top of page

EC-Council’s Certified Chief Information Security Officer (CCISO) Program has certified leading information security professionals around the world. A core group of high-level information security executives, the CCISO Advisory Board, formed the foundation of the program and outlined the content covered by the exam, body of knowledge, and training. Some members of the Board contributed as authors, others as exam writers, others as quality assurance checks, and still others as instructors. Each segment of the program was developed with the aspiring and sitting CISO in mind and looks to transfer the knowledge of seasoned executives to the next generation of leaders in the areas that are most critical in the development and maintenance of a successful information security program.

Certified Chief Information Security Officer | CCISO Certification

$3,499.00Price
  • Domain 1: Governance and Risk Management

    1. Define, Implement, Manage, and Maintain an Information Security Governance Program

    • 1.1. Form of Business Organization
    • 1.2. Industry
    • 1.3. Organizational Maturity

    2. Information Security Drivers

    3. Establishing an information security management structure

    • 3.1. Organizational Structure
    • 3.2. Where does the CISO fit within the organizational structure
    • 3.3. The Executive CISO
    • 3.4. Nonexecutive CISO

    4. Laws/Regulations/Standards as drivers of Organizational Policy/Standards/Procedures

    5. Managing an enterprise information security compliance program

    • 5.1. Security Policy
    • 5.1.1. Necessity of a Security Policy
    • 5.1.2. Security Policy Challenges
    • 5.2. Policy Content
    • 5.2.1. Types of Policies
    • 5.2.2. Policy Implementation
    • 5.3. Reporting Structure
    • 5.4. Standards and best practices
    • 5.5. Leadership and Ethics
    • 5.6. EC-Council Code of Ethics

    6. Introduction to Risk Management

    • 3.1. Organizational Structure
    • 3.2. Where does the CISO fit within the organizational structure
    • 3.3. The Executive CISO
    • 3.4. Nonexecutive CISO
bottom of page