Certified Information Security Officer (CCISO)
-
COURSE DATES AND LOCATIONS
DATE
Duration
LOCATION
FEES
Book Now
-
INTRODUCTION
The CCISO Certification is an industry-leading program that recognizes the real-world experience necessary to succeed at the highest executive levels of information security.The CCISO certification training is aimed at providing the learners with comprehensive knowledge and skills regarding the information security domain. The Chief Information Security Officer Certification Training covers vital areas such as policy setting, project management, audit management, executive strategy, contract management, and financial expertise.
-
COURSE OBJECTIVES
By the end of the course, you‘ll be able to:
- Governance
- Security Risk Management, Controls, and Audit Management
- Security Program Management and Operations
- Information Security Core Concepts
- Strategic Planning, Finance, and Vendor Management
-
COURSE AUDIENCE
This course is made for
- Network Engineers with security specialization
- Experienced IT Professionals
- Web application developers
- Architects
-
COURSE OUTLINE
Day One
Governance (Policy, Legal, and Compliance)
- Information Security Management Program
- Defining an Information Security Governance Program
- Regulatory and Legal Compliance
- Risk Management
Day Two
Management Controls and Auditing Management
- Designing, deploying, and managing security controls
- Understanding security controls types and objectives
- Implementing control assurance frameworks
- Understanding the audit management process
Day Three
Security Program Management & Operations
- The role of the CISO
- Information Security Projects
- Integration of security requirements into other operational processes (change management, version control, disaster recovery, etc.)
Day Four
Information Security Core Concepts
- Access Controls
- Physical Security
- Disaster Recovery and Business Continuity Planning
- Network Security
- Threat and Vulnerability Management
- Application Security
- System Security
- Encryption
- Vulnerability Assessments and Penetration Testing
- Computer Forensics and Incident Response
Day Five
Strategic Planning, Finance, & Vendor Management
- Security Strategic Planning
- Alignment with business goals and risk tolerance
- Security emerging trends
- Key Performance Indicators (KPI)
- Financial Planning
- Development of business cases for security
- Analyzing, forecasting, and developing a capital expense budget
- Analyzing, forecasting, and developing an operating expense budget
- Return on Investment (ROI) and cost-benefit analysis
- Vendor management
- Integrating security requirements into the contractual agreement and procurement process