CCISO

by Key2Sec Claim Listing

EC-Council’s CCISO Program has certified leading information security professionals around the world. A core group of high-level information security executives, the CCISO Advisory Board, contributed by forming the foundation of the program and outlining.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

Key2Sec Logo

img Duration

40 Hours

Course Details

EC-Council’s CCISO Program has certified leading information security professionals around the world. A core group of high-level information security executives, the CCISO Advisory Board, contributed by forming the foundation of the program and outlining the content that would be covered by the exam, body of knowledge, and training.

Some members of the Board contributed as authors, others as exam writers, others as quality assurance checks, and still others as trainers.

Each segment of the program was developed with the aspiring CISO in mind and looks to transfer the knowledge of seasoned professionals to the next generation in the areas that are most critical in the development and maintenance of a successful information security program.

The Certified CISO (CCISO) program is the first of its kind training and certification program aimed at producing top-level information security executives.

The CCISO does not focus solely on technical knowledge but on the application of information security management principles from an executive management point of view. The program was developed by sitting CISOs for current and aspiring CISOs.

 

Key features in CCISO:

  • Define, implement, and manage an information security governance program that includes leadership, organizational structures and processes.
  • Assess the major enterprise risk factors for compliance.
  • Design and develop a program to monitor firewalls and identify firewall configuration issues.
  • Identify vulnerability and attacks associated with wireless networks and manage different wireless network security tools.
  • Deploy and manage anti-virus systems.
  • Understand various system-engineering practices.
  • Identify the volatile and persistent system information.
  • Develop and manage an organizational digital forensic program.
  • Identify the best practices to acquire, store and process digital evidence.
  • Define key performance indicators and measure effectiveness on continuous basis.
  • Allocate financial resources to projects, processes and units within information security program.
  • Identify and report financial metrics to stakeholders.
  • Understand the IA security requirements to be included in statements of work and other appropriate procurement documents in this CCISO certification training program.

 

Course Content:

  • Access Controls
  • Physical Security
  • Disaster Recovery and Business Continuity Planning
  • Network Security
  • Threat and Vulnerability Management
  • Application Security
  • System Security
  • Encryption
  • Vulnerability Assessments and Penetration Testing
  • Computer Forensics and Incident Response
  • Security Strategic Planning
  • Alignment with business goals and risk tolerance
  • Security emerging trends
  • Key Performance Indicators (KPI)
  • Financial Planning
  • Development of business cases for security
  • Analyzing, forecasting, and developing a capital expense budget
  • Analyzing, forecasting, and developing an operating expense budget
  • Return on Investment (ROI) and cos benefit analysis
  • Vendor management
  • Integrating security requirements into the contractual agreement and procurement process
  • Mumbai Branch

    Quantum Tower, Kalpataru Plaza, 9th floor, 901, Chincholi Bunder Road, Mumbai

Check out more CCISO courses in India

IIHT Durgapura Logo

Cybersecurity

If you go to any news website, you will discover an article about a severe cyberattack that happened recently. However, many upper-level managers lack the technical knowledge required to properly allocate resources to ensure cybersecurity, increasing vulnerability to attacks.

by IIHT Durgapura [Claim Listing ]
Palmeto Logo

Certified Information Systems Security Professional (CISSP)

Certified Information Systems Security Professional (CISSP) course is offered by Palmeto. We help organizations train and build the skills to transform their performance. Our training deliverables built on years of unique relationships with leading organizations.

by Palmeto [Claim Listing ]
Smart Tech Junior Logo

Cyber Security

Cyber Security Course is offered by Smart Tech Junior for all skill level. Learn from the best coding experts. We work the professional coders to deliver the best teaching to your kids. 

by Smart Tech Junior [Claim Listing ]
Talent Spiral Logo

Cyber Security/ Information Security

Overview of the information security technology includes the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access.

by Talent Spiral [Claim Listing ]
Itronix Solutions Logo

Cyber Security Course

Cybersecurity refers to the practice of protecting computer systems, networks, programs, and data from digital attacks, unauthorized access, damage, or theft. It encompasses a range of technologies, processes, and practices designed to safeguard devices.

by Itronix Solutions [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy