CCISO Certification Course Overview

Choose Your Preferred Learning Mode

1-TO-1 TRAINING

Customized schedule Learn at your dedicated hour Instant clarification of doubt Guaranteed to run

ONLINE TRAINING

Flexibility, Convenience & Time Saving More Effective Learning Cost Savings

Preffered

CORPORATE TRAINING

Anytime – Across The Globe Hire A Trainer At Your Own Pace Customized Corporate Training

For Business
schedule

Looking for a customized training?

CCISO Online Training Curriculum

Governance (Policy, Legal, and Compliance)

In this domain Governance (Policy, Legal, and Compliance), give heed to domain 1 which includes information security governance program that includes leadership, organizational structures. It also makes you understand about standards, procedures, directives, policies, regulations, and legal issues that affect the information security program.
  • Defining Information Security Management and Governance Program
  • Regulatory Compliance
  • Legal Compliance
  • Risk Management
  • Program that includes leadership, organizational structures and processes they help program to Define, implement, manage and maintain an information security governance.
  • Establish information security management structure.
  • Establish a framework
  • Understand the enterprise information security and manage compliance program
  • Analyze all the external laws, regulations, standards, and best practices applicable to the organization should be analyzed
  • Such as Gramm-Leach-Bliley Act, Family Educational Rights and Privacy Act, Health Insurance Portability and Accountability Act [HIPAA], Federal Information Security are Understand by the various provisions of the laws that affect the organizational security
  • Understand the federal and organization documents to manage

IS Management Controls and Auditing Management

In this domain IS Management Controls and Auditing Management, for an organization identify the operational process and objectives as well as risk tolerance level. Also Supervise the information systems control process to ensure timely implementation for progress.
  • Designing, deploying, and managing security controls
  • Understanding security controls types and objectives
  • Implementing control assurance frameworks
  • Understanding the audit management process
  • Design information systems controls in alignment with
  • The operational needs and goals designs systems that control alignment with
  • It controls to mitigate risk by designing and implementing on it.
  • Design and implement processes to deficiencies and evaluate problem management practices
  • Assess and implement tools
  • Techniques to automate information systems
  • To ensure that the processes for information systems operations, maintenance and support meet the organization’s strategies produce information systems control status reports
  • Auditing Management

Security Program Management & Operations

In this domain Security Program Management & Operations, participants need to Qualifying areas under Domain 3 as it is not limited for system projects. You need to Develop, manage and monitor the information systems program to identify program;
  • Role of the CISO and information Security Projects
  • Into other operational processes such as change management, version control, disaster recovery, etc. are Integration of security requirements
  • Project develop a clear project scope for each information systems
  • Develop, manage and monitor the individual projects.
  • Resources needed for successful design you need to
  • Program like people, infrastructure, and identify, negotiate, acquire and manage for implementing information.
  • Evaluate the project management practices
  • Continuously measure the effectiveness by developing plan
  • Identify stakeholders, manage stakeholders’
  • expectations and communicate effectively
  • Ensure necessary changes and improvements to the information systems 

Information Security Core Concepts

In this domain, Information Security Core Concepts you need heed for the criteria of mandatory in access control, for threat managing, encryption, physical securities are taken care of;
  • Identify the criteria for mandatory control
  • Helps in implementation access control, understand the different factors
  • Design an access control plan.
  • Implement and manage alignment with the basic principles such as ID cards and biometrics
  • Develop procedures to ensure systems
  • Social Engineering, Phishing Attacks, Identity Theft understand various social engineering concepts and role in insider attacks
  • Develop best practices to counter attacks
  • The physical security audit and update issues should be managed properly.
  • Establish security performance
  • The risk mitigation and risk treatment processes should be identified
  • Understand the concept of acceptable risk.

Strategic Planning, Finance, & Vendor Management

In this domain Strategic Planning, Finance, & Vendor Management, the security planning, risk factors and business securities are managed according to the needs;
  • Security Strategic Planning
  • Arrangement with business goals
  • Risk tolerance
  • Security emerging trends
  • Key Performance Indicators (KPI)
  • Financial Planning
  • Development of business
  • Analyzing, forecasting, developing a capital expense budget and an operating expense budget

CCISO Certification Prerequisites

Interested candidates can take CCISO training, as it is open to every interested candidate. You need to be experienced in domains and participants who are willing to have exam but without training must have 5-year experience in 3-5 CCISO domains. This should be verified via exam Eligibility application. For Remotely monitoring, you instructor checks your approved voucher of Pearson VUE. Also, for EC-council Information Security Manager (E|ISM) exam as part of the Associate CCISO Program has made bit easy for applicants who don’t have these requirements. 

Assets attained after completion of the course

This certification includes leadership, organizational structures and other processes like defining, implementing and managing an information security governance program about it: Further, get to know about it in brief--
  • A program to monitor firewalls
  • Identify firewall configuration issues.
  • Identify vulnerability and attacks
  • Manage different wireless network security tools
  • Understand anti-virus systems.
  • Risk factors for compliance.
  • Various system-engineering practices.
  • Develop and manage digital forensic program.
  • To acquire, store and process digital evidence identify best bootcamps and practices.
  • Define key performance indicators
  • Measure effectiveness continuously

CCISO Exam Format

Number of Questions150 questions
Duration2.5 hours
Question FormatMultiple Choice
Passing Score60% to 85% depending upon exam form
AvailabilityECC Exam Portal
Format Scenario-based Multiple Choice

Frequently Asked Questions (FAQ)

EC-Council Authorized applicants who are not attending training for this exam must have five years of experience in each of the five CCISO Domains but overlapping experience is accepted.

Along with the CCISO Exam Eligibility Application, fee of $100 has to be submitted for CCISO certification exam.

To apply for the CCISO Exam, applicants need to fill out the CCISO Exam Eligibility Application and then email it on official website cciso@eccouncil.org.

Candidates must satisfy the Continuing Education requirements and remit a renewal fee of $100.00 (USD) for renewing the certification.

Candidates can take the training even without having the required experience candidates can take training but they will not qualify to take the CCISO Exam. Also, it would not be issued on exam voucher. EC-Council Information Security Manager (EISM) exam after CCISO training is for candidates didn’t gained experience.