EC-Council - C|CISO Program - Certified Chief Information ...
文章推薦指數: 80 %
The Certified CISO (CCISO) program is the first of its kind training and certification program aimed at producing top-level information security executives. The ... CCISOCertification HomeCCISOCertification AbouttheProgramWhyCCISO?NICEFrameworkGovernmentAbouttheProgram AbouttheProgram EC-Council’sCCISOProgramhascertifiedleadinginformationsecurityprofessionalsaroundtheworld.Acoregroupofhigh-levelinformationsecurityexecutives,theCCISOAdvisoryBoard,contributedbyformingthefoundationoftheprogramandoutliningthecontentthatwouldbecoveredbytheexam,bodyofknowledge,andtraining.SomemembersoftheBoardcontributedasauthors,othersasexamwriters,othersasqualityassurancechecks,andstillothersastrainers.EachsegmentoftheprogramwasdevelopedwiththeaspiringCISOinmindandlookstotransfertheknowledgeofseasonedprofessionalstothenextgenerationintheareasthataremostcriticalinthedevelopmentandmaintenanceofasuccessfulinformationsecurityprogram. TheCertifiedCISO(CCISO)programisthefirstofitskindtrainingandcertificationprogramaimedatproducingtop-levelinformationsecurityexecutives.TheCCISOdoesnotfocussolelyontechnicalknowledgebutontheapplicationofinformationsecuritymanagementprinciplesfromanexecutivemanagementpointofview.TheprogramwasdevelopedbysittingCISOsforcurrentandaspiringCISOs. InordertositfortheCCISOexamandearnthecertification,candidatesmustmeetthebasicCCISOrequirements.CandidateswhodonotyetmeettheCCISOrequirementsbutareinterestedininformationsecuritymanagementcanpursuetheEC-CouncilInformationSecurityManagement(EISM)certification. WhyCCISO? WhyshouldyouconsidertheCCISOprogram? TheCCISOCertificationisanindustry-leadingprogramthatrecognizesthereal-worldexperiencenecessarytosucceedatthehighestexecutivelevelsofinformationsecurity. BringingtogetherallthecomponentsrequiredforaC-Levelpositions,theCCISOprogramcombinesauditmanagement,governance,IScontrols,humancapitalmanagement,strategicprogramdevelopment,andthefinancialexpertisevitaltoleadingahighlysuccessfulISprogram.MaterialintheCCISOProgramassumesahigh-levelunderstandingoftechnicaltopicsanddoesn’tspendmuchtimeonstrictlytechnicalinformation,butratherontheapplicationoftechnicalknowledgetoaninformationsecurityexecutive’sday-to-daywork.TheCCISOaimstobridgethegapbetweentheexecutivemanagementknowledgethatCISOsneedandthetechnicalknowledgethatmanyaspiringCISOshave.Thiscanbeacrucialgapasapractitionerendeavorstomovefrommid-managementtoupper,executivemanagementroles.Muchofthisistraditionallylearnedasonthejobtraining,buttheCCISOTrainingProgramcanbethekeytoasuccessfultransitiontothehighestranksofinformationsecuritymanagement. NICEFramework TheNICECybersecurityWorkforceFramework(NCWF)(linkisexternal)NISTSpecialPublication800-181,isanationalresourcethatcategorizesanddescribescybersecuritywork.TheNCWFprovidesemployers,employees,educators,students,andtrainingproviderswithacommonlanguagetodefinecybersecurityworkaswellasacommonsetoftasksandskillsrequiredtoperformcybersecuritywork. EC-CouncilhasmappedthedomainsofCCISOtotheNCWFinthefollowingdocument. Government ANSIDoDNAVYARMYMARINECORPSAIRFORCE EC-CouncilisdedicatedtoworkingwiththeUSDepartmentofDefensetobringthehigheststandardsofTraining,EducationandCertificationtoourmilitary. IndependentAccreditationensuresQualityofCertification EC-CouncilCertificationsaredevelopedtothehigheststandardsandhaveachievednumerousaccreditationsincludingANSI17024for: DoDDirective8570/8140 