EC-Council Certified Chief Information Security Officer (C|CISO)
The CCISO program is a first-of-its-kind training and certification course that aims to produce cybersecurity executives of the highest caliber and ethics.
Description
The CCISO Certification is an industry-leading program that recognizes the real-world experience necessary to succeed at the highest executive levels of information security. The CCISO program is a first-of-its-kind training and certification course that aims to produce cybersecurity executives of the highest caliber and ethics. Through the CCISO program, EC-Council will transfer the knowledge of experienced professionals to you, the next generation of leadership, by focusing on the most critical competencies required to develop and maintain a successful information security portfolio.
Course Content
Domain 1 – Governance
- Define, Implement, Manage, and Maintain an Information Security Governance Program
- Information Security Drivers
- Establishing an information security management structure
- Laws/Regulations/Standards as drivers of Organizational Policy/Standards/Procedures
- Managing an enterprise information security compliance program
- Risk Management
- Risk mitigation, risk treatment, and acceptable risk
- Risk management frameworks
- NIST
- Other Frameworks and Guidance (ISO 31000, TARA, OCTAVE, FAIR, COBIT, and ITIL)
- Risk management plan implementation
- Ongoing third-party risk management
- Risk management policies and processes
- Conclusion
Domain 2 - Security Risk Management, Controls, & Audit Management
- Information Security Controls
- Compliance Management
- TGuidelines, Good and Best Practices
- Audit Management
- Summary
Domain 3 - Security Program Management and Operations
- Program Management
- Operations Management
Domain 4 - Information Security Core Concepts
- Access Control
- Physical Security
- Network Security
- Endpoint Protection
- Application Security
- Encryption Technologies
- Virtualization Security
- Cloud Computing Security
- Transformative Technologies
Domain 5 - Strategic Planning, Finance, Procurement and Vendor Management
- TStrategic Planning
- Designing, Developing, and Maintaining an Enterprise Information Security Program
- Understanding the Enterprise Architecture (EA)
- Finance
- Procurement
- Vendor Management
- Summary