Certified Chief Information Security Officer (inclusive of certification exam voucher)

Type
Virtual
Classroom ILT
Skill Level

Available dates
Learning Path
Virtual
Duration
1 Day

TYPE
Virtual
Classroom ILT
LEARNING PATH
SKILL LEVEL

DURATION
AVAILABLE DATES
Introduction:
The CCISO Certification is an industry-leading program that recognizes the real-world experience necessary to succeed at the highest executive levels of information security. Bringing together all the components required for a C-Level position, the CCISO program combines audit management, governance, IS controls, human capital management, strategic program development, and the financial expertise vital to leading a highly successful IS program. Material in the CCISO Program assumes a high-level understanding of technical topics and doesn’t spend much time on strictly technical information, but rather on the application of technical knowledge to an information security executive’s day-to-day work. The CCISO aims to bridge the gap between the executive management knowledge that CISOs need and the technical knowledge that many aspiring CISOs have. This can be a crucial gap as a practitioner endeavours to move from mid-management to upper, executive management roles. Much of this is traditionally learned as on the job training, but the CCISO Training Program can be the key to a successful transition to the highest ranks of information security management.
Audience profile:
This course is best suited for professionals who aspire to attain the highest regarded title within the information security profession – Certified Chief Information Security Officer.
Pre-requisites:
There are no formal prerequisites to sit on the course however there are prerequisites to be met when taking the CCISO exam.
Upon completing this course, the learner will be able to:
- Define, implement, and manage an information security governance program that includes leadership, organizational structures and processes.
- Establish information security management structure.
- Assess the major enterprise risk factors for compliance.
- Design and develop a program to monitor firewalls and identify firewall configuration issues.
- Identify vulnerability and attacks associated with wireless networks and manage different wireless network security tools.
- Deploy and manage anti-virus systems.
- Understand various system-engineering practices.
- Identify the volatile and persistent system information.
- Develop and manage an organizational digital forensic program.
- Identify the best practices to acquire, store and process digital evidence.
- Define key performance indicators and measure effectiveness on continuous basis.
- Allocate financial resources to projects, processes and units within information security program.
- Identify and report financial metrics to stakeholders.
- Design vendor selection process and management policy.
Domain 1: Governance (Policy, Legal & compliance)
Session 1: Definitions |
|
|
|
|
|
Session 2: Information Security Management Program | |
|
|
|
|
|
|
|
|
|
|
|
|
Session 3: Information Security Laws, Regulations & Guidelines | |
|
|
|
|
Session 4: Privacy Laws | |
|
|
|
|
Domain 2 –IS Management Controls and Auditing
Session 5: Design, Deploy, and Manage Security Controls in Alignment with Business Goals, Risk Tolerance, and Policies and Standards |
|
|
|
Session 6: Information Security Risk Assessment | |
|
|
|
|
Session 7: Risk Treatment | |
|
|
|
|
Session 8: Residual Risk | |
Session 9: Risk Acceptance | |
Session 10: Risk Management Feedback Loops | |
|
|
Session 11: Business Goals | |
|
|
Session 12: Risk Tolerance | |
Session 13: Policies and Standards | |
Session 14: Understanding Security Controls Types and Objectives:
Management Controls, Technical Controls, Policy and Procedural Controls, Organization Controls, and more |
|
|
|
|
|
|
|
Session 15: Implement Control Assurance Framework to: Define Key Performance Metrics (KPIs), Measure and Monitor Control Effectiveness, and Automate Controls | |
Session 16: COBIT (Control Objectives for Information and Related Technology) | |
Session 17: BAI06 Manage Changes | |
|
|
|
|
|
|
Session 18: COBIT 4.1 vs. COBIT 5 | |
Session 19: ISO 27001/27002 | |
|
|
Session 20: Automate Controls | |
Session 21 : Wrap-up | |
Session 22 : Understanding the Audit Management Process | |
|
|
|
|
|
|
|
|
Session : 23 Conclusion | |
Domain 3: Management – Projects & Operations
Session 24: The Role of the CISO |
|
|
|
|
|
|
|
Session 25: Information Security Projects | |
|
|
|
|
Session 26: Security Operations Management | |
|
|
|
|
|
|
Domain 4: Information Security Core Competencies
Session 27: Access Control |
|
|
|
|
|
|
|
Session 28: Physical Security | |
