Close
Contact Us info@learnquest.com

??WelcomeName??
??WelcomeName??
« Important Announcement » Contact Us 877-206-0106 | USA Flag
Close
Close
Close
photo

Thank you for your interest in LearnQuest.

Your request is being processed and LearnQuest or a LearnQuest-Authorized Training Provider will be in touch with you shortly.

photo

Thank you for your interest in Private Training.

We look forward to helping you develop the perfect training solution to help you meet your company's goals.

For immediate assistance, speak with one of our representatives using the chat module below. Otherwise, LearnQuest or a LearnQuest-Authorized Training Provider will be in touch with you shortly.

Close
photo

Thank you for your interest in LearnQuest!

Now, you will be able to stay up-to-date on our latest course offerings, promotions, and training discounts. Watch your inbox for upcoming special offers.

title

Date: xxx

Location: xxx

Time: xxx

Price: xxx

Please take a moment to fill out this form. We will get back to you as soon as possible.

All fields marked with an asterisk (*) are mandatory.

Certified Chief Information Security Officer (CCISO)

Price
2,499 USD
5
EC-SVC-CCISO
Self-Paced Training
EC-Council ATC

AWS Training Pass

Take advantage of flexible training options with the AWS Training Pass and get Authorized AWS Training for a full year.

Learn More

Prices reflect a 22.5% discount for IBM employees (wherever applicable).
Prices reflect a 24% discount for Kyndryl employees (wherever applicable).
Prices reflect the Accenture employee discount.
Prices shown are the special AWS Partner Prices.
Prices reflect the Capgemini employee discount.
Prices reflect the UPS employee discount.
Prices reflect the ??democompanyname?? employee discount.
GSA Private/Onsite Price: ??gsa-private-price??
For GSA pricing, please go to GSA Advantage.
 

Class Schedule

Delivery Formats

Sort results

Filter Classes

Guaranteed to Run

Modality

Location

Language

Date

View Global Schedule

Course Description

Overview

The CCISO Certification is an industry-leading, security certification program that recognizes the real-world experience necessary to succeed at the highest executive levels of information security. Bringing together all the components required for a C-Level position, the CCISO program combines audit management, governance, IS controls, human capital management, strategic program development, and the financial expertise vital to leading a highly successful information security program. The job of the CISO is far too important to be learned by trial and error. Executive-level management skills are not areas that should be learned on the job.

The material in the CCISO Program assumes a high-level understanding of technical topics and doesn’t spend much time on strictly technical information, but rather on the application of technical knowledge to an information security executive’s day-to-day work. The CCISO aims to bridge the gap between the executive management knowledge that CISOs need and the technical knowledge that many sitting and aspiring CISOs have. This can be a crucial gap as a practitioner endeavor to move from mid-management to upper, executive management roles. Much of this is traditionally learned as on the job training, but the CCISO Training Program can be the key to a successful transition to the highest ranks of information security management.

iLearn course includes:
  • Instructor-led, streaming video training modules – 1 year access
  • Official EC-Council e-courseware – 1 year access
  • iLabs, virtual lab platform – 6 months access
  • Certification Exam Voucher
  • Certificate of Attendance


Once course is activated, no refund. No refunds for mobile security tool kit. No refunds on courseware once it has been opened.
 

Objectives


 

Audience

  • Director, Chief Information Security Officer (CISO), Google Cloud • Deputy CISO
  • VP & Chief Information Security Officer
  • Chief Information Security Officer (VP)
  • System Dir, Info Sys. Security – CISO
  • Chief Privacy Officer
  • ASSOCIATE VICE PRESIDENT AND CHIEF INFORMATION SECURITY OFFICER
  • Chief Security Officer
  • CIO COO
  • Assistant Executive Director – Chief Information Security Officer
  • CISO Threat Intel
  • Chief Technical Officer (CTO)
  • Chief Data Officer
  • VP, Information Security
  • Information Security Officer
  • Chief Compliance Officer
  • Senior Cyber Security CIO SME
  • Regional Chief Information Officer

Prerequisites


     

Topics

Domain 1: Governance and Risk Management
  • Define, Implement, Manage, and Maintain an Information Security Governance Program
    • Form of Business Organization
    • Industry
    • Organizational Maturity
  • Information Security Drivers
  • Establishing an information security management structure
    • Organizational Structure
    • Where does the CISO fit within the organizational structure
    • The Executive CISO
    • Nonexecutive CISO
  • Laws/Regulations/Standards as drivers of Organizational Policy/Standards/Procedures
  • Managing an enterprise information security compliance program
    • Security Policy
    • Necessity of a Security Policy
    • Security Policy Challenges
    • Policy Content
    • Types of Policies
    • Policy Implementation
    • Reporting Structure
    • Standards and best practices
    • Leadership and Ethics
    • EC-Council Code of Ethics
  • Introduction to Risk Management
    • Organizational Structure
    • Where does the CISO fit within the organizational structure
    • The Executive CISO
    • Nonexecutive CISO
  • Domain 2: Information Security Controls, Compliance, and Audit Management
  • Information Security Controls
    • Identifying the Organization’s Information Security Needs
    • Identifying the Optimum Information Security Framework
    • Designing Security Controls
    • Control Lifecycle Management
    • Control Classification
    • Control Selection and Implementation
    • Control Catalog
    • Control Maturity
    • Monitoring Security Controls
    • Remediating Control Deficiencies
    • Maintaining Security Controls
    • Reporting Controls
    • Information Security Service Catalog
  • Compliance Management
    • Acts, Laws, and Statutes
    • FISMA
    • Regulations
    • GDPR
    • Standards
    • ASD—Information Security Manual
    • Basel III
    • FFIEC
    • ISO 00 Family of Standards
    • NERC-CIP
    • PCI DSS
    • NIST Special Publications
    • Statement on Standards for Attestation Engagements No. 16 (SSAE 16)
  • Guidelines, Good and Best Practices
    • CIS
    • OWASP
  • Audit Management
    • Audit Expectations and Outcomes
    • IS Audit Practices
    • ISO/IEC Audit Guidance
    • Internal versus External Audits
    • Partnering with the Audit Organization
    • Audit Process
    • General Audit Standards
    • Compliance-Based Audits
    • Risk-Based Audits
    • Managing and Protecting Audit Documentation
    • Performing an Audit
    • Evaluating Audit Results and Report
    • Remediating Audit Findings
    • Leverage GRC Software to Support Audits
  • Summary Domain 3: Security Program Management & Operations
  • Program Management
    • Defining a Security Charter, Objectives, Requirements, Stakeholders, and Strategies
    • Security Program Charter
    • Security Program Objectives
    • Security Program Requirements
    • Security Program Stakeholders
    • Security Program Strategy Development
    • Executing an Information Security Program
    • Defining and Developing, Managing and Monitoring the Information Security Program
    • Defining an Information Security Program Budget
    • Developing an Information Security Program Budget
    • Managing an Information Security Program Budget
    • Monitoring an Information Security Program Budget
    • Defining and Developing Information Security Program Staffing Requirements
    • Managing the People of a Security Program
    • Resolving Personnel and Teamwork Issues
    • Managing Training and Certification of Security Team Members
    • Clearly Defined Career Path
    • Designing and Implementing a User Awareness Program
    • Managing the Architecture and Roadmap of the Security Program
    • Information Security Program Architecture
    • Information Security Program Roadmap
    • Program Management and Governance
    • Understanding Project Management Practices
    • Identifying and Managing Project Stakeholders
    • Measuring the Effectives of Projects
    • Business Continuity Management (BCM) and Disaster Recovery Planning (DRP)
    • Data Backup and Recovery
    • Backup Strategy
    • ISO BCM Standards
    • Business Continuity Management (BCM)
    • Disaster Recovery Planning (DRP)
    • Continuity of Security Operations
    • Integrating the Confidentiality, Integrity and Availability (CIA) Model
    • BCM Plan Testing
    • DRP Testing
    • Contingency Planning, Operations, and Testing Programs to Mitigate Risk and Meet Service Level Agreements (SLAs)
    • Computer Incident Response
    • Incident Response Tools
    • Incident Response Management
    • Incident Response Communications
    • Post-Incident Analysis
    • Testing Incident Response Procedures
    • Digital Forensics
    • Crisis Management
    • Digital Forensics Life Cycle
  • Operations Management
    • Establishing and Operating a Security Operations (SecOps) Capability
    • Security Monitoring and Security Information and Event Management (SIEM)
    • Event Management
    • Incident Response Model
    • Developing Specific Incident Response Scenarios
    • Threat Management
    • Threat Intelligence
    • Information Sharing and Analysis Centers (ISAC)
    • Vulnerability Management
    • Vulnerability Assessments
    • Vulnerability Management in Practice
    • Penetration Testing
    • Security Testing Teams
    • Remediation
    • Threat Hunting
  • Summary Domain 4: Information Security Core Competencies
  • Access Control
    • Authentication, Authorization, and Auditing
    • Authentication
    • Authorization
    • Auditing
    • User Access Control Restrictions
    • User Access Behavior Management
    • Types of Access Control Models
    • Designing an Access Control Plan
    • Access Administration