EC-Council’sCertifiedEthicalHackerisanapprovedbaselinecertificationforthefollowingCyberSecurityServiceProvidersections: IAMLevelII•IAMLevelIII•CSSPManager InformationonDoD8570canbefoundatthefollowingDISAwebsite:https://public.cyber.mil/cw/cwmp/dod-approved-8570-baseline-certifications/ CertificationtoFrameworkMappings AcorecomponentofEC-CouncilCertificationdevelopmentistheJobTaskAnalysis(JTA)Processweundertakebeforeanycertificationisbuilt.MajorframeworksliketheNICE/NISTFramework,NIST800-171,GCHQ,andotherscontributetocontentareasofeachofourprograms.Asaresult,EC-CouncilCertificationsandTrainingprogramsaremappedtomostmajorpublishedFrameworks. EC-CouncilMapstotheNationalInitiativeforCybersecurityEducationFramework DownloadthecomprehensivemappingofEC-CouncilprogramsectionstoTheRolesandtheirassociatedKnowledge,Skillsandabilities. DownloadNICE2.0Mapping EC-CouncilCyberSecurityCertificationsandtheUSNAVY SixEC-CouncilCertificationsarerecognizedbytheUnitedStatesNavyinover100CyberSecurityJobroles,across18occupations.RangingfromCommanderinExecutiveCyberspaceLeadershiptoCyberWarfareEngineer,SpecialAgents,IncidentHandlers,toCryptologicWarfareEngineers,CybersecuritycareerswiththeUSNAVYareexciting,holdinganEC-CouncilcertificationprovidesgreatopportunityforadvancementinaUSNAVYcareer. ThedecisionsofDepartmentoftheNAVYtoincorporateindustryrecognizedcertificationsintotheCyberIT&CyberSecurityWorkforceFrameworkensuresasourservicepersonneladvancetheircareersandeventuallytransitiontocivilianlife,theirskillsandcredentialsarewidelyrecognizedbytheIndustriestheywillcontinuetoworkinasVeterans. Certificationsrecognized,accepted,andoftenfundedbytheUSNAVYinclude: FundingopportunitiesforcareeradvancementareavailableforActiveDutyNAVYpersonnelthroughtheNAVYCOOLprogram. USNAVYapprovesEC-CouncilCertificationsacross18Occupationsandover100Jobroles CryptologicWarfareLDO CryptologicWarfareLDO CTN-CryptologicTechnicianNetworks CTN–GlobalNetworkOperationsDirector CTN–GlobalNetworkOperationsManager CTN–GlobalNetworkOperationsTechnician CyberIT/CSWFCyberDefenseInfrastructureSupport CNDSP-IS CPTNetworkInfrastructureServiceSpecialist SystemsSecurityEngineer CyberIT/CSWFExecutiveCyberspaceLeadership Commander DeputyCommander CyberIT/CSWFSecurityProgramManagement(CISO) ChiefInformationSecurityOfficer(CISO) CommonControlProvider CybersecurityOfficer EnterpriseSecurityOfficer FacilitySecurityOfficer InformationTechnology(IT)Director PrincipalSecurityArchitect RiskExecutive SecurityDomainSpecialist SeniorAgencyInformationSecurity(SAIS)Officer CyberIT/CSWFVulnerabilityAssessmentandManagement BlueTeamTechnician CloseAccessTechnician CNDSPAU NetworkSecurityVulnerabilityTechnician(NSVT) PenetrationTester CryptologicWarfareOfficer CryptologicWarfareOfficer CyberIT/CSWFAllSourceAnalysis ComputerNetworkDefense(CND)Analyst CyberIT/CSWFCyberOperationsPlanning CPTOperationsOfficer CPTPlatoonLeader NetworkWarfareCyberPlanner CyberIT/CSWFIncidentResponse CNDSPIR IncidentHandler IntrusionAnalyst NetworkSecurityVulnerabilityTechnician(NSVT) CyberIT/CSWFStrategicPlanningandPolicyDevelopment ChiefInformationOfficer(CIO) ChiefInformationSecurityOfficer(CISO) CommandInformationOfficer InformationSecurityPolicyAnalyst InformationSecurityPolicyManager PolicyWriterandStrategist CyberspaceWorkforceDeveloperandManager(CSWF-PM)(DCWFRoleCode751) CyberspacePolicyandStrategyPlanner(DCWFRoleCode752) CyberWarfareEngineer CyberWarfareEngineer CryptologicWarfareTechnicianCWO CryptologicWarfareTechnicianCWO