Log On/Register  

855.838.5028

Certified Chief Information Security Officer (CCISO)

Duration: 4 Days
Course Price: $3,995

Course Overview

In this course, students will be taught to steer complex security programs strategically and successfully.

Who Should Attend

This course is intended for individuals who are looking to make the jump from middle management to the executive ranks.

Course Objectives

Upon successful completion of this course, students will be able to steer complex security programs strategically and successfully.

Course Overview

In this course, students will be taught to steer complex security programs strategically and successfully.

Who Should Attend

This course is intended for individuals who are looking to make the jump from middle management to the executive ranks.

Course Objectives

Upon successful completion of this course, students will be able to steer complex security programs strategically and successfully.

1 - Governance Policy, Legal and Compliance

  • Definitions
  • Information Security Management Program
  • Information Security Laws, Regulations, and Guidelines
  • Privacy Laws

2 - IS Management Controls and Auditing Management Projects, Technology, and Operations

  • Design, Deploy, and Manage Security Controls in Alignment with Business Goals, Risk Tolerance, and Policies Standards
  • Information Security Risk Assessment
  • Risk Treatment
  • Residual Risk
  • Risk Acceptance
  • Risk Management Feedback Loops
  • Business Goals
  • Risk Tolerance
  • Policies and Standards
  • Understanding Security Controls Types and Objectives
  • Implementing Control Assurance Frameworks
  • COBIT Control Objectives for Information and Related Technology
  • BAI06 Manage Changes
  • COBIT 4.1 vs. COBIT 5
  • ISO 27001 27002
  • Automate Controls
  • Understanding the Audit Management Process

3 - Management Projects and Operations

  • The Role of the CISO
  • Information Security Projects
  • Security Operations Management

4 - Information Security Core Competencies

  • Access Controls
  • Physical Security
  • Disaster Recovery
  • Network Security
  • Threat and Vulnerability Management
  • Application Security
  • Systems Security
  • Encryption
  • Computer Forensics and Incident Response

5 - Strategic Planning and Finance

  • Security Strategic Planning
  • Alignment with Business Goals and Risk Tolerance
  • Relationship between Security, Compliance and Privacy Leadership
  • Enterprise Information Security EISA Models, Frameworks, and Standards
  • Security Emerging Trends
  • It’s all about the Data
  • Key Performance Indicators KPI
  • Systems Certification and Accreditation Process
Learn More
Please type the letters below so we know you are not a robot (upper or lower case):