EC-Council’s Certified Chief Information Security Officer Program has empowered information security professionals to achieve their professional goals across the globe. It is a program developed and delivered by seasoned security executives. It equips future executives with business and technical knowledge so they can succeed at the highest levels of the security industry. The Program is designed by seasoned CISOs to help train professionals in the business of security. The Certified CISO Program is a global community of security leadership focused on delivering security capabilities aligned to the business.
The Certified CISO curriculum provides an executive management perspective that incorporates information security management principles, business acumen, and general technical knowledge within five crucial domains encompassing business functions, strategic security portfolio management, and the latest technology shifts within the security industry.
EC-Council’s Certified Chief Information Security Officer (C|CISO) Program has certified leading information security professionals around the world. A core group of high-level information security executives, the C|CISO Advisory Board, formed the foundation of the program and outlined the content covered by the exam, body of knowledge, and training. Some members of the Board contributed as authors, others as exam writers, others as quality assurance checks, and still others as instructors. Each segment of the program was developed with the aspiring and sitting CISO in mind and looks to transfer the knowledge of seasoned executives to the next generation of leaders in the areas that are most critical in the development and maintenance of a successful information security program.
The Certified CISO certification is ANAB-accredited and designed to meet the rigorous ISO/IEC 17024 standards. It is also an approved baseline certification under DoD Directive 8570/8140, providing an excellent opportunity for advancement in the U.S. military and is recognized by the U.S. Army, Navy, Air Force, and Marine Corps.
Social Engineering, Phishing Attacks, Identity Theft
Physical Security
Disaster Recovery and Business Continuity Planning
Strategic Planning
Job Roles
To earn the C|CISO, every applicant must pass the exam covering all 5 C|CISO domains, regardless of experience in each domain. The exam consists of 150 multiple-choice questions administered over a two-and-a-half-hour period. The questions on the exam require extensive thought and evaluation.
There are three cognitive levels tested on the C|CISO exam:
Level 1
Knowledge:This cognitive level of questions is used to recall memorized facts. This is the most basic cognitive level rarely accepted on certifications as it merely recognizes the candidate’s ability to memorize information. It can be effectively used when asking for basic definitions, standards or any concrete fact.
Level 2
Application:This cognitive level of questions is used to identify the candidate’s ability to understand the application of a given concept. It differs from Knowledge based questions in the sense that it requires the understanding and correct applicability of a given concept – not just the concept itself. This type of question often quires additional context before the actual question is provided in the stem.
Level 3
Analysis:This cognitive level of questions is used to identify the candidate’s ability to identify and resolve a problem given a series of variables and context. Analysis questions differ greatly from Application based questions in the sense that they require not only the applicability of a concept but also how a concept, given certain constraints, can be used to solve a problem.
Please see the exam blueprint
Students opting for the Associate C|CISO exam must get tested on only two cognitive levels of the above viz.
Level 1: Knowledge
Level 2: Application.
To learn more about the Associate C|CISO program
Making an informed decision is difficult, and that’s where EC-Council’s C|CISO brochure comes to your rescue. The Certified Chief Information Security Officer (C|CISO) credential is the most trusted information security certification that employers worldwide value while hiring top-level information security executives.
The comprehensive curriculum covers information security governance, risk, and compliance, security program management and operations, information security controls and audit management, core competencies of information security, and much more.
When you successfully achieve the C|CISO certification, you will be equipped with every skill you need to develop and execute an information security management strategy in alignment with organizational goals.
This is only an overview of C|CISO and what you will learn.For complete information, download the brochure now.
Experience waivers for C|CISO are available for some industry-accepted credentials and higher education in information security (for details, please refer to the waiver chart below). Applicants may only waive up to 2 years of experience for each domain.
Domain | Experience Waivers |
---|---|
Governance and risk management |
|
Information Security Controls, Compliance, and Audit Management |
|
Security Program Management and Operations |
|
Information Security Core Competencies |
|
Strategic Planning, Finance, Procurement, and Vendor Management |
|
We have helped over 380,000 people answer this question over the past 20 years and we are excited to help you with this big decision! Choosing the right credential can seem like a difficult task, here are some things you should consider
The Certified Chief Information Security Officer program is the first of its kind certification that recognizes an individual’s accumulated skills in developing and executing an information security management strategy in alignment with organizational goals. C|CISO equips information security leaders with the most effective toolset to defend organizations from cyber-attacks. To rise to the role of the CISO, strong technical knowledge, and experience is more imperative now than ever before but it must be accompanied by the ability to communicate in business value. C|CISOs understand that their information security decisions often have a direct impact on their organization’s operational cost, efficiency, and agility. As organizations introduce new technologies, C|CISOs will develop and communicate a strategy to avoid the potential risks stemming from their implementation to the organization’s operations.
C|CISO is the right choice for you and your career if you: – Aspire to attain the highest regarded title within the information security profession – CISO – Already serve as an official CISO – Or perform CISO functions in their organization without the official To evaluate your readiness for the Certified CISO program take this assessment test
In order to qualify to take the C|CISO Exam, applicants must fill out the C|CISO Exam Eligibility Application found here. Applications should be emailed to [email protected] . If the applicant is attempting the exam without taking EC-Council Authorized Training, five years of experience in each of the five C|CISO Domains is required (experience can be overlapping) and a $100 application fee is due with the application. If an applicant has purchased EC-Council Authorized Training, there is no application fee due and only five years of experience in three of the five domains is required. For more information, please drop your details for us to connect back with you. Click here
Application processing time varies due to the fact that part of the process involves reaching out to verifiers indicated by the applicants as able to verify their experience. In order to speed up this process, applicants can assist the application processing team by reaching out to their verifiers to ensure they have received the required forms from EC-Council and understand what is required. Applications from students in EC-Council Authorized Training are prioritized and expedited in order to ensure testing can occur at the time of the class if the student desires.
Dramatically disseminate real-time portals rather than top-line action items. Uniquely provide access to low-risk hih-yield products without dynamic products. Progressively re-engineer low-risk high-yield ideas rather than emerging alignments.