Section2CyberIT/CSWFCyberDefenseAnalysis CNDSPAnalyst CNDSPManager CPTCNDManager CPTInteractiveOperator CPTSystemsArchitect CyberSecurityAnalyst IncidentAnalyst CyberIT/CSWFDigitalForensics ComputerForensicAnalyst ComputerNetworkDefense(CND)Analyst DigitalForensicExaminer DigitalMediaCollector ForensicAnalyst ForensicAnalyst(Cryptologic) ForensicTechnician NetworkForensicExaminer CyberIT/CSWFInvestigation ComputerCrimeInvestigator SpecialAgent CyberIT/CSWFThreatAnalysis ComputerNetworkDefense(CND)Analyst ThreatAnalyst CyberWarrantOfficerCWO CyberWarrantOfficerCWO *AllinformationrepresentedherecanbefoundontheNAVYCOOLsite.TofindwhatEC-CouncilCertificationsmaptoyoureligibleJobrole,select“FullCredentialSearch”thenunderCredentialAgency,selectorsearchfor“InternationalCouncilofE-CommerceConsultants”. EC-CouncilCyberSecurityCertificationsandtheUSARMY FiveEC-CouncilCertificationsarerecognizedbytheUnitedStatesARMYacross15occupations.RangingfromCyberOperationsTechniciantoTargetDigitalNetworkAnalyst.OurcertificationsareinuseasbaselinecredentialsacrossARMYCyberthroughoutintelligenceaswellasdeployedinfantry.EC-CouncilisproudtoworkwithvariousgroupsintheARMYtosupporttheMissionofARMYCyber. Certificationsrecognized,accepted,andoftenfundedbytheUSARMYinclude: FundingopportunitiesforcareeradvancementareavailableforActiveDutyARMYpersonnelthroughtheARMYCOOLprogram. USARMYapprovesEC-CouncilCertificationsacross15Occupations CryptologicCyberspaceIntelligenceCollector-Analyst CYBEROperationsTechnician InformationProtectionTechnician MilitaryIntelligence(MI)SystemsMaintainer/Integrator SeniorNetworkOperationsTechnician CryptologicCyberspaceIntelligenceCollector-Analyst CYBEROperationsTechnician InformationProtectionTechnician MilitaryIntelligence(MI)SystemsMaintainer/Integrator SeniorNetworkOperationsTechnician CounterintelligenceAgent CyberOperationsSpecialist Infantryman InformationTechnologySpecialist NodalNetworkSystemsOperator-Maintainer EC-CouncilCyberSecurityCertificationsandtheMarineCorps FiveEC-CouncilCertificationsarerecognizedbytheUnitedStatesMarineCorpsin79CyberSecurityJobroles,across17occupations.RangingfromCyberSecurityTechnician,toSignalsIntelligenceandElectronicWarfareOperator,toCyberSecurityChief. Certificationsrecognized,accepted,andoftenfundedbytheUSMarineCorpsinclude: FundingopportunitiesforcareeradvancementareavailableforActiveDutyMARINECORPSpersonnelthroughtheMarineCOOLprogram. USARMYapprovesEC-CouncilCertificationsacross15Occupations AviationLogisticsInformationManagementSystem(ALIMS)Specialist AviationLogisticsInformationManagementSystem(ALIMS)Specialist CyberIT/CSWFCyberDefenseAnalysis CNDSPAnalyst CNDSPManager CPTCNDManager CPTInteractiveOperator CPTSystemsArchitect CyberSecurityAnalyst IncidentAnalyst CyberIT/CSWFInvestigation ComputerCrimeInvestigator SpecialAgent CybersecurityTechnician CybersecurityTechnician CyberIT/CSWFAllSourceAnalysis ComputerNetworkDefense(CND)Analyst SignalsIntelligenceandElectronicWarfareOperator/Analyst SignalsIntelligenceandElectronicWarfareOperator/Analyst CommunicationsChief CyberNetworkSystemsChief TelecommunicationsSystemsChief TransmissionsChief CyberIT/CSWFCyberDefenseInfrastructureSupport CNDSP-IS CPTNetworkInfrastructureServiceSpecialist SystemsSecurityEngineer CyberIT/CSWFThreatAnalysis ComputerNetworkDefense(CND)Analyst ThreatAnalyst InformationSecurityTechnician InformationSecurityTechnician CyberIT/CSWFIncidentResponse CNDSPIR IncidentHandler IntrusionAnalyst