Sale!

Certified Information Security Officer Training and Certification in Pune

65,000.00

Get In Touch Call InfosavvyWhatsapp Infosavvy

CCISO Certification is an up skill to be succeeded at the highest levels of information security. It’s first of its kind training certification program aimed at producing top-level information security executives. It not only concentrates on technical knowledge but also on the application security management principles from an executive management point of view.

The program consists of three committees: Training, Body of Knowledge and the C|CISO Exam. Every element of this program was developed with the aspiring CISO keeping in minds and looks to spread the knowledge of seasoned professionals to the next generation in the arena that are most critical in the growth sector and maintenance of a successful information security program.

EC-Council Certified Chief Information Security Officer (C|CISO)

EC-Council’s CCISO Program has certified leading information security professionals around the world. A core group of high-level information security executives, the CCISO Advisory Board, contributed by forming the foundation of the program and outlining the content that would be covered by the exam, body of knowledge, and training. Some members of the Board contributed as authors, others as exam writers, others as quality assurance checks, and still others as trainers. Each segment of the program was developed with the aspiring CISO in mind and looks to transfer the knowledge of seasoned professionals to the next generation in the areas that are most critical in the development and maintenance of a successful information security program.

Domain  1  –  Governance  (Policy,  Legal,  and  Compliance)

The first Domain of the C|CISO program is concerned with the following:
• Information Security Management Program

• Defining an Information Security Governance Program

• Regulatory and Legal Compliance

• Risk Management

Domain  2  -­  IS  Management  Controls  and  Auditing  Management

Domain 2 of the CCISO program, one of the cornerstones of any information security program, is concerned with the following:
• Designing, deploying, and managing security controls

• Understanding security controls types and objectives

• Implementing control assurance frameworks

• Understanding the audit management process

Domain  3  of  the  C|CISO  program  covers  the  day-­?to-­?day  responsibilities  of  a  CISO,   including:

The role of the CISO

• Information Security Projects

• Integration of security requirements into other operational processes (change management, version control, disaster recovery, etc.)

Domain  4  of  the  CCISO  program  covers,  from  an  executive  perspective,  the   technical  aspects  of  the  CISO  job  including:

• Access Controls

• Physical Security

• Disaster Recovery and Business Continuity Planning

• Network Security

• Threat and Vulnerability Management

• Application Security • System Security

• Encryption

• Vulnerability Assessments and Penetration Testing

• Computer Forensics and Incident Response

Domain  5  of  the  CCISO  program  is  concerned  with  the  area  with  which  many   more  technically  inclined  professionals  may  have  the  least  experience,  including:

• Security Strategic Planning

• Alignment with business goals and risk tolerance

• Security emerging trends

• Key Performance Indicators (KPI)

• Financial Planning

• Development of business cases for security

• Analyzing, forecasting, and developing a capital expense budget

• Analyzing, forecasting, and developing an operating expense budget

• Return on Investment (ROI) and cost-benefit analysis

• Vendor management

• Integrating security requirements into the contractual agreement and procurement process

• Taken together, these five Domains of the C|CISO program translate to a thoroughly knowledgeable, competent executive information security practitioner.

The CCISO program is for executives looking to hone their skills & learn to better align their information security programs to the goals of organization as well as aspiring CISOs. Other Information Security Management Certification programs focus on middle management. CCISO focuses on exposing middle managers to executive-level content as well as encouraging existing CISOs to continually improve their own processes & programs.

This course is designed for the aspiring or sitting upper-level manager striving to advance his or her career by learning to apply their existing deep technical knowledge to business problems.

In order to sit for the CCISO exam, applicants that attend training must apply via the CCISO Eligibility Application showing 5 years of experience in at least 3 of the 5 CCISO domains (experience can be overlapping). Students who do not meet the eligibility criteria for the CCISO exam can sit for the EC-Council Information Security Manager (EISM) exam & apply for the CCISO exam they meet the requirements

EXAM TITLE  – EC-Council Certified CISO

EXAM CODE – 712-50

# OF QUESTIONS – 150

DURATION  –  2.5 Hours

AVAILABILITY –  ECC Exam Portal

TEST FORMAT – Scenario-based multiple choice

Check out what our students have to say

EC-Council Certified Chief Information Security Officer | CCISO

Overview:
EC-Council Certified Chief Information Security Officer (C|CISO)
EC-Council’s CCISO Program has certified leading information security professionals around the world. A core group of high-level information security executives, the CCISO Advisory Board, contributed by forming the foundation of the program and outlining the content that would be covered by the exam, body of knowledge, and training. Some members of the Board contributed as authors, others as exam writers, others as quality assurance checks, and still others as trainers. Each segment of the program was developed with the aspiring CISO in mind and looks to transfer the knowledge of seasoned professionals to the next generation in the areas that are most critical in the development and maintenance of a successful information security program.