  • Physical Security
    • Designing, Implementing, and Managing Physical Security Program
    • Physical Risk Assessment
    • Physical Location Considerations
    • Obstacles and Prevention
    • Secure Facility Design
    • Security Operations Center
    • Sensitive Compartmented Information Facility
    • Digital Forensics Lab
    • Datacenter
    • Preparing for Physical Security Audits
  • Network Security
    • Network Security Assessments and Planning
    • Network Security Architecture Challenges
    • Network Security Design
    • Network Standards, Protocols, and Controls
    • Network Security Standards
    • Protocols
  • Certified Chief
    • Network Security Controls
    • Wireless (Wi-Fi) Security
    • Wireless Risks
    • Wireless Controls
    • Voice over IP Security
  • Endpoint Protection
    • Endpoint Threats
    • Endpoint Vulnerabilities
    • End User Security Awareness
    • Endpoint Device Hardening
    • Endpoint Device Logging
    • Mobile Device Security
    • Mobile Device Risks
    • Mobile Device Security Controls
    • Internet of Things Security (IoT)
    • Protecting IoT Devices
  • Application Security
    • Secure SDLC Model
    • Separation of Development, Test, and Production Environments
    • Application Security Testing Approaches
    • DevSecOps
    • Waterfall Methodology and Security
    • Agile Methodology and Security
    • Other Application Development Approaches
    • Application Hardening
    • Application Security Technologies
    • Version Control and Patch Management
    • Database Security
    • Database Hardening
    • Secure Coding Practices
  • Encryption Technologies
    • Encryption and Decryption
    • Cryptosystems
    • Blockchain
    • Digital Signatures and Certificates
    • PKI
    • Key Management
    • Hashing
    • Encryption Algorithms
    • Encryption Strategy Development
    • Determining Critical Data Location and Type
    • Deciding What to Encrypt
    • Determining Encryption Requirements
    • Selecting, Integrating, and Managing Encryption Technologies
  • Virtualization Security
    • Virtualization Overview
    • Virtualization Risks
    • Virtualization Security Concerns
    • Virtualization Security Controls
    • Virtualization Security Reference Model
  • Cloud Computing Security
    • Overview of Cloud Computing
    • Security and Resiliency Cloud Services
    • Cloud Security Concerns
    • Cloud Security Controls
    • Cloud Computing Protection Considerations
  • Transformative Technologies
    • Artificial Intelligence
    • Augmented Reality
    • Autonomous SOC
    • Dynamic Deception
    • Software-Defined Cybersecurity
  • 11. Summary Domain 5: Strategic Planning, Finance, Procurement and Vendor Management
  • Strategic Planning
    • Understanding the Organization
    • Understanding the Business Structure
    • Determining and Aligning Business and Information Security Goals
    • Identifying Key Sponsors, Stakeholders, and Influencers
    • Understanding Organizational Financials
    • Creating an Information Security Strategic Plan
    • Strategic Planning Basics
    • Alignment to Organizational Strategy and Goals
    • Defining Tactical Short, Medium, and Long-Term Information Security Goals
    • Information Security Strategy Communication
    • Creating a Culture of Security
  • Designing, Developing, and Maintaining an Enterprise Information Security Program
    • Ensuring a Sound Program Foundation
    • Architectural Views
    • Creating Measurements and Metrics
    • Balanced Scorecard
    • Continuous Monitoring and Reporting Outcomes
    • Continuous Improvement
    • Information Technology Infrastructure Library (ITIL) Continual Service Improvement (CSI)
  • Understanding the Enterprise Architecture (EA)
    • EA Types
    • The Zachman Framework
    • The Open Group Architecture Framework (TOGAF)
    • Sherwood Applied Business Security Architecture (SABSA)
    • Federal Enterprise Architecture Framework (FEAF)
  • Finance
    • Understanding Security Program Funding
    • Analyzing, Forecasting, and Developing a Security Budget
    • Resource Requirements
    • Define Financial Metrics
    • Technology Refresh
    • New Project Funding
    • Contingency Funding
    • Managing the information Security Budget
    • Obtain Financial Resources
    • Allocate Financial Resources
    • Monitor and Oversight of Information Security Budget
    • Report Metrics to Sponsors and Stakeholders
    • Balancing the Information Security Budget
  • Procurement
    • Procurement Program Terms and Concepts
    • Statement of Objectives (SOO)
    • Statement of Work (SOW)
    • Total Cost of Ownership (TCO)
    • Request for Information (RFI)
    • Request for Proposal (RFP)
    • Master Service Agreement (MSA)
    • Service Level Agreement (SLA)
    • Terms and Conditions (T&C)
    • Understanding the Organization’s Procurement Program
    • Internal Policies, Processes, and Requirements
    • External or Regulatory Requirements
    • Local Versus Global Requirements
    • Procurement Risk Management
    • Standard Contract Language
  • Vendor Management
    • Understanding the Organization’s Acquisition Policies and Procedures
    • Procurement Life cycle
    • Applying Cost-Benefit Analysis (CBA) During the Procurement Process5
    • Vendor Management Policies
    • Contract Administration Policies
    • Service and Contract Delivery Metrics
    • Contract Delivery Reporting
    • Change Requests
    • Contract Renewal
    • Contract Closure
    • Delivery Assurance
    • Validation of Meeting Contractual Requirements
    • Formal Delivery Audits
    • Periodic Random Delivery Audits
    • Third-Party Attestation Services (TPRM)
  • Summary
     
