No1 : The best IT / Cyber Training Company in the Philippines
TechED Global Academy (TGA)TechED Global Academy (TGA)TechED Global Academy (TGA)
(Sat - Thursday)
sales@teched.com.ph
Q.C., 1103, PH

EC-Council Certified Chief Information Security Officer v3

  • Home
  • Services
  • EC-Council Certified Chief Information Security Officer v3

EC-Council

Certified Chief Information Security Officer v3

CCISO Course Overview

CISO, or Chief Information Security Officer, is an established top-level executive position in the industry, similar to CEO or CTO. CISO is the highest-level executive in an organization charged with information security. With the increasing awareness of digital information as an asset in the industry at large, the demand for CISOs across organizations is on a rise. The CISOs focus on the core areas pertaining to information security in an enterprise and lead the IS program.

The CCISO certification training is aimed at providing the learners with comprehensive knowledge and skills regarding the information security domain. The Chief Information Security Officer Certification Training covers vital areas such as policy setting, project management, audit management, executive strategy, contract management, and financial expertise. These areas of knowledge are essential for leading a successful IS program. The CCISO certification validates the competence of a professional in handling the top-level executive tasks and in effectively leading an information security program.

Why take CCISO?

The CISO position emerged worldwide as a designation of executive leaders who can address the emerging threats to information security by developing and maintaining a tough information security strategy. CISOs – with the experience, leadership, communication skills and innovative strengths are born to resolve the ever-growing information security threats. The CISO of tomorrow will play a vital role in creating effective and efficient processes and will lead a team of technically skilled professionals to defend the core interests of their organization.

  • Aimed at enabling managers to reach the top-executive level
  • Imparting knowledge to candidates to navigate through day-to-day responsibilities of a CISO
  • Providing in-depth knowledge in the five vital CCISO domains
  • Providing practical knowledge of applying IS management principles from top-management perspective
  • Preparing the candidates to pass the CCISO exam in a single attempt
Become a Chief Information Security Officer

Today’s world is one of constant and instant information exchange. Organizations, be it private businesses or government bodies, rely on sophisticated computer databases and networks to share digital information on a daily basis with their subsidiaries, branches, partners, clients, employees, and other stakeholders. However, years of information security incidences and the onslaught of the recent cyber-attacks prove that digital data can be easily compromised. Organizations therefore, are increasingly in need of a new set of skills and processes to ensure the security of information at a scale that will be required tomorrow.

If your aspiration is to have the highest regarded title within the information security profession – CISO, if you already have earned the role of a CISO, or if you are currently playing the role of a CISO in your organization without the official title, the CISO designation is the recognition of your knowledge and achievements that will award you with professional acknowledgement and propel your career.

Achieving the CCISO Certification will differentiate you from others in the competitive ranks of senior Information Security Professionals. CCISO will provide your employers with the assurance that as a CCISO executive leader, you possess the proven knowledge and experience to plan and oversee Information Security for the entire corporation.

Target Audience
Governance (Policy, Legal & Compliance)
Management – Projects and Operations
Information Security Core Competencies
Strategic Planning & Finance
IS Management Controls and Auditing Management (Projects, Technology & Operations)
All the professionals who aspire to reach top-level position in information security profession
Course Pre-Requisite

You should have the following experience before attending this course:

  • Candidates who are sitting for the exam without training must have 5 years of experience in the 5 core CCISO domains verified via the Exam Eligibility Application.
  • Candidates who have taken training must possess 3 years of IS management experience in 3 of the 5 core CCISO domains verified via the Exam Eligibility Application.
Overview Course Outline About the exam

Learning Objectives for CCISO v3 Training Course
  • Define, implement, and manage an information security governance program that includes leadership, organizational structures and processes.
  • Assess the major enterprise risk factors for compliance.
  • Design and develop a program to monitor firewalls and identify firewall configuration issues.
  • Identify vulnerability and attacks associated with wireless networks and manage different wireless network security tools.
  • Deploy and manage anti-virus systems.
  • Understand various system-engineering practices.
  • Identify the volatile and persistent system information.
  • Develop and manage an organizational digital forensic program.
  • Identify the best practices to acquire, store and process digital evidence.
  • Define key performance indicators and measure effectiveness on continuous basis.
  • Allocate financial resources to projects, processes and units within information security program.
  • Identify and report financial metrics to stakeholders.
  • Understand the IA security requirements to be included in statements of work and other appropriate procurement documents in this CCISO certification training program.

The CCISO Certification is an industry-leading program that recognizes the real-world experience necessary to succeed at the highest executive levels of information security. Bringing together all the components required for a C-Level positions, the CCISO program combines audit management, governance, IS controls, human capital management, strategic program development, and the financial expertise vital to leading a highly successful IS program. The job of the CISO is far too important to be learned by trial and error. Executive level management skills are not areas that should be learned on the job.

