img

Certified Information Security Officer (CISO)


Course Description:

The Certified Information Security Officer (CISO) is in charge of overseeing the security of information, cybersecurity, and managing IT risks. They use established frameworks for information security and risk management that are widely accepted in the industry. The CCertified Information Security Officer (CISO) is a high-level executive responsible for managing the organization's information security. They ensure that all IT systems and information are protected according to the company's objectives. The CISO role involves more than just knowledge of information security; it also involves aligning technology and security with the overall vision and goals of the organization. Although the day-to-day tasks of a CISO can vary, the required skills generally fall into three main categories: 1. Managing risks and ensuring compliance with regulations. 2. Having technical expertise in IT. 3. Possessing strong communication and leadership skills.


$ 800.00 $ 585.00

Browse Certifications Info

Certification Overview

The Information Security Officer (ISO) is in charge of overseeing the security of information, cybersecurity, and managing IT risks. They use established frameworks for information security and risk management that are widely accepted in the industry. The Certified Information Security Officer (CISO) is a high-level executive responsible for managing the organization's information security. They ensure that all IT systems and information are protected according to the company's objectives. The CISO role involves more than just knowledge of information security; it also involves aligning technology and security with the overall vision and goals of the organization. Although the day-to-day tasks of a CISO can vary, the required skills generally fall into three main categories: 1. Managing risks and ensuring compliance with regulations. 2. Having technical expertise in IT. 3. Possessing strong communication and leadership skills.

E-Course Duration:

Exam Information

  • The test has 50 multiple-choice questions. To pass, you need to answer at least 36 of them correctly.

  • Tests are done online and watched over by a webcam. As long as you have a good internet connection, you can take the tests wherever and whenever you want.

  • The exam lasts for an hour and Ten mintues, which is the same as 70 minutes.

  • During the exam with ProctorU, you can't use any outside sources for information. They'll give you more information about what you're allowed to use, like your ID.

  • If you don't pass the exam on your second try, you have to wait at least two weeks before you can try again for the third time or any time after that. You can take the exam as many times as you need.

  • The CISO™ Certificate is valid for five years. To keep it current, you can either retake the exam or finish the E-Course for CISO™ to earn continuing education units (CEUs). Renewing your certificate before it expires will help you keep your professional status and credentials.

  • N/A

  • N/A

  • You don't need to complete an E-Course from GIPMCBok portal to get the Certified Information Security Officer (CISO)™ Certification. However, we suggest doing the E-Course because many questions in the real exam come from it.

Course Outline

Module 1 - Governance (Policy, Legal, and Compliance)

    • Information Security Management Program
    • Defining an Information Security Governance Program
    • Regulatory and Legal Compliance
    • Risk Management

     

Module 2 - IS Management Controls and Auditing Management

    • Designing, deploying, and managing security controls
    • Understanding security controls types and objectives
    • Implementing control assurance frameworks
    • Understanding the audit management process

Module 3 - Security Program Management & Operations

    • The role of the CISO
    • Information Security Projects
    • Integration of security requirements into other operational processes (change management, version control, disaster recovery, etc.)
    • Domain 4: Information Security Core Concepts

Module 4 - Information Security Core Concepts

    • Access Controls
    • Physical Security
    • Disaster Recovery and Business Continuity Planning
    • Network Security
    • Threat and Vulnerability Management
    • Application Security
    • System Security
    • Encryption
    • Vulnerability Assessments and Penetration Testing
    • Computer Forensics and Incident Response

Module 5 - Strategic Planning, Finance, & Vendor Management

    • Security Strategic Planning
    • Alignment with business goals and risk tolerance
    • Security emerging trends
    • Key Performance Indicators (KPI)
    • Financial Planning
    • Development of business cases for security
    • Analyzing, forecasting, and developing a capital expense budget
    • Analyzing, forecasting, and developing an operating expense budget
    • Return on Investment (ROI) and cost-benefit analysis
    • Vendor management
    • Integrating security requirements into the contractual agreement and procurement process

Target Audience

  • Network Engineers with security specialization
  • Experienced IT Professionals engaged in information security management
  • Those who perform CISO functions, but don’t have an official title
  • All the professionals who aspire to reach top-level position in information security profession.
Subscribe

Join Our Newsletter Now

Subscribe to GIPMC mailing list to receive update on new Certifications, Special Offers and Discount Information.