Ec-council | Learning
Certified Director of Information Security | CCISO Certification
Boost your career with EC-Cuncil's CCISO program. Join the elite and excel in IT security management.
About the Certified Chief Information Officer (CCISO) course
Description
CCISO Certification is a leading safety certification program in industry that recognizes the practical experience needed to succeed at the highest levels of information security. Bringing together all the elements required for a level C position, the CCISO programme combines audit management, governance, information system security controls, human capital management, strategic program development and financial expertise essential to the management of a high-performance information security program. The role of CISO is far too important to be acquired by trial. Management skills at the executive level are not areas that should be learned on the job.
The content of the CCISO programme is based on a thorough understanding of technical subjects and does not devote much time to technical information alone, but rather focuses on the application of technical knowledge in the daily work of an information security framework. The objective of CCISO is to bridge the gap between the executive management knowledge required by CISOs and the technical knowledge of many existing and emerging CISOs. This gap can be crucial when a practitioner attempts to move from middle management to senior management. Much of these skills are traditionally acquired through on-the-job training, but the CCISO training programme can be the key to a successful transition to the highest levels of information security management.
Course outline
Area 1: Governance and risk management –
Define, implement, manage and maintain an information security governance program
- Form of enterprise organisation
- Sector of activity
- Organizational maturity
Information security drivers
Establish an information security management structure
- Organizational structure
- Position of ISOC in the organisational structure
- Executive ISOC
- Non-executive ISOC
Laws, regulations and standards as drivers of policy, standards and procedures
Managing an Information Security Compliance Program
Security policy
- Need for a security policy
- Security policy challenges
Policy content
- Types of policies
- Policy implementation
Reporting structure
Standards and best practices
Leadership and ethics
Code of Ethics EC-Council
Introduction to Risk Management
- Organizational structure
- Position of ISOC in the organisational structure
- Executive ISOC
- Non-executive ISOC
Area 2: Security controls, compliance and audit management +
Information security controls
Identify the organization's information security needs
- Identify optimal framework
- Designing controls
- Control life cycle management
- Classification of controls
- Selection and implementation
- Catalogue of controls
- Maturity of controls
- Monitoring of controls
- Correction of deficiencies
- Maintenance of controls
- Report on controls
- Security Service Catalogue
Compliance management
Laws, regulations and statutes
- FISMA
Regulations
- GDPR
Standards
- ASD — Safety Manual
- Basel III
- FFIEC
- ISO 00 family
- NERC-CIP
- PCI DSS
- Special publications NIST
- SSAE 16
Guidelines and good practices
CIS
- OWASP
Audit management
Expectations and results
Security audit practices
- ISO/IEC Guide
- Internal vs. external audits
- Collaboration with the audit
- Audit process
- General standards
- Compliance-based audits
- Risk-based audits
- Documentation management
- Audit performance
- Evaluation and report
- Correction of findings
- Use of RCMP software
Executive summary
Area 3: Management and operation of the security programme +
Programme management
Define a charter, objectives, requirements, stakeholders and strategies
- Programme Charter
- Objectives
- Requirements
- Stakeholders
- Strategy development
Implementation of a safety programme
Define, develop, manage and monitor the program
- Define budget
- Developing the budget
- Managing the budget
- Monitoring the budget
Defining and developing personnel needs
Team management
- Resolution of personnel problems
- Training and certification
- Career paths
- User awareness
Architecture and Roadmap Management
- Programme architecture
- Road map
Project management and governance
- Project management practices
- Stakeholder management
- Measuring project effectiveness
Business Continuity Management (BCM) and DRP Planning
Data backup and recovery
Safeguard strategy
BCM ISO standards
- BCM
- DRP
Security continuity
- Integration of the CIA model
BCM Plan Test
DRP test
Contingency planning and testing programs to mitigate risks and comply with ALS
Response to computer incidents
- Incident Response Tools
- Incident management
- Incident Communication
- Post-incident analysis
- Test of response procedures
Digital Criminalistics