|
|
|
|
|
|
|
|
Session 29: Disaster Recovery | |
|
|
|
|
|
|
|
|
Session 30: Network Security | |
|
|
|
|
|
|
|
|
|
|
Session 31: Threat and Vulnerability Management | |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Session 32: Application Security | |
|
|
|
|
|
|
|
|
Session 33: Systems Security | |
|
|
|
|
|
|
|
|
|
|
Session 34: Encryption | |
|
|
|
|
|
|
Session 35: Computer Forensics and Incident Response | |
|
|
|
|
|
|
|
|
Domain 5: Strategic Planning & Finance
Session 36: Alignment with Business Goals and Risk Tolerance
|
|
|
|
Session 37: Relationship between Security, Compliance, & Privacy | |
Session 38: Leadership | |
|
|
|
|
|
|
|
|
|
|
|
|
Session 39: Enterprise Information Security Architecture (EISA) Models, Frameworks and Standards | |
|
|
|
|
|
|
|
|
|
|
Session 40: Emerging Trends in Security | |
|
|
|
|
|
|
|
|
|
|
|
|
Session 41: It’s all about the Data (Stradley 2009) | |
|
|
|
|
|
|
|
|
Session 42: Systems Certification and Accreditation Process | |
|
|
|
|
|
|
Session 43: Resource Planning | |
|
|
|
|
|
|
Session 44: Financial Planning | |
|
|
|
|
|
|
Session 45: Procurement | |
|
|
Session 46: Vendor Management | |
|
|
|
|
Session 47: Request for Proposal (RFP) Process | |
|
|
|
|
|
|
|
|
|
|
Session 48: Integrate Security Requirements into the Contractual Agreement and Procurement Process | |
|
|
|
|
|
|
|
|
|
|
Session 49: Statement of Work | |
Session 50: Service Level Agreements-What is an SLA? | |
|
|
|
|
|
|
|
|
|
|
Associated certifications and exam:
The exam focuses on scenario-based questions that require applicants to apply their real-world experience in order to answer the questions successfully. To that end, in order to qualify to sit for the CCISO Exam, applicants must be approved by EC-Council in order to verify that they have at least five years of information security management experience in each of the five CCISO domains. Applicants with experience in three or less of the CCISO domains must first complete an Exam Eligibility Application and submit this to EC-Council for approval before attempting the exam – Exam Eligibility Application
Applicants who do not meet these requirements have the option of sitting for the EC-Council Information Security Manager (E|ISM) exam as part of the Associate CCISO Program. This option is available to candidates who do not yet possess the required years of experience. Associate CCISOs may sit for official CCISO training and then take and pass the EC-Council Information Security Manager (EISM) exam to enter the program at the associate level. Once the prerequisite years of experience have been completed, Associate CCISOs may take the full CCISO exam and earn the full certification.
CCISO Exam Info:
Number of Questions: 250
Passing Score: 70%
Test Duration: 4 Hours
Test Format: Multiple Choice
EISM Exam Info:
Number of Questions: 150
Passing Score: 70%
Test Duration: 2 Hours
Test Format: Multiple Choice
On successful completion of this course students will receive a Torque IT attendance certificate
*When you attend any authorized EC Council training course at Torque IT you will receive the associated examination voucher as part of your course material. Your certification examination voucher can be used to book and pay for your certification examination at an Authorized EC Council Testing Center (ETC) only. If you are not able to sit your certification examination at Torque IT, and you have no other ETC locally available, you do have the ability to convert your examination voucher into a Pearson VUE examination voucher, at an additional cost.

EC-Council Overview
To beat a hacker, you need to think like one…
Ethical Hacking is the process of proactively penetrating systems, to which one has official permission to do so, with a view to determining whether vulnerabilities exist and then to undertake the necessary preventive, corrective, and protective countermeasures before an actual compromise to the systems can occur.
Torque IT’s authorised EC-Council training, and associated certification, solutions empower you to identify vulnerabilities and to assess the security posture of target systems. EC-Council certifications are universally recognised as demonstrating a high level of expertise and credibility for individuals and the organisations that employ them.
Torque IT being an EC-Council Accredited Training Center (ATC) has been the recipient of EC-Council’s most prestigious ATC of the year awards for 2016, 2014 and EC-Council’s Circle of Excellence Awards for 2015.
These achievements reflect our commitment to providing you with quality skills development, enablement, training, and certification solutions that demonstrate exceptional quality, depth and breadth.