EC-Council Certified Chief Information Security Officer (CCISO) E-learning and Exam Voucher
676 500 Ft + ÁFA helyett 586 500 Ft + ÁFA
The CCISO certification is an industry-leading program that recognises the real-world experience necessary to succeed at the highest executive levels of information security. Bringing together all the components required for C-Level positions, the CCISO program combines audit management, governance, IS controls, human capital management, strategic program development and the financial expertise vital for leading a highly successful IS program. The CCISO Training Program can be the key to a successful transition to the highest ranks of information security management.
English knowledge and in order to sit for the CCISO exam, applicants attending the training must apply via the CCISO Eligibility Application, showing 5 years of experience in at least 3 of 5 CCISO domains (experience can be overlapping). Students who do not meet the eligibility criteria for the CCISO exam can sit for the EC-Council Information Security Manager (EISM) exam & apply for the CCISO exam once they meet the requirements.
The CCISO program is for executives looking to hone their skills & learn to better align their information security programs to the goals of the organisation as well as aspiring CISOs. Other information security management certification programs focus on middle management. CCISO focuses on exposing middle managers to executive-level content as well as encouraging existing CISOs to continually improve their own processes & programs.
EC Council is sourcing E-Learning training and certification partners globally for the iLearn Division. iLearn is EC-Council’s Official Training program, where a learner learns through instructor-led self-paced video-based training methodology. Self-paced in that a certification candidate can set its own learning pace by pausing the lectures and returning to their studies as their schedule permits.
THE ADVANTAGE OF iLEARN IS THAT IT HAS:
Step by step guide from EC Council’s Master trainers who teach virtual lessons through HD video
Rich content equivalent to our classroom training
Access iLabs, the virtual simulated lab with more than 140 lab exercises and 2200 hacking tools inbuilt in the system
A convenient 365-days access our training content on the web
A cost-effective solution to training without additional time investment.
THE iLEARN PACKAGE INCLUDES:
One Year Access to the E-courseware
Six months access to EC-Council's official Online lab environment (iLabs)
EC-Council’s Certification Exam Voucher
One year access to EC-Council's expert instructor-led training modules with streaming video presentations for an all-inclusive training program that provides the benefits of classroom training at your own pace
iLearn online training is a distance learning program designed for those who cannot attend a live course. The program is for the people who have a very busy schedule and want to learn at their own pace through self-study.
Establishes the role of CISO and models for governance
Core concepts of information security controls, risk management, and compliance
Builds foundation for leadership through strategic planning, program management, and vendor management
CCISO is not a technical course but a leadership course designed specifically for experienced InfoSec professionals. The CCISO course covers the 5 CCISO Domain with deep dives into scenarios taken from the experience of the CISOs who contributed to the building of the Body of Knowledge, course, and exam.
DOMAIN 1 – GOVERNANCE
1.1. Information Program Security Management
1.2. Information Security Governance Program
1.3. Regulatory and Legal Compliance
1.4. Risk Management
DOMAIN 2 – RISK MANAGEMENT, CONTROLS, & AUDIT MANAGEMENT
1.1. Design, deploy, and manage security controls
1.2. Security control types and objectives
1.3. Implement control assurance frameworks
1.4. Audit management
DOMAIN 3 – SECURITY PROGRAM MANAGEMENT & OPERATIONS
1.1. The role of the CIS
1.2. Information Security Projects
DOMAIN 4 – IS CORE CONCEPTS
1.1. Access Controls
1.2. Physical Security
1.3. Disaster Recovery
1.4. Network Security
1.5. Threat and Vulnerability Management
1.6. Application Security
DOMAIN 5 – STRATEGIC PLANNING, FINANCE, & VENDOR MANAGEMENT
1.1. Security Strategic Planning
1.2. Financial Planning
Exam Title: EC-Council Certified CISO
Exam Code: 712-50
Number of Questions: 150
Duration: 2.5 hours
Availability: ECC Exam Portal
Test Format: Scenario- based Multiple Choice
In order to sit for the CCISO exam, applicants attending the training must apply via the CCISO Eligibility Application, showing 5 years of experience in at least 3 of 5 CCISO domains (experience can be overlapping). Students who do not meet the eligibility criteria for the CCISO exam can sit for the EC-Council Information Security Manager (EISM) exam & apply for the CCISO exam once they meet the requirements.
