Certified Network Defender (CCISO)

Cas Training > Nuestros cursos > Certified Network Defender (CCISO)
Icono Duración del curso
Duración del curso
Lugar de impartición
Madrid / Online
Icono modalidad del curso
Icono Fecha del curso
Fecha de inicio

Acerca del curso

EC-Council’s CCISO Program has certified leading information security professionals around the world. A core group of high-level information security executives, the CCISO Advisory Board, contributed by forming the foundation of the program and outlining the content that would be covered by the exam, body of knowledge, and training. Some members of the Board contributed as authors, others as exam writers, others as quality assurance checks, and still others as trainers. Each segment of the program was developed with the aspiring CISO in mind and looks to transfer the knowledge of seasoned professionals to the next generation in the areas that are most critical in the development and maintenance of a successful information security program.

The Certified CISO (CCISO) program is the first of its kind training and certification program aimed at producing top-level information security executives. The CCISO does not focus solely on technical knowledge but on the application of information security management principles from an executive management point of view. The program was developed by sitting CISOs for current and aspiring CISOs.

In order to sit for the CCISO exam and earn the certification, candidates must meet the basic CCISO requirements. 

Próximas convocatorias

Estamos preparando nuevas convocatorias. Déjanos tus datos a través del formulario y te avisaremos lo antes posible.


CCISO is not a technical course but a leadership course designed specifically for experienced infosec professionals. The CCISO course covers the 5 CCISO domains with deep dives into scenarios taken from the experience of the CISOs who contributed to the building of the body of knowledge course & exam.


Domain 1: Governance and Risk Management

Define, Implement, Manage, and Maintain an Information Security Governance Program
Information Security Drivers
Establishing an information security management structure
Laws/Regulations/Standards as drivers of Organizational Policy/Standards/Procedures
Managing an enterprise information security compliance program
Introduction to Risk Management

Domain 2: Information seciruty controls, compliance and audit management

Information Security Controls
Compliance Management
Guidelines, Good and Best Practices
Audit Management

Domain 3: Security program management & operations

Program Management
Operations Management

Domain 4: Information security core competencies

Access Control
Physical Security
Network Security
Certified Chief
Endpoint Protection
Application Security
Encryption Technologies
Virtualization Security
Cloud Computing Security
Transformative Technologies

Domain 5: Strategic planning, finance, procureent and vendor management

Strategic Planning
Designing, Developing, and Maintaining an Enterprise Information Security Program
Understanding the Enterprise Architecture (EA)
Vendor Management


Solicita más información

Solicitar Información
Mensaje enviado correctamente
No se ha enviado su mensaje. Por favor revisa los campos e inténtalo otra vez.