Course Objectives:

Domain  1  –  Governance  (Policy,  Legal,  and  Compliance)

The first Domain of the C|CISO program is concerned with the following:
• Information Security Management Program

• Defining an Information Security Governance Program

• Regulatory and Legal Compliance

• Risk Management

Domain  2  -­  IS  Management  Controls  and  Auditing  Management

Domain 2 of the CCISO program, one of the cornerstones of any information security program, is concerned with the following:
• Designing, deploying, and managing security controls

• Understanding security controls types and objectives

• Implementing control assurance frameworks

• Understanding the audit management process

Domain  3  of  the  C|CISO  program  covers  the  day-­?to-­?day  responsibilities  of  a  CISO,   including:

The role of the CISO

• Information Security Projects

• Integration of security requirements into other operational processes (change management, version control, disaster recovery, etc.)

Domain  4  of  the  CCISO  program  covers,  from  an  executive  perspective,  the   technical  aspects  of  the  CISO  job  including:

• Access Controls

• Physical Security

• Disaster Recovery and Business Continuity Planning

• Network Security

• Threat and Vulnerability Management

• Application Security • System Security

• Encryption

• Vulnerability Assessments and Penetration Testing

• Computer Forensics and Incident Response

Domain  5  of  the  CCISO  program  is  concerned  with  the  area  with  which  many   more  technically  inclined  professionals  may  have  the  least  experience,  including:

• Security Strategic Planning

• Alignment with business goals and risk tolerance

• Security emerging trends

• Key Performance Indicators (KPI)

• Financial Planning

• Development of business cases for security

• Analyzing, forecasting, and developing a capital expense budget

• Analyzing, forecasting, and developing an operating expense budget

• Return on Investment (ROI) and cost-benefit analysis

• Vendor management

• Integrating security requirements into the contractual agreement and procurement process

• Taken together, these five Domains of the C|CISO program translate to a thoroughly knowledgeable, competent executive information security practitioner.

EC-Council Certified Chief Information Security Officer | CCISO Brochure 

Reviews

There are no reviews yet.

Be the first to review “Certified Information Security Officer Training and Certification in Pune”

You may also like…

  • Sale! Certified Threat Intelligence Analyst | CTIA
    IT Security & Governance

    Certified Threat Intelligence Analyst | CTIA

    20,000.00 Add to cart

    Get In Touch Call InfosavvyWhatsapp Infosavvy

    Certified Threat Intelligence Analyst | CTIA by ISACA is a training and credentialing program from Infosavvy which is designed and developed in collaboration with cyber security and threat intelligence experts across the globe. It helps organizations in identifying and mitigating business risks by converting unknown threats mainly internal and external into known threats. It is a comprehensive specialist level program that teaches a structured approach for building effective threat intelligence.

    Mainly our Target Audience are Ethical Hackers, Security Practitioners, Engineers, Analysts, Specialist, Architects, Managers, Threat Intelligence Analysts, Associates, Researchers, Consultants, Threat Hunters and SOC Professionals.

    [ninja_form id=7]

  • Sale! EC-Council Security Analyst v10 | ECSA
    IT Security & Governance

    EC-Council Security Analyst v10 | ECSA

    40,000.00 Add to cart

    Get In Touch Call InfosavvyWhatsapp Infosavvy

    ECSA training from Infosavvy provides an absolute learning progress continuing where the CEH program left off. This new ECSAv10 program has updated syllabus and an industry recognized comprehensive penetration testing methodology.

    Inclusive of all the above mentioned topics certifies the learner to elevate their abilities by applying these skills learned through intensive practical labs and challenges.

    Various methods are covered by ECSA in this course which has different requirements across all the verticals. ECSA is an amalgamation of both manual and automated penetration testing.

    [ninja_form id=7]

  • Sale! EC-Council Certified Incident Handler | ECIH v2
    IT Security & Governance

    EC-Council Certified Incident Handler | ECIH v2

    21,000.00 Add to cart

    Get In Touch Call InfosavvyWhatsapp Infosavvy

    ECIH is a program which enables individuals and organizations with the ability to handle and respond to various types of cyber security incidents in a systematic way (I, H and R). Restoring regular operations of the organizations at the earliest and mitigating the negative impact on the business operations.

    The I, H and R process includes stages like incident handling and response preparation, incident validation and prioritization, incident escalation and notification, forensic evidence gathering and analysis, incident containment, systems recovery, and incident eradication.

    [ninja_form id=7]
  • Certified Ethical Hacker | CEH Certification