Vous êtes sur la page 1sur 11

24th - 27th June 2019

India
GET CERTIFIED
Course
TM
Outline

C CISO
Certified Chief Information Security Officer
Duration: 4 DAYS

Certification: C|CISO Certified Chief Information Security Officer

(1 year exam voucher-redeem option)

The C|CISO course has certified leading information security professionals


around the world and is the first of its kind training and certification
Workshop program aimed at producing top-level Information Security Leaders.
Overview The C|CISO does not focus solely on technical knowledge but on the
application of information security management principles from an
The C|CISO Training Workshop is a premium Training & Certification program executive management point of view. The program was developed by
for aspiring Chief Information Security Officers that wish to penetrate the seasoned CISOs for current and aspiring CISOs. C|CISO Material assumes
inner sanctum of Information Security Management and Leadership. a high-level understanding of technical topics and doesn’t spend much
During the C|CISO Training Workshop, participants will be challenged to time on strictly technical information, but rather on the application of
develop a business continuity plan for a company in a given industry and technical knowledge to an information security executive’s day-to-day
situation, use metrics to communicate cyber risk for different audiences, work.
and describe how to align a given security program with the goals of the The C|CISO aims to bridge the gap between the executive management
business in which it resides, among many other exercises. The challenges are knowledge that CISOs need and the technical knowledge that many
aimed at helping aspiring leaders develop business acumen, practice on their aspiring CISOs have. This can be a crucial gap as a practitioner endeavors
managerial skills and further hone their technical expertise by diving deep to move from mid-management to upper, executive management roles.
into how security should be injected into the procurement process and how a Much of this is traditionally learned as on the job training, but the C|CISO
CISO should manage budgets and assets. Training Program can be the key to a successful transition to the highest
ranks of information security management.
The Top 3 reasons you should consider attaining the

Are you ready Certified CISO (CCISO) Certification:

to be a CISO?
CCISO WAS DESIGNED BY CISOs
For CISOs and aspiring CISOs to create true leaders. The CCISO Advisory
Do you feel comfortable defending your security
Board is made up of CISOs from government and private sectors spanning
risk analysis methodology to your board?
industries and areas of expertise. Security leaders from Amtrak, HP, the City
What’s your long-term security strategy? of San Francisco, Lennar, the Center for Disease Control, universities, and
consulting firms all contributed their vast knowledge to creating this program
How mature is your security program? to address the lack of leadership training in information security.

Are you compliant yet still at risk for a major,


brand-damaging breach?
CCISO IS NOT FOCUSED ON THE TECHNICAL ASPECTS
OF THE CISO JOB ROLE
That material is covered by many other certifications on the market.
The content of the CCISO Program is from the perspective of executive
management. The training program is built around responding to scenarios
written by our contributing CISOs drawing on their experiences leading
some of the world’s top organizations’ security programs. During the CCISO
workshop, students will be challenged to develop a business continuity plan
for a company in a given industry and situation, use metrics to communicate
risk for different audiences, and describe how to align a given security
program with the goals of the business in which it resides, among
many other exercises.

CCISO COVERS STRATEGIC AND FINANCIAL MANAGEMENT


Like no other program on the market. Recent surveys suggest that other
C-Level executives do not view the CISO as a true peer. In order to become
true leaders in their organizations, IS professionals are required to have a
higher business acumen than has ever been required previously. The CCISO
program dives deep into how security should be injected into the procurement
process and how a CISO should manage budgets and assets – vital skills and
 https://ciso.eccouncil.org/
knowledge that many in the profession lack.
There is a common misperception that This is simply not the case. CCISO is the step anyone interested in an executive career in information
security should take after completing courses like CISSP, CISA, CISM, etc. The chart below describes
CCISO is a competitor to CISSP — how the content in each of these programs compares to CCISO.

Domain One
20% 25% 35% 55% 10%
Governance (Policy, Legal
& Compliance)

Domain Two
33% 60% 6% 40% 19%
IS Management Controls &
Auditing Management

Domain Three
40% 20% 50% 60% 21%
Management- Projects,
Technology, & Operations

Domain Four
64% 80% 11% 25% 65%
Information Security Core
Competencies

Domain Five
22% 10% 23% 15% 10%
Strategic Planning and
Finance

The following is a summary of the learning objectives for each Domain:

Domain 1 Domain 2 Domain 3 Domain 4 Domain 5

Domain 1 covers Policy, Legal, Domain 2 is concerned with Audit Domain 3 covers many of the day-to- Domain 4 delves into the technology of Domain 5 covers Finance and Strategic
and Compliance issues involved in and Risk Management, including day aspects of the CISO job including the CISO’s role, but from an executive management, some of the key skills that
the executive management of an understanding your organization’s risk project, technology, and operations perspective. help CISOs rise to the level of their peer
Information Security Program. tolerance and managing accordingly. management. C-Level executives.
The 5
Domains

Domain 1: Governance (Policy, Legal & Compliance)


Domain 2: IS Management Controls and Auditing
Management
Domain 3: Management – Projects and Operations
(Projects, Technology & Operations)
Domain 4: Information Security Core Competencies
Domain 5: Strategic Planning & Finance.

