EC-Council Certified Chief Information Security Officer
Course Overview
EC-Council’s CCISO Program has certified leading information security professionals around the world. A core group of high-level information security executives, the CCISO Advisory Board, contributed by forming the foundation of the program and outlining the content that would be covered by the exam, body of knowledge, and training. Some members of the Board contributed as authors, others as exam writers, others as quality assurance checks, and still others as trainers. Each segment of the program was developed with the aspiring CISO in mind and looks to transfer the knowledge of seasoned professionals to the next generation in the areas that are most critical in the development and maintenance of a successful information security program.Prerequisites
-
- Candidates interested in earning the C
- CISO Certification must qualify via ECCouncil’s Exam Eligibility application before sitting for the C
- CISO Exam. Only students with at least five years of experience in three of the five domains are permitted to sit for the C
- CISO Exam. Any student who does not qualify to sit for the exam or who does not fill out the application will be permitted to take the EC-Council Information Security Manager (EISM) exam and earn that certification. EISMs may then apply for the CCISO Exam once they have achieved the required years of experience.
Please note - The exam eligibility form will be emailed with your joining instructions and must be submitted to EC Council - before attending training. The completed form can be sent to - ccisoapp@eccouncil.org.
Course Content
-
In this course, you will learn in-depth content in each of the 5 CCISO Domains:
NULL
-
Domain 1
Governance (Policy,Legal and Compliance) The first Domain of the CCISO program is concerned with the following:
Information Security Management Program
Defining an Information Security Governance Program
Regulatory and Legal Compliance
Risk Management
IS Management Controls and Auditing Management -
Domain 2
of the CCISO program, one of the cornerstones of any information security program, is concerned with the following:
Designing, deploying, and managing security controls
Understanding security controls types and objectives
Implementing control assurance frameworks
Understanding the audit management process -
Domain 3
of the CCISO program covers the day-to-day responsibilities of a CISO, including:
The role of the CISO
Information Security Projects
Integration of security requirements into other operational processes (change management, version control, disaster recovery, etc.) -
Domain 4
of the CCISO program covers, from an executive perspective, the technical aspects of the CISO job including:
Access Controls
Physical Security
Disaster Recovery and Business Continuity Planning
Network Security
Threat and Vulnerability Management
Application Security
System Security
Encryption
Vulnerability Assessments and Penetration Testing
Computer Forensics and Incident Response -
Domain 5
of the CCISO program is concerned with the area with which many more technically inclined professionals may have the least experience, including:
Security Strategic Planning
Alignment with business goals and risk tolerance
Security emerging trends
Key Performance Indicators (KPI)
Financial Planning
Development of business cases for security
Analyzing, forecasting, and developing a capital expense budget
Analyzing, forecasting, and developing an operating expense budget
Return on Investment (ROI) and cost-benefit analysis
Vendor management
Integrating security requirements into the contractual agreement and procurement process
Taken together, these five Domains of the C -
of the CCISO program is concerned with the area with which many more technically inclined professionals may have the least experience, including:
Security Strategic Planning
Alignment with business goals and risk tolerance
Security emerging trends
Key Performance Indicators (KPI)
Financial Planning
Development of business cases for security
Analyzing, forecasting, and developing a capital expense budget
Analyzing, forecasting, and developing an operating expense budget
Return on Investment (ROI) and cost-benefit analysis
Vendor management
Integrating security requirements into the contractual agreement and procurement process
Taken together, these five Domains of the C
Private Training
-
Private Courses
Private courseFlexible date and locationPlease quote for prices - Virtual Training
K.K. Everyturn, Excel Level 3
T.W. Watmos, Outlook Overview and MS Teams for Hosts
N.B. Public scheduled, Excel Level 2
B.B. Riverford, Excel Essentials
D.C. anwen construction, Computers for Beginners and Getting Started with MS Office
L.F. Durham County Council, Microsoft Power BI Desktop
R.Y. GSK, Excel Level 3
V.H. William Smith Group, Excel Level 2
Private Courses
Oakville, 14 Durham Road West, Bowburn, Durham, DH6 5AU
0191 377 8377
ittrainingsolutions.co.uk
Printed:8/12/2025 10:56:32 PM