seela logo

Information Systems Security Manager (ISSM) Training

Do you want to challenge yourself with complex IT projects? Are you interested in technology watch? You have an analytical and rigorous mind. Stress and pressure management are part of your skills? What if you were to consider a career as an information systems security manager?
rssi

CISO training with CyberTraining

Our training programs are designed to train all profiles in the professional skills of the CISO profession.

100% online

Theory & Practice

Customized by level

logo cyber training

Cyber training platform

CISO course

Follow a specific training course for the CISO profession, adapted to your pace and level.

1

Introduction to cybersecurity

44 lessons - 23 h

3

Risk management

9 lessons - 2 hours

5

Operations Centre

12 lessons - 5 h

7

Supervision

10 lessons - 4.5 h

9

Cyber defense and attack tools

4 lessons - 1,5 h

11

Operating System

17 lessons - 5.2 hours

2

Identity Access Management

3 lessons - 3,5 h

4

Network infrastructures

9 lessons - 1,5 h

6

The Cloud

23 lessons - 6.5 h

8

Virtualization

8 lessons - 2 hours

10

Standards and regulations

7 lessons - 2 hours

1

Introduction to cybersecurity

44 lessons - 23 h

2

Identity Access Management

3 lessons - 3,5 h

3

Risk management

9 lessons - 2 hours

4

Network infrastructures

9 lessons - 1,5 h

5

Operations Centre

12 lessons - 5 h

6

The Cloud

23 lessons - 6.5 h

7

Supervision

10 lessons - 4.5 h

8

Virtualization

8 lessons - 2 hours

9

Cyber defense and attack tools

33 lessons - 8.5 h

10

Standards and regulations

7 lessons - 2 hours

11

Operating System

17 lessons - 5.2 hours

Download the CISO training program

Find the complete details of all the courses given in this RSSI training

RSSI program

Key lessons

Cybersecurity by Cisco
EBIOS Risk Manager
ICS / SCADA
Safety approval
Security Operation Center
ISO 27000 standards

Updated: 01/12/2022
Service access times

+ 69h

Of course

objectives

Objectives

  • Demonstrate a good knowledge of the organization's issues and businesses
  • Demonstrate its ability to build the organization's cybersecurity strategy
  • Demonstrate knowledge of key cybersecurity threats
  • Have a general knowledge of Information Systems and architecture principles
  • Master the fundamentals in the main areas of ISS
  • Demonstrate knowledge of security technologies and associated tools
  • Be able to implement a Cybersecurity and ISMS policy and map risks
  • Demonstrate legal knowledge of IT law related to IS security and data protection
  • Demonstrate knowledge of the major stages of Cyber crisis management
  • Ensure governance missions in compliance with norms and standards in the field of security: ISO norms (2700X), industry standards (PCI-DSS...)
objectives

Prerequisites

  1. Operating system basics: Understanding of Windows and Linux functionalities, and ability to perform common tasks.
  2. Network basics: knowledge of IP addresses, TCP/IP, DNS and DHCP.
  3. Use of IT tools: Proficiency in web browsing and the use of office suites.
placement test

Positioning test

In 1ʳᵉ step of your pathway, you complete a one-hour placement test that will give your starting point for the training. This course is broken down into 3 levels: 

  • Beginner (69 hours)
  • Intermediate (65 hours)
  • Advanced (20 hours)
practice and training

Practice & training

In order to deepen your knowledge and ensure the assimilation of the new notions acquired, you will practice on practical cases throughout your training. 

In a TD, TP or CTF format, you will apply your newly acquired knowledge during a practical case with a real situation on the CyberRange.

26 hours of training available in this course. 

What is a
CISO?

What is an Information Systems Security Manager (ISSM)?

The information systems security officer (ISSO) is responsible for ensuring that the organization's information systems are protected from unauthorized access, use, or abuse. Responsibilities include identifying risks, assessing vulnerabilities, implementing policies and procedures, monitoring system activity, and reviewing security controls. The CISO is also responsible for ensuring that the organization complies with industry standards and regulations related to information security management.

The CISO is also responsible for defining strategic cybersecurity goals and objectives, protecting data and systems against attacks by implementing IT security measures, spreading an information security culture among users and decision-makers, ensuring the application of information systems security policies and rules with respect to third parties and subcontractors, setting up a security crisis management system and contributing to the management of security incidents and crises. Finally, the CISO must understand how industry regulations affect the organization's security requirements and be able to provide advice and recommendations on how to comply with them.

💡 To summarize: 

He/she is the cybersecurity pilot for an organizational and/or geographical perimeter within the company.

