Académique Documents
Professionnel Documents
Culture Documents
India
GET CERTIFIED
Course
TM
Outline
C CISO
Certified Chief Information Security Officer
Duration: 4 DAYS
to be a CISO?
CCISO WAS DESIGNED BY CISOs
For CISOs and aspiring CISOs to create true leaders. The CCISO Advisory
Do you feel comfortable defending your security
Board is made up of CISOs from government and private sectors spanning
risk analysis methodology to your board?
industries and areas of expertise. Security leaders from Amtrak, HP, the City
What’s your long-term security strategy? of San Francisco, Lennar, the Center for Disease Control, universities, and
consulting firms all contributed their vast knowledge to creating this program
How mature is your security program? to address the lack of leadership training in information security.
Domain One
20% 25% 35% 55% 10%
Governance (Policy, Legal
& Compliance)
Domain Two
33% 60% 6% 40% 19%
IS Management Controls &
Auditing Management
Domain Three
40% 20% 50% 60% 21%
Management- Projects,
Technology, & Operations
Domain Four
64% 80% 11% 25% 65%
Information Security Core
Competencies
Domain Five
22% 10% 23% 15% 10%
Strategic Planning and
Finance
Domain 1 covers Policy, Legal, Domain 2 is concerned with Audit Domain 3 covers many of the day-to- Domain 4 delves into the technology of Domain 5 covers Finance and Strategic
and Compliance issues involved in and Risk Management, including day aspects of the CISO job including the CISO’s role, but from an executive management, some of the key skills that
the executive management of an understanding your organization’s risk project, technology, and operations perspective. help CISOs rise to the level of their peer
Information Security Program. tolerance and managing accordingly. management. C-Level executives.
The 5
Domains
The
Exam
The EC-Council Certified Chief Information CCISO is not a technical course but a The CCISO program is for executives looking
Security Officer program is designed to bring leadership course designed specifically for to hone their skills & learn to better align their
middle managers up to the level of Executive experienced InfoSec professionals. The information security programs to the goals of
Leaders & hone the skills of existing InfoSec CCISO course covers the 5 CCISO Domains organization as well as aspiring CISOs. Other
information security management certification
leaders. The CCISO program was developed with deep dives into scenarios taken from
programs focus on middle management. CCISO
by sitting CISOs to train the next generation of the experience of the CISOs who contributed
focuses on exposing middle managers to
leaders. to the building of the Body of Knowledge, executive-level content as well as encouraging
course, & exam. existing CISOs to continually improve their own
processes & programs.
In order to sit for the CCISO exam, applicants that • Domain 1 - Governance EXAM TITLE
attend training must apply via the CCISO Eligibility AVAILABILITY
• Domain 2 - Risk Management, Controls, & • EC-Council Certified CISO
• ECC Exam Portal
Application showing 5 years of experience in at Audit Management EXAM CODE
least 3 of the 5 CCISO domains (experience can TEST FORMAT
• Domain 3 - Program & Operations • 712-50
be overlapping). Students who do not meeting the • Scenario-based
eligibility criteria for the CCISO exam can sit for the Management # OF QUESTIONS multiple choice
EC-Council Information Security Manager (EISM) • 150
• Domain 4 - IS Core Concepts PASSING SCORE
exam & apply for the CCISO exam when they meet • 72%
DURATION
the requirements. • Domain 5 - Strategic Planning, Finance, &
• 2.5 Hours
Vendor Management
https://ciso.eccouncil.org/ EC-COUNCIL
For More Information on Certification: https://cert.eccouncil.org/application-process-eligibility.html Hackers are here. Where are you?
GET CERTIFIED Course
Outline
Duration: 4 DAYS
This is for the first time that EC Council is coming up with class room training by our
EC Council Certified Expert Trainer in your region. You will have hands on experience
on advanced hacking tools & techniques used by hackers & IS professionals. This
course will immerse you into the Hacker Mindset so that you will be able to defend
against future attacks. This is 10th version of C|EH. Our certification is recognized
and accredited by American National Standards Institute (ANSI), National Initiative
Workshop for Cyber Security Education (NICE), CNSS, DoD, NICF, Department of Veterans
Overview Affairs, KOMLEK, MSC.