The
Exam

The C|CISO Exam was developed by practicing CISOs


and based on the real-world scenarios professionals
from across industries have faced while securing
some of the most prestigious organizations in the
world. Applicant’s knowledge in all five of the C|CISO
Domains will be tested on the exam that focuses on
scenario-based questions and requires applicants to
apply their real-world experience in order to answer
successfully. To that end, in order to qualify to sit
for the C|CISO Exam after taking the C|CISO class,
applicants have at least 5 years of information security
experience in 3 or more of the C|CISO Domains.
Any student lacking this experience may take the
EC-Council Information Security Management
exam and earn the EISM certification. In order to
sit for the C|CISO exam and earn the certification,
candidates must meet the basic C|CISO
requirements. Candidates who do not yet meet
the C|CISO requirements but are interested in
information security management can pursue the
EC-Council Information Security Management
(EISM) certification.
CE RTI F I E D CHI E F I NF O R M ATI O N S EC U R IT Y O FFIC ER

What is CCISO? Course Content Who’s It For?

The EC-Council Certified Chief Information CCISO is not a technical course but a The CCISO program is for executives looking
Security Officer program is designed to bring leadership course designed specifically for to hone their skills & learn to better align their
middle managers up to the level of Executive experienced InfoSec professionals. The information security programs to the goals of
Leaders & hone the skills of existing InfoSec CCISO course covers the 5 CCISO Domains organization as well as aspiring CISOs. Other
information security management certification
leaders. The CCISO program was developed with deep dives into scenarios taken from
programs focus on middle management. CCISO
by sitting CISOs to train the next generation of the experience of the CISOs who contributed
focuses on exposing middle managers to
leaders. to the building of the Body of Knowledge, executive-level content as well as encouraging
course, & exam. existing CISOs to continually improve their own
processes & programs.

Experience Requirements 5 CCISO Domains Exam Information

In order to sit for the CCISO exam, applicants that • Domain 1 - Governance EXAM TITLE
attend training must apply via the CCISO Eligibility AVAILABILITY
• Domain 2 - Risk Management, Controls, & • EC-Council Certified CISO
• ECC Exam Portal
Application showing 5 years of experience in at Audit Management EXAM CODE
least 3 of the 5 CCISO domains (experience can TEST FORMAT
• Domain 3 - Program & Operations • 712-50
be overlapping). Students who do not meeting the • Scenario-based
eligibility criteria for the CCISO exam can sit for the Management # OF QUESTIONS multiple choice
EC-Council Information Security Manager (EISM) • 150
• Domain 4 - IS Core Concepts PASSING SCORE
exam & apply for the CCISO exam when they meet • 72%
DURATION
the requirements. • Domain 5 - Strategic Planning, Finance, &
• 2.5 Hours
Vendor Management

https://ciso.eccouncil.org/ EC-COUNCIL
For More Information on Certification: https://cert.eccouncil.org/application-process-eligibility.html Hackers are here. Where are you?
GET CERTIFIED Course
Outline

Duration: 4 DAYS

Certification: Certified Ethical Hacker (C|EHv10)


(1 year exam voucher-redeem option)

This is for the first time that EC Council is coming up with class room training by our
EC Council Certified Expert Trainer in your region. You will have hands on experience
on advanced hacking tools & techniques used by hackers & IS professionals. This
course will immerse you into the Hacker Mindset so that you will be able to defend
against future attacks. This is 10th version of C|EH. Our certification is recognized
and accredited by American National Standards Institute (ANSI), National Initiative
Workshop for Cyber Security Education (NICE), CNSS, DoD, NICF, Department of Veterans
Overview Affairs, KOMLEK, MSC.

