Eccentrix - Trainings catalog - Cybersecurity and cyberdefense - Certified Chief Information Security Officer (CCISO) (EC6155)

Certified Chief Information Security Officer (CCISO) (EC6155)

Organizations increasingly recognize the central role of a Chief Information Security Officer (CISO) in protecting sensitive information and ensuring robust cybersecurity measures. The EC-Council’s Certified Chief Information Security Officer (CCISO) program stands out as a comprehensive and advanced certification designed for seasoned information security professionals aspiring to executive roles.

Information security professionals benefit from the prestigious Certified CISO training by EC-Council, achieving a higher and industry-recognized level of certification. A group of security executives, along with the CCISO Advisory Board, participated in creating the certification course program. The members include course authors, exam authors, and other individuals dedicated to quality assurance as well as trainers. Each segment of this program has been developed by the most experienced individuals in the field, aiming to impart knowledge to leaders in the information security domain to successfully implement an information security program within their organization.

Related trainings

Exclusives

  • Certification exam participation: Voucher included – value of $1400!
  • Video recording: 365 days of access to your course for viewing
  • Technical lab: Available for 180 days of online access
  • Class material: Complete and up to date with ASPEN
  • Proof of attendance: Digital certificate of completion for the official EC-Council course
  • Fast and guaranteed schedule: Maximum wait of 4 to 6 weeks after participant registrations, guaranteed date

Private class

Reserve this training exclusively for your organization with pricing adapted to the number of participants. Our pricing for private classes varies according to the size of your group, with a guaranteed minimum threshold to maintain pedagogical quality.

  • Volume-based pricing discount according to the number of participants
  • Training delivered in an environment dedicated to your team
  • Scheduling flexibility according to your availability
  • Enhanced interaction among colleagues from the same organization
  • Same exclusive benefits as our public training sessions

How to get a proposal?

Use the request form by specifying the number of participants. We will quickly send you a complete proposal with the exact pricing, available dates, and details of all the benefits included in your private training.

