Define, implement, and manage an information security governance program that includes leadership, organizational structures and processes.
Assess the major enterprise risk factors for compliance.
Design and develop a program to monitor firewalls and identify firewall configuration issues.
Identify vulnerability and attacks associated with wireless networks and manage different wireless network security tools.
Identify vulnerability and attacks associated with wireless networks and manage different wireless network security tools.
Identify the volatile and persistent system information.
Develop and manage an organizational digital forensic program.
Identify the best practices to acquire, store and process digital evidence.
EC-Council’s Certified Chief Information Security Officer (CCISO) Program has certified leading information security professionals around the world. A core group of high-level information security executives, the CCISO Advisory Board, formed the foundation of the program and outlined the content covered by the exam, body of knowledge, and training. Some members of the Board contributed as authors, others as exam writers, others as quality assurance checks, and still others as instructors. Each segment of the program was developed with the aspiring and sitting CISO in mind and looks to transfer the knowledge of seasoned executives to the next generation of leaders in the areas that are most critical in the development and maintenance of a successful information security program.
The CCISO certification will entitle him with the most aspiring title of being an information security professional. The certification will validate and upgrade your skills to use the devices used in CISO systems for communication.
The CCISO Certification is an industry-leading program that recognizes the real-world experience necessary to succeed at the highest executive levels of information security. Bringing together all the components required for a C-Level position, the CCISO program combines audit management, governance, IS controls, human capital management, strategic program development, and the financial expertise vital to leading a highly successful IS program. The job of the CISO is far too important to be learned by trial and error. Executive-level management skills are not areas that should be learned on the job.
The material in the CCISO Program assumes a high-level understanding of technical topics and doesn’t spend much time on strictly technical information, but rather on the application of technical knowledge to an information security executive’s day-to-day work. The CCISO aims to bridge the gap between the executive management knowledge that CISOs need and the technical knowledge that many sitting and aspiring CISOs have. This can be a crucial gap as a practitioner endeavor to move from mid-management to upper, executive management roles. Much of this is traditionally learned as on-the-job training, but the CCISO Training Program can be the key to a successful transition to the highest ranks of information security management.
Organizations stand to gain in many ways by hiring a CCISO professional who generally assumes the duties of top-level information security executives. These benefits are enlisted below:
The credential helps in the application of technical knowledge to an information security executive’s daily work as well as fills the gap between the required executive management knowledge and the technical know-how that aspiring CISOs have.
The C|CISO is ideal for those working in positions such as, but not limited to:
Domain 2: Information Security Controls,
Compliance, and Audit Management
Domain 3: Security Program Management & Operations
Domain 4: Information Security Core Competencies
Domain 5: Strategic Planning, Finance, Procurement and Vendor Management
Waivers for the CCISO are available to
Self-Study Candidates
Domain |
Education Waivers |
1. Governance and Risk Management |
Ph.D. Information Security – 3 years,
MS Information Security Management, MS Information Security Engineering – 2
years, BS Information Security – 2 years |
2. Information Security Controls,
Compliance, and Audit Management |
Ph.D. Information Security – 3 years,
MS Information Security Management, MS Information Security Engineering – 2
years, BS Information Security – 2 years |
3. Security Program Management &
Operations |
Ph.D. Information Security – 3 years,
MS Information Security or MS Project Management – 2 years, BS Information
Security – 2 years |
4. Information Security Core
Competencies |
Ph.D. Information Security – 3 years,
MS Information Security – 2 years, BS Information Security – 2 years |
5. Strategic Planning, Finance,
Procurement, and Vendor Management |
CPA, MBA, M. Fin. – 3 years |