EC Council’s C|EH training workshop is the worlds most advanced 1. Introduction to Ethical Hacking 11. Session Hijacking
certified ethical hacking course with 19 of the most current 2. Footprinting and Reconnaissance 12. Evading IDS, Firewalls, and Honeypots
security domains any individual will ever want to know when they 3. Scanning Networks 13. Hacking Web Servers
are planning to beef up the information security posture of their 4. Enumeration 14. Hacking Web Applications
organization. In 18 comprehensive modules, the course covers 270 5. Vulnerability Analysis 15. SQL Injection
attack technologies, commonly used by hackers. The accredited 6. System Hacking 16. Hacking Wireless Networks
course provides the advanced hacking tools and techniques used 7. Malware Threats 17. Hacking Mobile Platforms
by hackers and information security professionals alike to break 8. Sniffing 18. IoT Hacking
into an organization. As we put it, “To beat a hacker, you need to 9. Social Engineering 19. Cloud Computing
think like a hacker”. 10. Denial-of-Service 20. Cryptography
100% Compliance to NICE 2.0 Framework Inclusion of complete Malware Analysis Process
C|EH v10 maps 100 percent to NICE framework’s Protect and Defend Discover and learn how to reverse engineer malware in order to
specialty area determine the origin, functionality, and potential impact of a malware.
By performing malware analysis, the detailed information regarding
Inclusion of New Module - Vulnerability Analysis
the malware can be extracted, analysed and this is a crucial skill of an
Learn how to perform vulnerability analysis to identify security loopholes ethical hacker.
in the target organization’s network, communication infrastructure,
Hands-on Program
and end systems. This module covers the vulnerability management
life cycle, and various approaches and tools used to perform the More than 40 percent of class time is dedicated to the learning of
vulnerability assessment. practical skills and this is achieved through EC-Council labs. Theory
to practice ratio for C|EH program is 60:40 providing students with a
IoT Hacking
hands-on experience of the latest hacking techniques, methodologies,
Understand the potential threats to IoT platforms and learn how to tools, tricks, etc.
defend IoT devices securely.
C|EH comes integrated with labs to emphasize the learning objectives.
Focus on Emerging Attack Vectors (e.g., Cloud, AI, ML, etc.) It also provides additional labs that students can practice post training
on their own time, through EC-Council’s iLabs platform which students
C|EH provides an insight into cloud computing threats and cloud
can purchase separately.
computing attacks. It discusses cloud computing security and the
necessary tools. It provides an overview of pen-testing steps which an Lab environment simulates a real-time environment
ethical hacker should follow to perform a security assessment of the
C|EH v10 lab environment consists of latest operating systems including
cloud environment.
Windows Server 2016 and Windows 10 configured with Domain
Artificial Intelligence (AI) is an emerging solution used in defending Controller, firewalls, and vulnerable web applications for honing the
networks against various attacks that an antivirus scan cannot detect. skills of hacking.
Learn how this can be deployed through the C|EH course.
Covers latest hacking tools (Based on Windows, MAC, Linux, and
Hacking Challenges at the End of Each Module Mobile)
Challenges at the end of each modules ensures you can practice what The C|EH v10 course includes a library of tools that is required by security
you have learnt. They help student understand how knowledge can be practitioners and pentesters to find uncover vulnerabilities across
transformed as skills and can be used to solve real-life issues. different operation platforms. This provides a wider option to students
than any other programs in the market.
Coverage of latest Malware
ANSI Accreditation
The course is updated to include the latest ransomware, banking and
financial malware, IoT botnets, Android malwares and more! ANSI accreditation signifies that the certification holder has completed
a prescribed course of study designed specifically to meet predefined
industry requirements.
CERTIFIE D ET H I CA L H A C KER
The most desired information security •Over 140 labs that mimic real scenarios •Auditors
training program in the industry, •Over 2,200 commonly used hacking •Security Professionals
the accredited course provides the tools to immerse you in the hacker
advanced hacking tools & techniques world •Site Administrators
used by hackers & information security •Over 1,685 graphically rich, specially •Anyone concerned with network
professionals alike to break into an designed slides to help you grasp infrastructure
organization. complex security concepts in depth
EC-COUNCIL
https://cert.eccouncil.org/application-process-eligibility.html Hackers are here. Where are you?
CERTIFIED ETHICAL HACKER (PRACTICAL)
Contact
Details
TRAININGS
VENKATESH NADAR
venkatesh.n@eccouncil.org