Course Outline

Day 1: Fundamentals of information security and the role of a CISO

Day 2: Information security compliance program, risk management, and security architecture and design

Day 3: Security controls, incident management, and change management

Day 4: Information security awareness, monitoring and measurement, and continual improvement

Day 5: Certification exam
 

--
 The “PECB Chief Information Security Officer exam meets the requirements of the PECB Examination and Certification Program (ECP). It covers the following competency domains:

Domain 1: Fundamental concepts of information security

Domain 2: The role of CISO in an information security program

Domain 3: Selecting a security compliance program, risk management, and security architecture and design

Domain 4: Operational aspects of information security controls, incident management, and change management

Domain 5: Fostering an information security culture, monitoring, measuring, and improving an information security program
--


After successfully passing the exam, you can apply for one of the credentials shown below. You will receive the certificate once you comply with all the requirements related to the selected credential.

The requirements for PECB Chief Information Security Officer certifications are as follows:

CredentialExamProfessional experienceCISOMS project experienceOther requirements
PECB Certified Information Security OfficerPECB Chief Information Security Officer examNoneNoneSigning the PECB Code of Ethics
PECB Certified Chief Information Security OfficerPECB Chief Information Security Officer examFive years: Two years of work experience in information securityProject activities: a total of 300 hoursSigning the PECB Code of Ethics

Effective information security practices for a CISO should adhere to best information security management practices, encompassing the following key aspects:

  • Developing security business and communication practices
  • Establishing information security objectives and metrics 
  • Ensuring that the organization complies with relevant information security laws and regulations
  • Enforcing adherence to information security practices and building a security culture

Requirements

The main requirement for participating in this training course is having a fundamental understanding of information security principles and concepts.

 35 Hours

Number of participants


Price per participant

Testimonials (4)

Upcoming Courses

Related Categories