The EC-Council group is made up of several entities that all help serve the same goal, which is to create a better, safer cyber-world through awareness and education.
Hasonló tanfolyamok listája:
A tanfolyamon a hallgatók elsajátíthatják a számítógépes hálózatok tervezését és üzemeltetését biztonsági szempontból.
A tanfolyamon a hallgatók rendkívül széleskörű ismereteket kapnak a biztonságos webes programozásban, a kliens és a szerver oldali támadási területek feltérképezésében és a védelem kiépítésében.
The CASE Java program is designed to be a hands-on, comprehensive application security training course that will help software professionals create secure applications. It trains software developers on the critical security skills and knowledge required throughout a typical software development lifecycle (SDLC), focusing on the importance of the implementation of secure methodologies and practices required in today’s insecure operating environment.
CASE .NET goes beyond just the guidelines on secure coding practices but include secure requirement gathering, robust application design and handling security issues in post development phases of application development. This makes CASE one of the most comprehensive certifications for secure software development in the market today. It’s desired by software application engineers, analysts, testers globally and respected by hiring authorities. The hands-on training program encompasses security activities involved in all phases of the Secure Software Development Lifecycle (SDLC): planning, creating, testing and deploying an application.
CEH is the world’s most advanced certified ethical hacking course that covers 20 of the most current security domains any individual will ever want to know when they are planning to beef-up the information security posture of their organisation.
This accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals.
The ECIH program is designed to provide the fundamental skills to handle and respond to the computer security incidents in an information system. The course addresses various underlying principles and techniques for detecting and responding to current and emerging computer security threats. The comprehensive training program will make students proficient in handling as well as responding to various security incidents, such as network security incidents, malicious code incidents and insider attack threats.
CND is the world’s most advanced network defense course that covers 14 of the most current network security domains any individuals will ever want to know when they are planning to protect, detect and respond to network attacks. The course contains hands-on labs based on major network security tools and aims to provide network administrators real world expertise on current network security technologies and operations. The study-kit provides you with over 10 GB of network security best practices, assessments and protection tools.
The CSCU training program aims at equipping students with the necessary knowledge and skills to protect their information assets. This course covers the fundamentals of various computer and network security threats, such as identity theft, credit card fraud, phishing, virus and backdoors, email hoaxes, loss of confidential information, hacking attacks and social engineering.
CHFI v9 constitutes a detailed methodological approach to computer forensic and evidence analysis. It provides the necessary skill-set for the identification of an intruder’s footprints and gathering the necessary evidence for their prosecution. All major tools and theories used by the cyber forensic industry are covered in the curriculum. The certification can fortify the applied knowledge level of law enforcement personnel, system administrators, security officers, defense and military personnel, legal professionals, bankers, computer and network security professionals and anyone who is concerned about the integrity of the network and digital investigations.
The EDRP v3 course identifies vulnerabilities and takes appropriate countermeasures to prevent and mitigate failure risks for an orginization. It also provides the networking professional with a foundation in disaster recovery course principles, including preparation of a disaster recovery plan, assessment of risks in the enterprise, development of policies and procedures, an understanding of the roles and relationships of various members of organisation, implementation of a plan and recovering from a disaster.
ECSA is a globally respected penetration testing program that covers the testing of modern infrastrucutres, operating systems and application environments while teaching students how to document and prepare a professional penetration testing report. This program takes the tools and techniques covered in CEH to the next level by utilizing EC-Council’s published penetration testing methodology.
The program offers a seamless learning progress, continuing where the CEH program left off. The new ECSAv10 includes updated curricula and an industry recognised comprehensive step-by- step penetration testing methodology. This allows a learner to elevate their ability in applying new skills learned through intensive practical labs and challenges.
IT biztonság profiknak, a támadók felől megközelítve: milyen eszközökkel dolgoznak és hogyan lehet ellenük védekezni. Az egyes támadás típusok gyakorlati bemutatása mellett az azokat csökkentő ill. elhárító védekezési módszerekkel és a behatolásérzékeléssel is részletesen foglalkozunk.
A tanfolyam során a hallgatók megismerkednek egy Windows Server alapú hálózat üzemeltetéséhez szükséges legfontosabb feladatok végrehajtási lehetőségeivel, a Windows tartományi környezettel, illetve az alapjául szolgáló címtárral.