Acumen IT Training, Inc.

CERTIFIED CHIEF INFORMATION SECURITY OFFICER (CCISO)

COURSE DESCRIPTION

EC-Council Certified Chief Information Security Officer (CCISO) is a premier certification course for the professionals aiming to build successful information security program. The certification will give you a “big picture” knowledge required in networking role to build robust networking topologies interacting to form a secure networks. Candidates will understand the best practices required to develop secure IT networking environment and infrastructure.

The CCISO certification will entitle you with the most aspiring title of being an information security professional. The certification will validate and upgrade your skills to use the devices used in CISO systems for communication.

COURSE OUTLINE

Module 1: Governance

  • Qualifying areas under Domain 1 include (but are not limited to) the following:
  • Define, implement, manage and maintain an information security governance program that includes leadership, organizational structures and processes.
  • Align information security governance framework with organizational goals and governance, i.e., leadership style, philosophy, values, standards and policies.
  • Establish information security management structure.
  • Establish a framework for information security governance monitoring (considering cost/benefits analyses of controls and ROI).

 

Module 2: Management Controls and Auditing Management

  • Information Security Management Controls:
  • Identify the organization’s operational process and objectives as well as risk tolerance level.
  • Design information systems controls in alignment with the operational needs and goals and conduct testing prior to implementation to ensure effectiveness and efficiency.
  • Identify and select the resources required to effectively implement and maintain information systems controls. Such resources can include human capital, information, infrastructure, and architecture (e.g., platforms, operating systems, networks, databases

Module 3: Management Projects and Operations.

  • Qualifying areas under Domain 3 include (but are not limited to) the following:
  • For each information systems project develop a clear project scope statement in alignment with organizational objectives.
  • Define activities needed to successfully execute the information systems program, estimate activity duration, and develop a schedule and staffing plan.
  • Develop, manage and monitor the information systems program budget, estimate and control costs of individual projects.
  • Identify, negotiate, acquire and manage the resources needed for successful design and implementation of the information systems program (e.g., people, infrastructure, and architecture).
  • Acquire, develop and manage information security project team.

 

Module 4: Information Security Core Competence

  • Access Control
  • Identify the criteria for mandatory and discretionary access control, understand the different factors that help in implementation of access controls and design an access control plan.
  • Implement and manage an access control plan in alignment with the basic principles that govern the access control systems such as need-to-know.
  • Identify different access control systems such as ID cards and biometrics.
  • Understand the importance of warning banners for implementing access rules
  • Develop procedures to ensure system users are aware of their IA responsibilities before granting access to the information systems.
  • Social Engineering, Phishing Attacks, Identity Theft
Please contact us for the full course outline, schedules and for booking a private class.
;