Course Code: 2397

CSLO - Certified Security Leadership Officer

Class Dates:
5 Days
Class Time:
Virtual Instructor-Led Training, Instructor-Led Training


  • Course Overview
  • The Certified Security Leadership Officer course is designed to give management an essential understanding of current security issues, best practices, and technology. Because a C)SLO understands security, he or she is prepared to manage the security component of a business and its information technology security projects. A C)SLO can be seen as the bridge between those who understand security and those who don’t. These skills can be put to use the day the a C)SLO returns to work.
    Essentials topics covered in this management track include:
    Network Fundamentals and Applications, Hardware Architecture, Information Assurance Foundations, Computer Security Policies, Contingency and Continuity Planning, Business Impact Analysis, Incident Handling, Architectural Approaches to Defense in Depth, Cyber Attacks, Vulnerability Assessment and Management, Security Policies, Web Security, Offensive and Defensive Information Warfare, culminating with Management Practicum 40 CPE Credits
  • Audience
  • Accreditation: The National Security Agency has validated the C)SLO for the following security standard: CNSSI-4014: Information Assurance Training Standard for Information Systems Security Officers.

    Who Should Attend The C)SLO is a course on cyber security designed for those who want to lead. If you are currently in charge of a company's security or are preparing to be a leader in the near future, the Certified Security Leadership Officer course and certification will prepare you to excel in your responsibilities.
    After you complete the C)SLO course and get certified, we recommend you to further develop your security skillset by being certified as a C)IHE: Certified Incident Handling Engineer, which will prepare you to handle the toughest security situations effectively.
    Target: IT Employees
    IT Management


  • Prerequisites: One year of IT Employment
    OR C)ISSO: Information Systems Security Officer

Course Details

  • Upon Completion
  • Have knowledge to understand current security issues
  • Have knowledge to manage security component of projects
  • Be ready to sit for the C)SLO Exam
  • Course Content
  • Wireless Networks 802.11
  • Access Control
  • Computer Forensics and Legalities
  • Cryptography Applications
  • Cryptography Algorithms and Concepts
  • Key Management
  • Cryptosystems
  • Digital Acquisition
  • Domain Name Registration
  • Disaster Recovery and Business Continuity Planning
  • Endpoint Security
  • Honeypots, Honeynets, Honeytokens, Tarpits, ohmy
  • .
  • IP Terms and Concepts
  • Logging
  • Malicious Software
  • Managing Security Policy
  • Methods of Attack
  • Mitnick-Shimomura
  • Physical Security
  • Risk Management & Security Frameworks
  • Security and Organizational Structure
  • Security Awareness
  • Steganography
  • The Intelligent Network: Unified Threat Management (UTM)
  • .
  • Network Infrastructure
  • Vulnerability Assessment: Outside View
  • Vulnerability Management: Inside View
  • Vulnerability Management: User View
  • Web Communications
  • Wireless and Bluetooth Contrast
  • Class Format Options
  • 1.Instructor-led Classroom: Attend in person.
  • 2.Live-virtual Training: Attend the Instructor-led class remotely.
  • 3.Computer-based Training: Access the course through pre-recorded videos 24/7 at your convenience.