- Crisis management
- Life cycle of forensics
Executive summary
Area 4: Basic skills in information security +
Access control
- Authentication, authorization and audit
- Authentication
- Authorization
- Audit
- User access restrictions
- Access behaviour management
- Types of control models
- Development of a control plan
- Access administration
Physical security
Design, implement and manage a physical security program
- Physical Risk Assessment
- Location considerations
- Obstacles and prevention
Design of secure installations
- Security Operations Centre
- Classified Information Room
- Forensics Laboratory
- Data centre
- Preparation for physical security audits
Network security
- Network Security Assessments and Planning
- Network architecture challenges
- Network Security Design
Standards, protocols and controls
- Network safety standards
- Protocols
Wireless security (Wi-Fi)
- Network security controls
Terminal security
- Threats to terminals
- Terminal vulnerabilities
- User awareness
- Strengthening of mechanisms
- Journalization of devices
Security of mobile devices
- Mobile risks
- Mobile controls
Internet of Things (IoT) Security
- Protection of IoT devices
Application Security
- Secure SDLC model
- Separation of environments (dev, test, prod)
- Safety test approaches
- DevSecOps
- Waterfall methodology and safety
- Agile and safety methodology
- Alternative approaches to development
- Strengthening applications
- Application Security Technologies
- Version Management and Updates
- Database security
- Strengthening databases
- Good Secure Coding Practices
Encryption technologies
- Encryption and decryption
Cryptosystems
- Blockchain
- Digital signatures and certificates
- PKI
- Key Management
- Hashish
- Encryption algorithms
Encryption strategy
- Identification of critical data
- Deciding what to encrypt
- Define requirements
- Technology selection and management
Virtualization security
- Overview of virtualization
- Risks of virtualization
- Safety issues
- Controls for virtualization
- Reference model
Cloud computing security
- Cloud overview
- Cloud security services and resilience
- Cloud security issues
- Cloud Security Controls
- Protection considerations
Transforming technologies
- Artificial intelligence
- Increased reality
- Autonomous SOC
- Dynamic disappointment
- Software-defined cybersecurity
Executive summary
Area 5: Strategic planning, finance, procurement and vendor management +
Strategic planning
Understanding the Organization
- Understanding the business structure
- Defining and aligning trade and security objectives
- Identify sponsors, stakeholders and influencers
- Understanding organizational finances
Create a strategic security plan
- Strategic planning bases
- Alignment with organizational strategy
- Setting short, medium and long-term tactical goals
- Communication of the strategy
- Creating a safety culture
Design, development and maintenance of a corporate security program
- Providing a solid foundation for the programme
- Architectural views
- Creation of measurements and metrics
- Balanced Scorecard
- Ongoing monitoring and reporting
- Continuous improvement
- ITIL – Continuous Improvement (CSI)
Understanding Business Architecture (BA)
Types of EA
- Zachman frame
- TOGAF
- SABSA
- FEAF
Finance
Understanding funding for security programs
Analyze, plan and develop a budget
- Resource requirements
- Define financial metrics
- Technological renewal
- Financing new projects
- Contingency fund
Security budget management
- Getting financial resources
- Allocate resources
- Budgetary monitoring and control
- Reporting to sponsors and stakeholders
- Balancing Budget
Supply
Procurement Program Concepts and Concepts
- Declaration of objectives (SOO)
- Specifications (SOW)
- Total Cost of Possession (TCO)
- Request for Information (RFI)
- Request for Proposal (RFP)
- Framework contract (MSA)
- Service Level Agreement (SLA)
- Terms and conditions (T&C)
Understand the procurement program
- Internal policies, processes and requirements
- External or regulatory requirements
- Local vs. global requirements
Supply Risk Management
- Standard contractual language
Vendor management
Understanding acquisition policies
- Supply Life Cycle
Application of cost-benefit analysis (CBA) to procurement
Vendor management policies
Contract administration
- Service Delivery and Contract Metrics
- Delivery reports
- Requests for amendments
- Renewal
- Closure of contracts
Delivery insurance
- Validation of compliance with contractual requirements
- Formal delivery audits
- Periodic random audits
- Third Party Certification Services (TPRM)
Executive summary
Demos
Review
Minimum requirements –
- Without prior training: In order to be able to take the CCISO exam without taking any training, candidates must justify 5 years of experience in each of the 5 fields the CCISO, verified via the Application for Eligibility for Examination.