Material in the CCISO Program assumes a high-level understanding of technical topics and doesn’t spend much time on strictly technical information, but rather on the application of technical knowledge to an information security executive’s day-to-day work. The CCISO aims to bridge the gap between the executive management knowledge that CISOs need and the technical knowledge that many sitting and aspiring CISOs have. This can be a crucial gap as a practitioner endeavors to move from mid-management to upper, executive management roles. Much of this is traditionally learned as on the job training, but the CCISO Training Program can be the key to a successful transition to the highest ranks of information security management.

This course covers:

Domain 1: Governance (Policy, Legal, and Compliance)

  • Information Security Management Program
  • Defining an Information Security Governance Program
  • Regulatory and Legal Compliance
  • Risk Management

Domain 2: IS Management Controls and Auditing Management

  • Designing, deploying, and managing security controls
  • Understanding security controls types and objectives
  • Implementing control assurance frameworks
  • Understanding the audit management process

Domain 3: Security Program Management & Operations

  • The role of the CISO
  • Information Security Projects
  • Integration of security requirements into other operational processes (change management, version control, disaster recovery, etc.)

Domain 4: Information Security Core Concepts

  • Access Controls
  • Physical Security
  • Disaster Recovery and Business Continuity Planning
  • Network Security
  • Threat and Vulnerability Management
  • Application Security
  • System Security
  • Encryption
  • Vulnerability Assessments and Penetration Testing
  • Computer Forensics and Incident Response

Domain 5: Strategic Planning, Finance, & Vendor Management

  • Security Strategic Planning
  • Alignment with business goals and risk tolerance
  • Security emerging trends
  • Key Performance Indicators (KPI)
  • Financial Planning
  • Development of business cases for security
  • Analyzing, forecasting, and developing a capital expense budget
  • Analyzing, forecasting, and developing an operating expense budget
  • Return on Investment (ROI) and cost-benefit analysis
  • Vendor management
  • Integrating security requirements into the contractual agreement and procurement process

 

Exam Codes712-50 (ECC EXAM)
Number of Questions150 questions per exam
Type of QuestionsMultiple choice
Length of Test2.5 Hours / 150 Minutes
Testing ProviderECC EXAM PORTAL
Passing ScoreIn order to maintain the high integrity of our certifications exams, EC-Council Exams are provided in multiple forms (I.e. different question banks). Each form is carefully analyzed through beta testing with an appropriate sample group under the purview of a committee of subject matter experts that ensure that each of our exams not only has academic rigor but also has “real world” applicability. We also have a process to determine the difficulty rating of each question. The individual rating then contributes to an overall “Cut Score” for each exam form. To ensure each form has equal assessment standards, cut scores are set on a “per exam form” basis. Depending on which exam form is challenged, cut scores can range from 60% to 78%.

Course Highlights

EC-Council Authorized Partner
96% passing rate
Get certified at an affordable price
Blended learning delivery model
CEI Certified Trainers

Contact

  • Unit 15B Penthouse Atherton Place, Tomas Morato, Corner Don A. Roces Ave, Quezon City, 1103 Metro Manila
  • +(632) 7905 8718
  • sales@teched.com.ph

Brochures

View our Course Documents below with the current Curriculum and Pricing presented in an easy to read guide for the course offered.

Testimonials

Training at TechED has been amazing. The instructor has provided us with so much in depth knowledge regarding the course including course material which are detailed and a lot of iLabs for hands on experience. Would recommend for anyone looking to study.

Francis C.

Network Security Administrator, Manufacturing Sector

The instructor is exceptionally knowledgeable and provided valuable additional content and labs.

Erick Z.

Cybersecurity Director, BPO Industry

Considering the difficult times we live in with COVID-19, the online training delivery as well as the staff were superb.

The course really keyed in all the topics of the exam. The material slides, documentation, labs was well written and presented. The instructor really knew his stuff and you could tell he was passionate about the subject. 

Christian L.

IT Manager, Health Sector

TechED's training was excellent. The trainer was able to explain all the material and extra on top of that which I think will help me with future training and in my work environment. I would highly recommend it to anyone wishing to further their knowledge in a quick and easy way.

Mike S.

US Military

The Cybersecurity Trainings and Instructor provided by TechED are a must for anyone working in the field. It provides a wealth of useful information that might be useful when you get back to work.

Richard J.

Cybersecurity Specialist, US DOD Contractor

At vero eos et accusamus et iusto odio digni goikussimos ducimus qui to bonfo blanditiis praese. Ntium voluum deleniti atque.

Melbourne, Australia
(Sat - Thursday)
(10am - 05 pm)

No products in the cart.

Subscribe to our newsletter

Sign up to receive latest news, updates, promotions, and special offers delivered directly to your inbox.
No, thanks
X