Orbus-300x73 (1)

Certified Chief Information Security Officer (CCISO)

EC-Council Certified Chief Information Security Officer (CCISO) is a premier certification  course for the professionals
aiming to build successful information security program.

Description

The  certification will give you a “big picture” knowledge required in networking roles to build robust  networking topologies interacting to form secure networks. Candidates will understand the  best practices required to develop a secure IT networking environment and infrastructure. 

The CISCO certification will entitle him with the most aspiring title of being an information  security professional. The certification will validate and upgrade your skills to use the devices  used in CISCO systems for communication.

Pre-requisites

  • Basic knowledge of Networking
  • Knowledge of server and network components

Key Accomplishments

  • Define, implement, and manage an information security governance program that includes  leadership, organizational structures and processes. 
  • Assess the major enterprise risk factors for compliance. 
  • Design and develop a program to monitor firewalls and identify firewall configuration  issues. 
  • Identify vulnerability and attacks associated with wireless networks and manage different  wireless network security tools. 
  • Deploy and manage anti-virus systems. 
  • Understand various system-engineering practices. 
  • Identify the volatile and persistent system information. 
  • Develop and manage an organizational digital forensic program. 
  • Identify the best practices to acquire, store and process digital evidence.
  • Define key performance indicators and measure effectiveness on continuous basis.
  • Allocate financial resources to projects, processes and units within information security  program. 
  • Identify and report financial metrics to stakeholders.
  • Understand the IA security requirements to be included in statements of work and other  appropriate procurement documents in this CCISO certification training program.

Course content

  • Governance
  • Management Controls and Auditing Management 
  • Information Security Management Controls 
  • Auditing Management
  • Management Projects and Operations
  • Information Security Core Competence 
  • Access Control 
  • Social Engineering, Phishing Attacks, Identity Theft 
  • Physical Security 
  • Risk Management
  • Disaster Recovery and Business Continuity Planning 
  • Firewall, IDS/IPS and Network Defense Systems 
  • Wireless Security 
  • Virus, Trojans and Malware Threats 
  • Secure Coding Best Practices and Securing Web Applications 
  • Hardening OS 
  • Encryption Technologies 
  • Vulnerability Assessment And Penetration Testing 
  • Computer Forensics And Incident Response
  • Strategic Planning and Finance 
  • Strategic Planning 
  • Finance
This course includes:
share it :

Start your learning journey today! Enroll now in our online course.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Related courses

SailPoint IIQ Advanced takes identity governance to a...

(4.7)
4.7/5

Ping Identity Implementation involves the deployment...

(4.5)
4.5/5

ForgeRock OpenAM Implementation...

(4.2)
4.2/5

SailPoint IdentityNow Implementation centers around ....

(4.7)
4.7/5

Dear Learner

Take a step closer to glow and grow in your career