  • 2023 Top 20 Training Industry Company - IT Training

    Need Help?

    Call us at 877-206-0106 or e-mail us at info@learnquest.com

    Personalized Solutions

    Need a personalized solution for your Training? Contact us, and one of our training advisors will help you find the best solution.

    Contact Us

    Need Help?

    Do you have a question about the courses, instruction, or materials covered? Do you need help finding which course is best for you? We are here to help!

    Talk to us

    LearnPass Year-End Offer

    Get Up to 25% Additional Training Funds Before the Year Ends!

    Act Now

    Self-Paced Training Info

    Learn at your own pace with anytime, anywhere training

    • Same in-demand topics as instructor-led public and private classes.
    • Standalone learning or supplemental reinforcement.
    • e-Learning content varies by course and technology.
    • View the Self-Paced version of this outline and what is included in the SPVC course.
    • Learn more about e-Learning

    Course Added To Shopping Cart

    bla

    bla

    bla

    bla

    bla

    bla

    Self-Paced Training Terms & Conditions

    ONCE YOU ARE ENROLLED IN THIS COURSE YOU WILL NOT BE ABLE TO CANCEL YOUR ENROLLMENT. You are billed for the course when you submit the enrollment form. Self-Paced Virtual Classes are non-refundable. Once you purchase a Self-Paced Virtual Class, you will be charged the full price.

    • Students will receive an access code within 1-3 business days.
    • If purchasing a self-paced course for multiple students, the purchaser will receive the access codes and must distribute them individually to the students.
    • Students have access to the course 24/7 and will need to read and follow all instructions carefully to complete the course successfully within their allotted time.

    EC-Council iLearn courses are available for 1 year. You will have 1 year access to the instructor-led, streaming video training modules and the Official EC-Council e-courseware. You will have 6 months access to the iLabs and virtual lab platform.

    This is a EC-Council Self-Paced virtual class; it is intended for students who do not need the support of a classroom instructor. If you feel you would better benefit from having access to a Subject Matter Expert, please check to see if an Instructor-Led version is available. Minimal technical support is provided to address issues with accessing the platform or problems within the lab environment.

    After you receive confirmation that you are enrolled, you will be sent further instructions to access your course material and remote labs. A confirmation email will contain your online link, your ID and password, and additional instructions for starting the course.

    Your 1 year access begins once you receive your confirmation from EC-Council.

    Exam Terms & Conditions

    ??exam-warning??
    ??group-training-form-area??
    ??how-can-we-help-you-area??
    ??personalized-form-area??
    ??request-quote-area??

    Sorry, there are no classes that meet your criteria.

    Please contact us to schedule a class.
    Close

    self-paced
    STOP! Before You Leave

    Save 0% on this course!

    Take advantage of our online-only offer & save 0% on any course !

    Promo Code skip0 will be applied to your registration

    Close
    Nothing yet
    here's the message from the cart

    To view the cart, you can click "View Cart" on the right side of the heading on each page
    Add to cart clicker.

    Purchase Information

    ??elearning-coursenumber?? ??coursename??
    View Cart

    title

    Date: xxx

    Location: xxx

    Time: xxx

    Price: xxx

    Please take a moment to fill out this form. We will get back to you as soon as possible.

    All fields marked with an asterisk (*) are mandatory.

    If you would like to request a quote for 5 or more students, please contact CustomerService@learnquest.com to be assigned an account representative.

    Need more Information?

    Speak with our training specialists to continue your learning journey.

     

    Delivery Formats

    Close

    By submitting this form, I agree to LearnQuest's Terms and Conditions

    heres the new schedule
    This website uses third-party profiling cookies to provide services in line with the preferences you reveal while browsing the Website. By continuing to browse this Website, you consent to the use of these cookies. If you wish to object such processing, please read the instructions described in our Privacy Policy.
    Your use of this LearnQuest site affirms your consent to our use of session and persistent cookies to track how you use our website.