Information Systems Security Operations (ISSO-301)



Information Systems Security Operations (ISSO-301)

This is a closed class. It requires a contract. On-site for 22 people.

Days: 5 Days Labs: Yes –Local Cyber Range

Type of Course: Advanced  Security / Technical / Managerial / Programmers

Prerequisites: Introduction to Information Systems Security Operations (ISSO-INT)

About this course: Designed for the information systems security officer. Examines primarily a technical process that interfaces between the CISO and the information assurance professional, whereas security program management for chief information security officers is mostly a business process. Up-to-date replacement for the core concepts in both certifications of CISSP and CASP.

Goals: Advising senior leadership or authorizing official of changes affecting the organization’s information assurance posture, assuring successful implementation of security requirements and appropriate information technology policies and procedures consistent with the organization’s mission and goals.

Topics: Risk assessments, providing system related input on information assurance security requirements for procurement documents, evaluating cost-benefit and risk analysis in decision-making process, participating in the acquisition process, supply chain risk management practices, recommending resource allocations required to securely operate and maintain an organization, supervising incident response, ensuring protection and detection capabilities are acquired using the Information system security engineering approach, identifying security requirements in all phases of the system lifecycle, collecting and maintaining data needed to meet system information assurance reporting, remediation plans during risk assessments, audits, and inspections. Federal and organization-specific published documents, standard operating procedures concerning the security of network system operations, supporting necessary compliance activities.

Methods of instruction: There are 8 different possible exercises that can be used in a module. Some examples include: threats and controls, case studies, risk analysis practice, and reading review. Technical labs will require basic skills in operating systems and virtualization. As soon as students become too comfortable, the instructor will switch methods.

Students are expected to have basic experience in the areas of networking and DoD Cybersecurity as well as knowledge of related Cybersecurity policies and procedures.  Course support DISA responsibilities in DoD Cybersecurity Discipline Implementation Plan, DoD I 8551.01, the STIG’s and NIST SP800-53. The course covers topics in NICCS / NICE and ARTEP.