- After training: In order to pass the exam after having completed training, candidates must justify 5 years of experience in 3 of 5 fields the CCISO, verified via the Application for Eligibility for Examination.
Dispenses for CCISO (for self-learning applicants) +
- 1. Governance and Risk Management: Doctorate in Information Security – 3 years, Master in Information Security Management or Engineering – 2 years, Bachelor of Information Security – 2 years.
- 2. Security, Compliance and Audit Management: Doctorate in Information Security – 3 years, Master in Information Security Management or Engineering – 2 years, Bachelor of Information Security – 2 years.
- 3. Management and operation of the security program: Doctorate in Information Security – 3 years, Master in Information Security or Project Management – 2 years, Bachelor of Information Security – 2 years.
- 4. Basic Information Security Skills: Doctorate in Information Security – 3 years, Master in Information Security – 2 years, Bachelor of Information Security – 2 years.
- 5. Strategic Planning, Finance, Procurement and Supplier Management: CPA, MBA, Master in Finance – 3 years.
About the Review +
The CCISO review assesses three cognitive levels:
- Level 1 – Knowledge: This level consists of recalling memorized facts. This is the most basic level, rarely used in certification, as it simply checks the candidate's ability to store information. It is appropriate for basic definitions, standards or any concrete fact.
- Level 2 – Application: This level assesses the ability to understand and apply a given concept. It requires not only knowing the concept, but also understanding how to use it properly. These questions often require additional context before asking the question.
- Level 3 – Analysis: This level aims to identify and resolve a problem by taking into account several variables and context. Analysis questions require going beyond the simple application of a concept by showing how, under certain constraints, this concept can be used to solve a problem.
Success score +
In order to maintain the high integrity of our certification exams, EC-Cuncil exams are offered in several forms (i.e. different question banks). Each version is thoroughly analyzed in beta tests with a representative sample group, under the supervision of a committee of experts. This process ensures that each exam has both academic rigour and applicability in the real world. A rating system determines the difficulty of each question, which then contributes to a « pass threshold » global for each version. To ensure uniform evaluation standards, these thresholds are set for each version and may vary from 60% to 78%.
Details of the examination +
- Number of questions: 150
- Duration of the test: 2.5 hours
- Test format: MCQ
- Method of procurement: ECC Review Portal
Roles
- Director, Chief Information Security Officer (CISO), Google Cloud
- Deputy CISO
- VP & Chief Information Security Officer
- Chief Information Security Officer (VP)
- System Dir, Info Sys. Security – CISO
- Chief Privacy Officer
- ASSOCIATE VICE PRESIDENT AND CHIEF INFORMATION SECURITY OFFICER
- Chief Security Officer
- IOC COO
- Assistant Executive Director – Chief Information Security Officer
- CISO Threat Intel
- Chief Technical Officer (CTO)
- Chief Data Officer
- VP, Information Security
- Information Security Officer
- Chief Compliance Officer
- Senior Cyber Security IOC SME
- Regional Chief Information Officer
OhPhish
About OhPhish
OhPhish is a great way for CCISOs to boost their company's safety awareness programs free of charge. It is a simple and user-friendly solution to conduct phishing simulations and online training. Launching phishing simulations is facilitated by pre-existing models and connectors to recognized identity directories (such as Active Directory). The solution not only sends e-mails and personalized campaigns, it also tracks in real time responses and actions (such as links clicks or the opening of attachments), thus providing detailed trends and reports per user, department or other key demographic criteria.


