EC-Council's CCISO Program has certified leading information security professionals around the world. A core group of high-level information security executives, the CCISO Advisory Board, contributed by forming the foundation of the program and outlining the content that would be covered by the exam, body of knowledge, and training.
Each participant will leave with a recognised certificate
Some members of the Board contributed as authors, others as exam writers, others as quality assurance checks, and still others as trainers. Each segment of the program was developed with the aspiring CISO in mind and looks to transfer the knowledge of seasoned professionals to the next generation in the areas that are most critical in the development and maintenance of a successful information security program.
In this course, you will learn in-depth content in each of the 5 CCISO Domains:
Governance (Policy,Legal and Compliance) The first Domain of the C|CISO program is concerned with the following:
Information Security Management Program
Defining an Information Security Governance Program
Regulatory and Legal Compliance
IS Management Controls and Auditing Management
of the CCISO program, one of the cornerstones of any information security program, is concerned with the following:
Designing, deploying, and managing security controls
Understanding security controls types and objectives
Implementing control assurance frameworks
Understanding the audit management process
of the C|CISO program covers the day---to---day responsibilities of a CISO, including:
The role of the CISO
Information Security Projects
Integration of security requirements into other operational processes (change management, version control, disaster recovery, etc.)
of the CCISO program covers, from an executive perspective, the technical aspects of the CISO job including:
Disaster Recovery and Business Continuity Planning
Threat and Vulnerability Management
Vulnerability Assessments and Penetration Testing
Computer Forensics and Incident Response
of the CCISO program is concerned with the area with which many more technically inclined professionals may have the least experience, including:
Security Strategic Planning
Alignment with business goals and risk tolerance
Security emerging trends
Key Performance Indicators (KPI)
Development of business cases for security
Analyzing, forecasting, and developing a capital expense budget
Analyzing, forecasting, and developing an operating expense budget
Return on Investment (ROI) and cost-benefit analysis
Integrating security requirements into the contractual agreement and procurement process
Taken together, these five Domains of the C|CISO program translate to a thoroughly
knowledgeable, competent executive information security practitioner.
If you need training for 3 or more people, you should ask us about onsite training. Putting aside the obvious location benefit, content can be customised to better meet your business objectives and more can be covered than in a public classroom. It's a cost effective option.
Submit an enquiry from any page on this site, and let us know you are interested in the requirements box, or simply mention it when we contact you.
ITILv3, RESILIA, PRINCE2, PRINCE2 Agile, AgileSHIFT, MSP, M_o_R, P3M3, P3O, MoP, MoV courses on this page are offered by QA Affiliate of AXELOS Limited. ITIL, RESILIA, PRINCE2, PRINCE2 Agile, AgileSHIFT, MSP, M_o_R, P3M3, P3O,MoP, MoV are registered trademarks of AXELOS Limited. All rights reserved.