Activities and tasks of a CISO

Identify

  • To define the strategic cybersecurity axes and objectives for its perimeter and to have them validated by the competent management
  • Identify the major security issues and risks within its perimeter
  • Implement and maintain the IS security policy in collaboration with the stakeholders
  • Define an annual or multi-year action plan for its perimeter
  • Define an investment policy with regard to security objectives
  • Contribute to the definition of the cybersecurity organization within its perimeter and lead it
  • Follow the regulatory and technical evolutions of its domain; ensure the relations with the actors of its sector of activity around the cyber security

protect

  • Organize the steering structures of the security action plans within the entities
  • Define the organizational and technical measures to be implemented to achieve the security objectives
  • Provide implementation support by providing technical and methodological assistance as well as security tools and services, possibly through a service catalog
  • Disseminate an IS culture to users and decision-makers
  • Ensure the promotion of IT security charters within its scope
  • Evaluate the level of security within its perimeter, in particular through periodic audits and
    of permanent controls
  • Control that IS security policies and rules are applied within its perimeter and with respect to third parties and subcontractors
  • Contribute to answering requests from prospects and customers of the organization on security aspects
    (particularly in the context of calls for tender)

detect

  • Take technical and/or organizational measures to monitor security events, assess security incidents and react to attacks, ensure the implementation of a SOC (Security Operation Center)

answer

  • Ensure that the security crisis management system is operational
  • Contribute to the management of security incidents and crises, if necessary in conjunction with the CSIRT (Computer Security Incident Response Team)

ensure continuity and rebuild

  • Prepare and implement an IT continuity plan, as part of the business continuity plan (BCP)
  • Prepare and implement an IT recovery plan, as part of the Business Recovery Plan (BRP)
  • Propose the cyber-resilience strategy

report

  • Regularly report to his/her hierarchy on the current level of coverage of IS security risks
  • To ensure a role of advice to its hierarchy and the trades of its perimeter
  • Represent the organization in relations with regulatory authorities

Advantages of the CISO job

  1. Career opportunities: The CISO profession is in demand and offers good career opportunities, with the possibility of advancing to management positions.
  2. High salary: The CISO often enjoys a high salary due to the strategic importance of his role and the demand for this type of professional.
  1. Possibility of working in different sectors: The CISO can work in many different sectors, such as the financial sector, industry, information and communication technologies, etc.
  2. Ability to work remotely: Due to the nature of their work, CISOs may frequently work remotely or telecommute, which can be an advantage for some professionals.

If you are a beginner and want to get started in the field of cybersecurity and hacking, we recommend you start with CyberTraining, our online training platform. CyberTraining is designed to teach you the fundamental concepts of cybersecurity through interactive lessons and hands-on exercises. You will discover how cyber attacks work and how to prevent them by practicing the techniques you learn.

With CyberTraining, you can develop your cybersecurity skills at your own pace and complete in-depth training paths. After completing CyberTraining lessons, you'll be ready to move on to BattleH4ck, our CTF platform that allows you to test and develop your cyber security skills by solving exciting challenges. Join CyberTraining to start your cybersecurity training journey and become a computer security expert.

The CISO training with CyberTraining is 100% online and customized by level. It is composed of several tracks, including introduction to cyber security, risk management, supervision, cyber defense and attack tools, cloud, virtualization, standards and regulations, among others. Learners also have the opportunity to practice and train on practical cases throughout the course.

A CISO must demonstrate a good knowledge of the organization's issues and businesses, his ability to build the organization's cybersecurity strategy, his knowledge of the main cybersecurity threats, his general knowledge of Information Systems and architecture principles, his mastery of the fundamentals in the main areas of IS, his knowledge of security technologies and associated tools, His/her ability to implement a Cybersecurity and ISMS policy and to map the risks, his/her legal knowledge in terms of IT law related to IS security and data protection, his/her knowledge of the main steps of Cyber crisis management, and finally, the ability to ensure governance missions in compliance with the norms and standards in the field of security: ISO standards (2700X), industry standards (PCI-DSS...).

The placement test for the RSSI course lasts one hour and allows us to determine the learner's starting level. The course is divided into three levels: beginner (69 hours), intermediate (65 hours) and advanced (20 hours).

Yes, CyberTraining offers discounts to students. If you are a student, you can get a 30% discount on your CyberTraining subscription. Simply provide proof of your student status to take advantage of this exclusive discount at student@seela.io

By subscribing to CyberTraining as a student, you will have access to all the features of the cybersecurity training platform.

  1. Operating system basics :

    • Understanding of Windows and Linux (e.g. Ubuntu) functionalities and user interface.
    • Ability to perform routine tasks such as managing files, folders and programs.
  2. Network basics :

    • Understanding of IP addresses, subnet mask and default gateway.
    • Knowledge of basic TCP/IP principles and DNS and DHCP protocols.
  3. Use of IT tools :

    • Ability to use a web browser to search for information and access online sites.
    • Knowledge of common productivity tools such as office suites (Microsoft Office, LibreOffice).
  4. Device and printer management :

    • Know how to connect and configure peripherals such as printers, keyboards and mice.
    • Ability to solve common peripheral problems.
  5. Basic computer security :

    • Awareness of IT security risks such as malware and phishing attacks.
    • Knowledge of best practices for maintaining a secure IT environment (strong passwords, regular updates).

Download the training program

To access the course details and pedagogical objectives

Mail

information@seela.io