Training plan

  • Define, implement, manage and maintain an information security governance program that includes leadership, organizational structures, and processes.
  • Align information security governance framework with organizational goals and governance, i.e., leadership style, philosophy, values, standards, and policies.
  • Establish information security management structure.
  • Establish a framework for information security governance monitoring (considering cost/benefits analyses of controls and ROI).
  • Understand standards, procedures, directives, policies, regulations, and legal issues that affect the information security program.
  • Understand the enterprise information security compliance prog
  • Create a risk management program policy and charter
  • Create a risk assessment methodology and framework
  • Create and manage risk register
  • Create risk assessment schedule and checklists
  • Create risk reporting metrics and processes
  • Analyze and understand common external laws, regulations, standards, best practices applicable to the organization, and organizational ethics.
  • Be familiar with international security and risk standards such as ISO 27000 and 31000 series
  • Implement and manage information security strategies, plans, policies, and procedures to reduce regulatory risk
  • Understand the importance of regulatory information security organizations and appropriate industry groups and stakeholders
  • Understand information security changes, trends, and best practices
  • Understand and manage enterprise compliance program controls, information security compliance process and procedures, compliance auditing, and certification programs
  • Understand the information security compliance process and procedures
  • Compile, analyze, and report compliance programs
  • Understand the compliance auditing and cortication programs
  • Follow organizational ethics
  • Identify the organization’s operational process and objectives
  • Design information systems controls in alignment with the operational needs and goals and conduct testing prior to implementation to ensure effectiveness
  • Identify and select the resources required to effectively implement and maintain information systems controls. Such resources can include human capital, information, infrastructure, and architecture (e.g., platforms, operating systems, networks, databases, applications)
  • Design and implement information systems controls to mitigate risk.
  • Monitor and document the information systems control performance in meeting organizational objectives by identifying and measuring metrics and key performance indicators
  • Design and conduct testing of information security controls to ensure effectiveness, discover deficiencies, and ensure alignment with the organization’s risk management program
  • Design and implement processes to appropriately remediate deficiencies and evaluate problem management practices to ensure that errors are recorded, analyzed, and resolved in a timely manner
  • Assess and implement tools and techniques to automate information systems control processes.
  • Measure, manage, and report on security control implementation and effectiveness
  • Understand the IT audit process and be familiar with IT audit standards
  • Apply information systems audit principles, skills and techniques in reviewing and testing information systems technology and applications to design and implement a thorough risk-based IT audit strategy
  • Execute the audit process in accordance with established standards and interpret results against defined criteria to ensure that the information systems are protected, controlled and effective in supporting organization’s objectives
  • Evaluate audit results, weighing the relevancy, accuracy, and perspective of conclusions against the accumulated audit evidence
  • Assess the exposures resulting from ineffective or missing control practices and formulate a practical and cost-effective plan to improve those areas
  • Develop an IT audit documentation process and share reports with relevant stakeholders as the basis for decisionmaking
  • Ensure that the necessary changes based on the audit findings are effectively implemented in a timely manner
  • For each information systems project develop a clear project scope statement in alignment with organizational objectives
  • Define activities needed to successfully execute the information systems program, estimate activity duration, and develop a schedule and staffing plan
  • Develop, manage and monitor the information systems program budget, estimate and control costs of individual projects
  • Identify, negotiate, acquire and manage the resources needed for successful design and implementation of the information systems program (e.g., people, infrastructure, and architecture)
  • Acquire, develop and manage information security project team
  • Assign clear information security personnel job functions and provide continuous training to ensure effective performance and accountability
  • Direct information security personnel and establish communications, and team activities, between the information systems team and other security-related personnel (e.g., technical support, incident management, security engineering)
  • Resolve personnel and teamwork issues within time, cost, and quality constraints
  • Identify, negotiate and manage vendor agreement and community
  • Participate with vendors and stakeholders to review/assess recommended solutions; identify incompatibilities, challenges, or issues with proposed solutions
  • Evaluate the project management practices and controls to determine whether business requirements are achieved in a cost-effective manner while managing risks to the organization
  • Develop a plan to continuously measure the effectiveness of the information systems projects to ensure optimal system performance
  • Identify stakeholders, manage stakeholders’ expectations, and communicate effectively to report progress and performance
  • Ensure that necessary changes and improvements to the information systems processes are implemented as required
  • Identify the criteria for mandatory and discretionary access control, understand the different factors that help in implementation of access controls and design an access control plan
  • Implement and manage an access control plan in alignment with the basic principles that govern the access control systems such as need-to-know
  • Identify different access control systems such as ID cards and biometrics
  • Understand the importance of warning banners for implementing access rules
  • Develop procedures to ensure system users are aware of their IA responsibilities before granting access to the information systems
  • Understand various social engineering concepts and their role in insider attacks and develop best practices to counter social engineering attacks
  • Design a response plan to identity theft incidences
  • Identify and design a plan to overcome phishing attacks
  • Identify standards, procedures, directives, policies, regulations, and laws for physical security
  • Determine the value of physical assets and the impact if unavailable
  • Design, implement and manage a comprehensive, coordinated, and holistic physical security plan to ensure overall organizational security including an audit schedule and performance metrics
  • Develop, implement, and monitor business continuity, business recovery, contingency planning, and disaster recovery plans in case of disruptive events and ensure alignment with organizational goals and objectives
  • Direct contingency planning, operations, and programs to manage risk
  • Design documentation process as part of the continuity of operations program
  • Design and execute a testing and updating plan for the continuity of operations program
  • Understand the importance of integration of IA requirements into the Continuity of Operations Plan (COOP).
    Understand and manage network cloud security
  • Identify the appropriate intrusion detection and prevention systems for organizational information security
  • Design and develop a program to monitor firewalls and identify firewall configuration issues