NetworkSecurityVulnerabilityTechnician(NSVT) SignalsIntelligence/ElectronicWarfareTechnician SignalsIntelligence/ElectronicWarfareTechnician CryptologicCyberspaceAnalysts CryptologicCyberspaceAnalysts CyberIT/CSWFDigitalForensics ComputerForensicAnalyst ComputerNetworkDefense(CND)Analyst DigitalForensicExaminer DigitalMediaCollector ForensicAnalyst ForensicAnalyst(Cryptologic) ForensicTechnician NetworkForensicExaminer CyberIT/CSWFVulnerabilityAssessmentandManagement BlueTeamTechnician CloseAccessTechnician CNDSPAU NetworkSecurityVulnerabilityTechnician(NSVT) PenetrationTester IntelligenceSurveillanceReconnaissance(ISR)SystemsEngineer IntelligenceSurveillanceReconnaissance(ISR)SystemsEngineer CyberSecurityChief CyberSecurityChief CyberNetworkOperator CyberNetworkSystemsChief IntelligenceSurveillanceReconnaissance(ISR)SystemsEngineer EC-CouncilCyberSecurityCertificationsandtheUSAirForce FourEC-CouncilCertificationsarerecognizedbytheUnitedStatesAirForcein150CyberSecurityJobroles,across8occupations.Occupationsarerecognizedinfieldslike;CyberTransportSystems,Intelligence,andCyberWarfareOperations. Certificationsrecognized,accepted,andoftenfundedbytheUSAIRFORCEinclude: FundingopportunitiesforcareeradvancementareavailableforActiveDutyAIRFORCEpersonnelthroughtheAIRFORCECOOLprogram. ClientSystems ComputerOperationSeries ComputerScienceSeries CryptanalysisSeries CryptographySeries InformationTechnologyManagementSeries IntelligenceSeries TelecommunicationsMechanic CyberSurety SecurityAdministrationSeries IntelligenceSeries InformationTechnologyManagementSeries ComputerScienceSeries ComputerOperationSeries SecurityAdministrationSeries CyberTransportSystems IntelligenceSeries InformationTechnologyManagementSeries CryptographySeries CryptanalysisSeries ComputerScienceSeries ComputerOperationSeries FlightEngineer AirSafetyInvestigatingSeries AircraftAttending AircraftElectrician AircraftEngineMechanic AircraftMechanic AircraftOperationSeries AircrewTechnicianSeries ChiefElectrician Electrician Electrician-Maintenance ElectronicDigitalComputerMechanic ElectronicIndustrialControlsMechanic ElectronicIntegratedSystemsMechanic ElectronicMeasurementEquipmentMechanic ElectronicsMechanic ElectronicsTechnicalSeries ElectronicsTechnician SecondElectrician ThirdElectrician ComputerSystemsProgramming IntelligenceSeries InformationTechnologyManagementSeries ElectronicsTechnician ElectronicsTechnicalSeries ComputerScienceSeries ComputerOperationSeries CyberSystemsOperations TelecommunicationsMechanic SecurityAdministrationSeries IntelligenceSeries InformationTechnologyManagementSeries ComputerScienceSeries ComputerOperationSeries ComputerClerkandAssistantSeries CyberspaceWarfareOperations InformationTechnologyManagementSeries CryptographySeries CryptanalysisSeries ComputerScienceSeries ComputerOperationSeries ComputerClerkandAssistantSeries FusionAnalyst StatisticalAssistantSeries IntelligenceSeries InformationTechnologyManagementSeries ComputerScienceSeries AtaGlance: HowtoGetCertified ContentDetailsQualificationRequirementsTrainingOptionsEISMProgramTheExamRequestanApplication AreyouReadytobeaCCISO?TestYourSkills!SubscribetotheCISOPodcast LatestNews GlobalCISOForumPodcast:InterviewwithCecilPayne FeaturedSpeaker:Shahnoz“Nozi”Hamidi FeaturedSpeaker:DaveTyson CCISOBodyofKnowledge TheEC-CouncilCCISOBodyofKnowledgecoversallfiveoftheCCISOInformationSecurityManagementDomainsindepthandwaswrittenbyseasonedCISOsforcurrentandaspiringCISOs. Getyourcopytoday FeaturedWhitepaper