EC Council’s C|EH training workshop is the worlds most advanced 1. Introduction to Ethical Hacking 11. Session Hijacking
certified ethical hacking course with 19 of the most current 2. Footprinting and Reconnaissance 12. Evading IDS, Firewalls, and Honeypots
security domains any individual will ever want to know when they 3. Scanning Networks 13. Hacking Web Servers
are planning to beef up the information security posture of their 4. Enumeration 14. Hacking Web Applications
organization. In 18 comprehensive modules, the course covers 270 5. Vulnerability Analysis 15. SQL Injection
attack technologies, commonly used by hackers. The accredited 6. System Hacking 16. Hacking Wireless Networks
course provides the advanced hacking tools and techniques used 7. Malware Threats 17. Hacking Mobile Platforms
by hackers and information security professionals alike to break 8. Sniffing 18. IoT Hacking
into an organization. As we put it, “To beat a hacker, you need to 9. Social Engineering 19. Cloud Computing
think like a hacker”. 10. Denial-of-Service 20. Cryptography

-- Accredited & Recognized by --


Top 10 Critical Components of C|EH v10

100% Compliance to NICE 2.0 Framework Inclusion of complete Malware Analysis Process
C|EH v10 maps 100 percent to NICE framework’s Protect and Defend Discover and learn how to reverse engineer malware in order to
specialty area determine the origin, functionality, and potential impact of a malware.
By performing malware analysis, the detailed information regarding
Inclusion of New Module - Vulnerability Analysis
the malware can be extracted, analysed and this is a crucial skill of an
Learn how to perform vulnerability analysis to identify security loopholes ethical hacker.
in the target organization’s network, communication infrastructure,
Hands-on Program
and end systems. This module covers the vulnerability management
life cycle, and various approaches and tools used to perform the More than 40 percent of class time is dedicated to the learning of
vulnerability assessment. practical skills and this is achieved through EC-Council labs. Theory
to practice ratio for C|EH program is 60:40 providing students with a
IoT Hacking
hands-on experience of the latest hacking techniques, methodologies,
Understand the potential threats to IoT platforms and learn how to tools, tricks, etc.
defend IoT devices securely.
C|EH comes integrated with labs to emphasize the learning objectives.
Focus on Emerging Attack Vectors (e.g., Cloud, AI, ML, etc.) It also provides additional labs that students can practice post training
on their own time, through EC-Council’s iLabs platform which students
C|EH provides an insight into cloud computing threats and cloud
can purchase separately.
computing attacks. It discusses cloud computing security and the
necessary tools. It provides an overview of pen-testing steps which an Lab environment simulates a real-time environment
ethical hacker should follow to perform a security assessment of the
C|EH v10 lab environment consists of latest operating systems including
cloud environment.
Windows Server 2016 and Windows 10 configured with Domain
Artificial Intelligence (AI) is an emerging solution used in defending Controller, firewalls, and vulnerable web applications for honing the
networks against various attacks that an antivirus scan cannot detect. skills of hacking.
Learn how this can be deployed through the C|EH course.
Covers latest hacking tools (Based on Windows, MAC, Linux, and
Hacking Challenges at the End of Each Module Mobile)
Challenges at the end of each modules ensures you can practice what The C|EH v10 course includes a library of tools that is required by security
you have learnt. They help student understand how knowledge can be practitioners and pentesters to find uncover vulnerabilities across
transformed as skills and can be used to solve real-life issues. different operation platforms. This provides a wider option to students
than any other programs in the market.
Coverage of latest Malware
ANSI Accreditation
The course is updated to include the latest ransomware, banking and
financial malware, IoT botnets, Android malwares and more! ANSI accreditation signifies that the certification holder has completed
a prescribed course of study designed specifically to meet predefined
industry requirements.
CERTIFIE D ET H I CA L H A C KER

What is C|EH? Course Content Who’s It For?

The most desired information security •Over 140 labs that mimic real scenarios •Auditors
training program in the industry, •Over 2,200 commonly used hacking •Security Professionals
the accredited course provides the tools to immerse you in the hacker
advanced hacking tools & techniques world •Site Administrators
used by hackers & information security •Over 1,685 graphically rich, specially •Anyone concerned with network
professionals alike to break into an designed slides to help you grasp infrastructure
organization. complex security concepts in depth

What’s New in CEH V10? 5 Phases of Ethical Hacking Exam Information

•Inclusion of New Modules - IoT Hacking •Reconnaissance EXAM TITLE DURATION


and Vulnerability Analysis • Ethical Hacker • 4 Hours
•Focus on Emerging Attack Vectors - Cloud, •Enumeration
EXAM CODE AVAILABILITY
AI, ML, etc.
•Hacking Challenges at the End of Each
•Gaining Access • 312-50 • ECC Exam Portal, Vue

Module •Maintaining Access # OF QUESTIONS TEST FORMAT


•Coverage of the Latest Malware • 125 • Multiple Choice
•Inclusion of complete Malware Analysis •Covering Tracks
Process
•Covers latest hacking tools

EC-COUNCIL
https://cert.eccouncil.org/application-process-eligibility.html Hackers are here. Where are you?
CERTIFIED ETHICAL HACKER (PRACTICAL)
Contact
Details

TRAININGS

VENKATESH NADAR
venkatesh.n@eccouncil.org

Vous aimerez peut-être aussi