improving at a Higher Rate?

Object-Oriented Programming Characteristics
Where to Implement Security

Module Characteristics
Security Objectives

Linking Through COM
Security of Embedded Systems

Mobile Code with Active Content
Security in the Steps of the SDLC

World Wide Web OLE
Verification vs. Validation

ActiveX Security
Evaluating the Resulting Product

Java and Applets
Development Methodologies

Common Gateway Interface (CGI)
Maturity Models

How CGI Scripts Work
Security Issues

Internet Cookies
OWASP Top 10

Section Summary

Module 14: Database Security



Database Models: Overview

Database Security Issues
Database Models: Hierarchical

Database Security Mechanisms
Database Models: Distributed

Database Integrity
Database Models: Relational

Database Data Integrity Controls
Database Models: Relational Components

Add-On Security
Database Systems

Controlling Access
Foreign Key

Artificial Intelligence
Database Components

Expert System Components
Data Warehousing / Big Data

Artificial Neural Networks
Data Mining

Section Summary

Module 15: Malware and Software Attacks



Malware: Malicious Software

Phishing
Malware: Viruses

Spear Fishing / Whaling
Malware: Additional Examples

Replay Attacks
Rootkits and Backdoors

Timing Attacks
Email Bombing

Types of Advanced Attacks
Email Links

Section Summary

Module 16: Business Continuity



Phases of the Plan

Other Offsite Approaches
Who is Ready?

Choosing a Site Location
Components of the Business Continuity Plan (BCP)

Creating the Plan
BCP Development

Defining the Plan Objectives
The BCP Committee

Defining Roles
BCP Risk Analysis

Returning to Normal Operation
Identifying Vulnerabilities and Threats

Proper Planning
Threat Categories

Preventing a Disaster
How to Identify the Most Critical Company Functions

Preventative Measures
Interdependencies

Redundant Servers
How Long Can the Company be Without Resources?

Co-Locations
Calculating MTD

Emergency Response
Recovery Point Objective

When is the Danger Over?
Items to Consider for Recovery

Testing and Drills
Facility Back-Ups: Hot Site

Choosing the Right Type of Test
Facility Back-Ups: Warm Site

BCP Plans: Commonly Out of Date
Facility Back-Ups: Cold Site

What is Success?
Compatibility Issues with Offsite Facility

Section Summary
Subscription Costs



Module 17: Incident Management



Seriousness of Computer Crimes

Security Principles for International Use
Incidents

Determining if a Crime Has Been Committed
Incident Management Priorities

Investigation of Any Crime
Incident Response Capability

Trying to “Trap the Bad Guys”
Preparing for an Incident Before it Happens

Role of Evidence in an Investigation
Incident Response Phases

General Rules for Evidence
Companies Can be Found Liable

Evidence Requirements
Foundational Concepts of Law

Evidence Collection
Common Laws: Criminal

Chain of Custody
Common Laws: Civil

Computer Forensics
Common Laws: Administrative

How is Evidence Processed?
Intellectual Property Laws

Types of Evidence
Software Licensing

Hearsay Rule Exception
Digital Millennium Copyright Act

Privacy of Sensitive Data
Historic Examples of Computer Crimes

Privacy Issues: US Laws as Examples
The Evolving Threat

European Union Principles on Privacy
Types of Motivation for Attacks

Routing Data Through Different Countries
Types of Attacks

Employee Privacy Issues
Telephone Fraud

Ethics: Computer Ethics Institute
Identification Protection and Prosecution

Ethics: Internet Architecture Board
Computer Crime and Its Barriers

Section Summary

Module 18: Physical Security



Physical Security: Threats

Intrusion Sensors
Different Types of Threats and Planning

Facility Attributes
Facility Site Selection

Electrical Power
Facility Construction

Problems with Steady Power Current
Controlling Access

Power Interference
Access and Fire Control

Power Preventive Measures
External Boundary Protection

Environmental Considerations
Types of Locks

Fire Prevention
Facility Access

Automatic Detection Mechanisms
Piggybacking

Fire Detection Devices
Securing Mobile Devices

Types of Fires
Perimeter Protection: Fencing

Fire Suppression Systems
Perimeter Protection: Lighting

Types of Fire Extinguishers
Perimeter Security: Security Guards

Section Summary


REGISTER NOW FOR YOUR CYBER SECURITY CERTIFICATION

 Electronic Registration & Payment

 Check / Purchase Order (Please contact Michael I. Kaplan via email or phone.)
 - PHONE: (912) 244-0394