Chief Information Security Officer (CISO)

Define, implement, and manage an information security governance program that includes leadership, organizational structures and processes.

Assess the major enterprise risk factors for compliance.

Design and develop a program to monitor firewalls and identify firewall configuration issues.

Identify vulnerability and attacks associated with wireless networks and manage different wireless network security tools.

Identify vulnerability and attacks associated with wireless networks and manage different wireless network security tools.

Identify the volatile and persistent system information.

Develop and manage an organizational digital forensic program.

Identify the best practices to acquire, store and process digital evidence.

Request more information

We'll connect you at the earliest
Chief Information Security Officer (CISO)
Chief Information Security Officer (CISO)

Tools Covered in this Course

Course Details

CISO Overview:

EC-Council’s Certified Chief Information Security Officer (CCISO) Program has certified leading information security professionals around the world. A core group of high-level information security executives, the CCISO Advisory Board, formed the foundation of the program and outlined the content covered by the exam, body of knowledge, and training. Some members of the Board contributed as authors, others as exam writers, others as quality assurance checks, and still others as instructors. Each segment of the program was developed with the aspiring and sitting CISO in mind and looks to transfer the knowledge of seasoned executives to the next generation of leaders in the areas that are most critical in the development and maintenance of a successful information security program.

The CCISO certification will entitle him with the most aspiring title of being an information security professional. The certification will validate and upgrade your skills to use the devices used in CISO systems for communication.

Why CCISO?

The CCISO Certification is an industry-leading program that recognizes the real-world experience necessary to succeed at the highest executive levels of information security. Bringing together all the components required for a C-Level position, the CCISO program combines audit management, governance, IS controls, human capital management, strategic program development, and the financial expertise vital to leading a highly successful IS program. The job of the CISO is far too important to be learned by trial and error. Executive-level management skills are not areas that should be learned on the job.

The material in the CCISO Program assumes a high-level understanding of technical topics and doesn’t spend much time on strictly technical information, but rather on the application of technical knowledge to an information security executive’s day-to-day work. The CCISO aims to bridge the gap between the executive management knowledge that CISOs need and the technical knowledge that many sitting and aspiring CISOs have. This can be a crucial gap as a practitioner endeavor to move from mid-management to upper, executive management roles. Much of this is traditionally learned as on-the-job training, but the CCISO Training Program can be the key to a successful transition to the highest ranks of information security management.

Objective:-

Organizations stand to gain in many ways by hiring a CCISO professional who generally assumes the duties of top-level information security executives. These benefits are enlisted below:

  • Assurance regarding the requisite skills to identify an organization’s operational risk factors and developing the necessary safeguards to manage those risks.
  • Designing infosec programs to avert security violations as well as leading a team of information security professionals.

The credential helps in the application of technical knowledge to an information security executive’s daily work as well as fills the gap between the required executive management knowledge and the technical know-how that aspiring CISOs have.

Who should attend:-

The C|CISO is ideal for those working in positions such as, but not limited to:

  • Chief Information Security Officer/CTO
  • IT Director/Manager
  • Security Manager
  • Security Consultant
  • Security Auditor
  • Security Analyst
  • Security Systems Engineer
  • Network Architect
  • Security Architect

Domain 1: Governance and Risk Management

  1. Define, Implement, Manage, and Maintain an Information Security Governance Program
  2. Information Security Drivers
  3. Establishing an information security management structure
  4. Laws/Regulations/Standards as drivers of Organizational Policy/Standards/Procedures
  5. Managing an enterprise information security compliance program
  6. Introduction to Risk Management

Domain 2: Information Security Controls, Compliance, and Audit Management

  1. Information Security Controls
  2. Compliance Management
  3. Guidelines, Good and Best Practices
  4. Audit Management

Domain 3: Security Program Management & Operations

  1. Program Management
  2. Operations Management

Domain 4: Information Security Core Competencies

  1. Access Control
  2. Physical Security
  3. Network Security
  4. Certified Chief
  5. Endpoint Protection
  6. Application Security
  7. Encryption Technologies
  8. Virtualization Security
  9. Cloud Computing Security
  10. Transformative Technologies

Domain 5: Strategic Planning, Finance, Procurement and Vendor Management

  1. Strategic Planning
  2. Designing, Developing and Maintaining an Enterprise Information Security Program
  3. Understanding the Enterprise Architecture (EA)
  4. Finance
  5. Procurement
  6. Vendor Management
  7. Summary

 

Waivers for the CCISO are available to Self-Study Candidates

Domain

Education Waivers

1. Governance and Risk Management

Ph.D. Information Security – 3 years, MS Information Security Management, MS Information Security Engineering – 2 years, BS Information Security – 2 years

2. Information Security Controls, Compliance, and Audit Management

Ph.D. Information Security – 3 years, MS Information Security Management, MS Information Security Engineering – 2 years, BS Information Security – 2 years

3. Security Program Management & Operations

Ph.D. Information Security – 3 years, MS Information Security or MS Project Management – 2 years, BS Information Security – 2 years

4. Information Security Core Competencies

Ph.D. Information Security – 3 years, MS Information Security – 2 years, BS Information Security – 2 years

5. Strategic Planning, Finance, Procurement, and Vendor Management

CPA, MBA, M. Fin. – 3 years


FAQ