CreatingaSecureComputerUser 08thJul2016 WeCareEnsuringthatyougetthebestexperienceisouronlypurposeforusingcookies.Ifyouwishtocontinue,pleaseaccept.Youarewelcometoprovideacontrolledconsentbyvisitingthecookiesettings.Foranyfurtherqueriesorinformation,pleaseseeourprivacypolicy.Donotsellmypersonalinformation.CookieSettingsAcceptManageconsent Close PrivacyOverview Thiswebsiteusescookiestoimproveyourexperiencewhileyounavigatethroughthewebsite.Outofthese,thecookiesthatarecategorizedasnecessaryarestoredonyourbrowserastheyareessentialfortheworkingofbasicfunctionalitiesofthewebsite.Wealsousethird-partycookiesthathelpusanalyzeandunderstandhowyouusethiswebsite.Thesecookieswillbestoredinyourbrowseronlywithyourconsent.Youalsohavetheoptiontoopt-outofthesecookies.Butoptingoutofsomeofthesecookiesmayaffectyourbrowsingexperience. Necessary Necessary AlwaysEnabled Necessarycookiesareabsolutelyessentialforthewebsitetofunctionproperly.Thesecookiesensurebasicfunctionalitiesandsecurityfeaturesofthewebsite,anonymously. CookieDurationDescriptioncookielawinfo-checkbox-analytics11monthsThiscookieissetbyGDPRCookieConsentplugin.Thecookieisusedtostoretheuserconsentforthecookiesinthecategory"Analytics".cookielawinfo-checkbox-functional11monthsThecookieissetbyGDPRcookieconsenttorecordtheuserconsentforthecookiesinthecategory"Functional".cookielawinfo-checkbox-necessary11monthsThiscookieissetbyGDPRCookieConsentplugin.Thecookiesisusedtostoretheuserconsentforthecookiesinthecategory"Necessary".cookielawinfo-checkbox-others11monthsThiscookieissetbyGDPRCookieConsentplugin.Thecookieisusedtostoretheuserconsentforthecookiesinthecategory"Other.cookielawinfo-checkbox-performance11monthsThiscookieissetbyGDPRCookieConsentplugin.Thecookieisusedtostoretheuserconsentforthecookiesinthecategory"Performance".viewed_cookie_policy11monthsThecookieissetbytheGDPRCookieConsentpluginandisusedtostorewhetherornotuserhasconsentedtotheuseofcookies.Itdoesnotstoreanypersonaldata. Functional Functional Functionalcookieshelptoperformcertainfunctionalitieslikesharingthecontentofthewebsiteonsocialmediaplatforms,collectfeedbacks,andotherthird-partyfeatures. Performance Performance Performancecookiesareusedtounderstandandanalyzethekeyperformanceindexesofthewebsitewhichhelpsindeliveringabetteruserexperienceforthevisitors. Analytics Analytics Analyticalcookiesareusedtounderstandhowvisitorsinteractwiththewebsite.Thesecookieshelpprovideinformationonmetricsthenumberofvisitors,bouncerate,trafficsource,etc. Advertisement Advertisement Advertisementcookiesareusedtoprovidevisitorswithrelevantadsandmarketingcampaigns.Thesecookiestrackvisitorsacrosswebsitesandcollectinformationtoprovidecustomizedads. Others Others Otheruncategorizedcookiesarethosethatarebeinganalyzedandhavenotbeenclassifiedintoacategoryasyet. SAVE&ACCEPT
延伸文章資訊
- 1Certified Chief Information Security Officer (CCISO) Online ...
1. What is the CCISO Program? ... The Certified Chief Information Security Officer program is the...
- 2CCISO-Certified Chief Information Security Officer - YouTube
- 3EC-Council - C|CISO Program - Certified Chief Information ...
The Certified CISO (CCISO) program is the first of its kind training and certification program ai...
- 4Certified Chief Information Security Officer (CCISO)
The CCISO certification is an industry-leading program that recognizes the real-world experience ...
- 5唯一專為資安長設計的認證課程CCISO | iThome
唯一專為資安長設計的認證課程CCISO ... 本課程為一套涵蓋五大核心領域完整的資安管理課程,包含資訊安全管理所需具備的知識,如資訊安全的治理與管理、稽核 ...