  • Understand perimeter defense systems such as grid sensors and access control lists on routers, firewalls, and other network devices
  • Identify the basic network architecture, models, protocols and components such as routers and hubs that play a role in network security
  • Understand the concept of network segmentation
  • Manage DMZs, VPN and telecommunication technologies such as PBX and VoIP
  • Identify network vulnerabilities and explore network security controls such as use of SSL and TLS for transmission security
  • Support, monitor, test, and troubleshoot issues with hardware and software
  • Manage accounts, network rights, and access to systems and equipment
  • Identify vulnerability and attacks associated with wireless networks and manage different wireless network security tools
  • Assess the threat of virus, Trojan and malware to organizational security and identify sources and mediums of malware infection
  • Deploy and manage anti-virus systems
  • Develop process to counter virus, Trojan, and malware threats including training both security teams and non-security teams on secure development processes
  • Develop and maintain software assurance programs in alignment with the secure coding principles and each phase of System Development Life Cycle (SDLC)
  • Understand various system-engineering practices
  • Configure and run tools that help in developing secure programs
  • Understand software vulnerability analysis techniques including static code, dynamic code, and software composition analysis.
  • Install and operate the IT systems in a test configuration manner that does not alter the program code or compromise security safeguards
  • Identify web application vulnerabilities and attacks and web application security tools to counter attacks
  • Identify various OS vulnerabilities and attacks and develop a plan for hardening OS systems
  • Understand system logs, patch management process and configuration management for information system security
  • Understand the concept of encryption and decryption, digital certificates, public key infrastructure and the key differences between cryptography and steganography
  • Identify the different components of a cryptosystem
  • Develop a plan for information security encryption techniques
  • Design, develop and implement a penetration testing program based on penetration testing methodology to ensure organizational security
  • Identify different vulnerabilities associated with information systems and legal issues involved in penetration testing
  • Develop pre and post testing procedures
  • Develop a plan for pen test reporting and implementation of technical vulnerability corrections
  • Develop vulnerability management systems
  • Create and manage a threat management program including threat intelligence, thirdparty threats, and security bulletins regarding hardware and software, particularly open-source software
  • Develop a plan to identify a potential security violation and take appropriate action to report the incident
  • Comply with system termination procedures and incident reporting requirements related to potential security incidents or actual breaches
  • Assess potential security violations to determine if the network security policies have been breached, assess the impact, and preserve evidence
  • Diagnose and resolve IA problems in response to reported incidents
  • Design incident response procedures including testing, table top exercises, and playbooks
  • Develop guidelines to determine whether a security incident is indicative of a violation of law that requires special legal action
  • Identify the volatile and persistent system information
    Set up and manage forensic labs and programs
  • Understand various digital media devices, e-discovery principles and practices and different file systems
  • Develop and manage an organizational digital forensic program
  • Establish, develop and manage forensic investigation teams
  • Design investigation processes such as evidence collection, imaging, data acquisition, and analysis
  • Identify the best practices to acquire, store and process digital evidence
  • Configure and use various forensic investigation tools
  • Design anti-forensic techniques
  • Design, develop and maintain enterprise information security architecture (EISA) by aligning business processes, IT software and hardware, local and wide area networks, people, operations, and projects with the organization’s overall security strategy
  • Perform external analysis of the organization (e.g., analysis of customers, competitors, markets and industry environment) and internal analysis (risk management, organizational capabilities, performance measurement etc.) and utilize them to align information security program with organization’s objectives
  • Identify and consult with key stakeholders to ensure understanding of organization’s objectives
  • Define a forward-looking, visionary and innovative strategic plan for the role of the information security program with clear goals, objectives and targets that support the operational needs of the organization
  • Define key performance indicators and measure e effectiveness on continuous basis
  • Assess and adjust security resources to ensure they support the organization’s strategic objectives
  • Monitor and update activities to ensure accountability and progress
  • Analyze, forecast and develop the operational budget of the security department
  • Acquire and manage the necessary resources for implementation and management of information security plan
  • Allocate financial resources to projects, processes and units within information security program
  • Monitor and oversee cost management of information security projects, return on investment (ROI) of key purchases related to IT infrastructure and security and ensure alignment with the strategic plan
  • Identify and report financial metrics to stakeholders
  • Balance the IT security investment portfolio based on EISA considerations and enterprise security priorities
  • Understand the acquisition life cycle and determine the importance of procurement by performing Business Impact Analysis
  • Identify different procurement strategies and understand the importance of costbenefit analysis during procurement of an information system
  • Understand the basic procurement concepts such as Statement of Objectives (SOO), Statement of Work (SOW), and Total Cost of Ownership (TCO)
  • Collaborate with various stakeholders (which may include internal client, lawyers, IT security professionals, privacy professionals, security engineers, suppliers, and others) on the procurement of IT security products and services
  • Include risk-based security requirements in acquisition plans, cost estimates, statements of work, contracts, and evaluation factors for award, service level agreements, and other pertinent procurement documents
  • Design vendor selection process and management policy
  • Develop contract administration policies that direct the evaluation and acceptance of delivered IT security products and services under a contract, as well as the security evaluation of IT and software being procured
  • Develop measures and reporting standards to measure and report on key objectives in procurements aligned with IT security policies and procedures
  • Understand the IA security requirements to be included in statements of work and other appropriate procurement documents
  • Design third party selection process
  • Design third party management policy, metrics, and processes
  • Design and manage the third party assessment process including ongoing compliance management
  • Develop measures and reporting standards to measure and report on key objectives in procurements aligned with IT security policies and procedures
  • Include risk-based security requirements in acquisition plans, cost estimates, statements of work, contracts, and evaluation factors for award, service level agreements, and other pertinent procurement documents
  • Understand the security, privacy, and compliance requirements to be included in Statements of Work (SOW), Master Service Agreements (MSA), and other appropriate procurement documents

Recommended prerequisite knowledge

  • Professional Experience: A minimum of five years of experience in at least three of the five CCISO domains, which include governance, risk management, information security controls, security program management and operations, and core information security skills.
  • Certification: While not mandatory, holding other professional information security certifications, such as CISA, CISM, or CISSP, can be beneficial.
  • Academic Education: A bachelor’s or master’s degree in a related field can be advantageous, but is not strictly required.

Credentials and certification

Exam features

  • Code: 712-50
  • Title: Certified Chief Information Security Officer
  • Duration: 2.5 hours  
  • Number of Questions: 150 
  • Question Format: Multiple Choice
  • Online with EC-Council Exam Center
  • Cost: $0 (included in your training)

All details >>

CCISO Certification Training

The CCISO Certification training is designed for experienced cybersecurity professionals aspiring to take leadership roles in managing enterprise information security programs. This course covers key areas of governance, risk management, information security controls, and strategic planning to align security with organizational goals.

Participants gain advanced insights and practical skills to prepare for the CCISO certification, validating their ability to oversee and direct complex cybersecurity operations.

Why Choose the CCISO Training?

Organizations face increasing challenges in maintaining robust cybersecurity strategies in a dynamic threat landscape. The CCISO training equips professionals with the leadership and technical skills to develop, implement, and manage enterprise-level security programs.

Earning the CCISO certification demonstrates your expertise in integrating security initiatives with business objectives, making you a critical asset in executive leadership roles.

Key Skills Developed in the Training

  1. Governance and security management
    Learn to establish policies, frameworks, and standards for effective information security governance.

  2. Risk management and compliance
    Master the processes for assessing, mitigating, and managing risks to ensure regulatory compliance.

  3. Strategic security planning
    Align security initiatives with organizational goals through effective resource allocation and strategic foresight.

  4. Information security controls
    Implement and oversee advanced controls to protect critical assets and ensure business continuity.

  5. Incident management and recovery
    Develop strategies for handling security incidents, minimizing downtime, and recovering operations swiftly.

  6. Prepare for the CCISO certification exam
    Acquire the knowledge and skills necessary to succeed in the CCISO certification exam.

Comprehensive Training Led by Experts

This course is taught by experienced professionals with a deep understanding of information security leadership. Participants engage in discussions, case studies, and practical exercises to apply their knowledge in real-world scenarios, ensuring readiness for executive roles.

Who Should Attend?

This training is ideal for:

  • Information security managers advancing to CISO roles
  • Senior IT professionals overseeing security programs
  • Risk and compliance officers seeking leadership insights
  • Individuals preparing for the Certified Chief Information Security Officer (CCISO) certification

Elevate Your Leadership in Cybersecurity with CCISO

The Certified Chief Information Security Officer (CCISO) (EC6155) training provides the knowledge and expertise to lead enterprise security programs effectively. Enroll today to achieve a globally recognized certification and advance your career in executive cybersecurity leadership.

Exam Success Strategies for CCISO

Mastering the Certified Chief Information Security Officer (CCISO) certification requires more than technical knowledge—strategic thinking, executive-level decision-making, and comprehensive understanding of information security governance are equally crucial for success. By understanding security program management, risk governance frameworks, and strategic planning methodologies, you’ll develop the confidence and expertise needed to excel in the CCISO certification exam.

CCISO Exam Statistics & Success Rates

  • Average Pass Rate: 60-65% on first attempt
  • Most Common Score Range: 68-76% for passing candidates
  • Average Study Time: 8-12 weeks for experienced security managers and directors with 5+ years of leadership experience
  • Retake Rate: 30-35% of candidates require a second attempt
  • Top Failure Areas: Governance and risk management frameworks (35%), strategic security planning and budgeting (28%), security program operations and metrics (22%)

Study Method Comparison

Study Approach Duration Pass rate Best For

Hands-on Practice Only

10-12 weeks

35-45%

Senior security executives

Documentation + Practice

12-14 weeks

60-65%

Methodical learners

Training + Labs + Practice

8-12 weeks

75-82%

Comprehensive preparation

Practice Tests Only

6-8 weeks

25-35%

Not recommended

Strategic Study Approach

  • Create an 8-12 week study schedule – Executive-level security leadership requires deep understanding of governance, strategic planning, and organizational risk management
  • Follow the 60-30-10 rule – 60% reading case studies and strategic frameworks, 30% analyzing governance scenarios and business alignment, 10% practice exams
  • Focus on executive-level thinking – CCISO emphasizes strategic decision-making, business alignment, and organizational leadership rather than technical implementation
  • Study in 90-minute blocks with 15-minute breaks to maximize retention and avoid burnout
  • Analyze real-world security program scenarios repeatedly – understand how to align security with business objectives, manage budgets, and communicate with executive leadership
  • Master governance frameworks – deeply understand ISO 27001, NIST CSF, COBIT, and how to implement enterprise-wide security governance
  • Understand the breadth of executive security leadership – CCISO covers 5 domains spanning governance, controls, operations, core competencies, and strategic planning

Common Exam Pitfalls to Avoid

  • Don’t confuse technical security with security governance – Know the difference between implementing controls and establishing governance frameworks
  • Strategic planning requires business alignment – Understand how to align security initiatives with organizational goals, budgets, and risk tolerance
  • Risk management is enterprise-wide – Know how to assess, prioritize, and communicate risks to executive leadership and board members
  • Compliance is not the same as security – Understand the relationship between regulatory compliance and comprehensive security programs
  • Security metrics must demonstrate business value – Know how to develop KPIs, KRIs, and metrics that communicate security effectiveness to non-technical executives
  • Third-party risk management is critical – Understand vendor assessment, supply chain security, and outsourcing governance
  • Incident response requires executive oversight – Know how to establish IR governance, crisis management, and business continuity frameworks
  • Security awareness is a strategic initiative – Understand how to build security culture, executive buy-in, and organization-wide awareness programs
  • Budget justification requires ROI analysis – Know how to develop business cases, calculate security ROI, and justify security investments
  • Communication with the board is specialized – Understand how to present security posture, risk landscape, and strategic initiatives to board members

Topic Weight Distribution

Exam Domain Weight Focus Areas Priority

Governance, Risk, Compliance

25-30%

Frameworks (ISO 27001, NIST, COBIT), risk assessment, regulatory compliance, board reporting

Critical

Strategic Planning & Finance

20-25%

Security strategy, budget development, ROI analysis, resource allocation, business alignment

Critical

Security Program Management

18-22%

Program development, metrics/KPIs, maturity models, continuous improvement, operations

Critical

Information Security Controls

15-18%

Control frameworks, implementation oversight, audit management, effectiveness measurement

High

Security Core Competencies

12-15%

IAM, cryptography, network security, application security, cloud security (strategic level)

High

Third-Party & Procurement

8-10%

Vendor risk, supply chain security, contract management, outsourcing governance

Medium

Incident Response & BC/DR

6-8%

IR governance, crisis management, business continuity, disaster recovery planning

Medium

Exam Day Time Management

  • Allocate approximately 1.5-2 minutes per question on average – this gives you buffer time for complex governance and strategic planning scenarios
  • Read scenario questions completely before attempting to answer – executive questions often contain critical details about organizational context, stakeholder concerns, or business constraints
  • Flag uncertain questions and return to them – don’t get stuck on difficult strategic scenarios and waste valuable time
  • Reserve 15-20 minutes at the end to review flagged questions and double-check your answers
  • Manage governance questions strategically – prioritize questions related to your strongest leadership domains first

Managing Exam Stress & Performance

  • Get 7-8 hours of quality sleep the night before – avoid last-minute cramming that reduces strategic thinking capacity
  • Log in to the exam site 10-15 minutes early – settle in and complete check-in procedures calmly
  • Use deep breathing techniques if you feel overwhelmed during the exam – clear executive-level thinking is essential for governance questions
  • Trust your leadership experience – your first instinct is usually correct on scenario-based strategic questions
  • Remember that the passing score is 70% – you don’t need perfection, just solid competence in executive security leadership

Technical Preparation Tips

  • Master governance frameworks – understand ISO 27001, NIST Cybersecurity Framework, COBIT, and how to implement enterprise security governance
  • Understand risk management methodologies – know qualitative and quantitative risk assessment, risk treatment strategies, and risk communication to executives
  • Practice strategic security planning – understand how to develop multi-year security roadmaps, align with business objectives, and secure executive buy-in
  • Master security metrics and reporting – know how to develop KPIs, KRIs, dashboards, and board-level reporting that demonstrates security value
  • Understand security program operations – know how to structure security teams, define roles and responsibilities, and manage security operations
  • Practice budget development and ROI analysis – understand how to justify security investments, calculate ROI, and manage security budgets
  • Master third-party risk management – know vendor assessment frameworks, supply chain security, and contract security requirements
  • Understand incident response governance – know how to establish IR frameworks, crisis management procedures, and executive communication protocols

Final Week Preparation

  • Take 2-3 full practice exams to identify knowledge gaps and build confidence
  • Review the official CCISO exam domains from EC-Council one final time
  • Focus on your weakest areas – governance frameworks, strategic planning, and security metrics are the most common failure areas
  • Avoid learning new concepts – focus on reinforcing what you already know
  • Prepare your exam day logistics – required identification, computer setup for online proctoring

Mental Preparation Strategies

  • Visualize success scenarios – imagine yourself confidently analyzing governance scenarios and making strategic security decisions
  • Recall your leadership experience – you’ve likely managed security programs, presented to executives, and made strategic decisions before
  • Stay positive when facing difficult questions – all candidates encounter challenging governance scenarios
  • Remember that executive security leadership is a strategic skill – your management experience is your greatest asset
  • Approach the exam as a validation of your leadership expertise, not a test of memorized frameworks

How to Schedule Your CCISO Exam

  • Testing is done online with EC-Council Exam Center, the authorized testing partner for CCISO
  • Scheduling Process: Create an account, search for “CCISO” or “412-38”, select your date
  • Exam Cost: Included in your Eccentrix training – exam voucher provided for this certification
  • Scheduling Timeline: Book at least 2-3 weeks in advance for better time slot availability
  • Rescheduling Policy: Free rescheduling up to 24 hours before your exam appointment
  • Required ID: Government-issued photo ID (passport, driver’s license) matching your registration name exactly

Success Mindset: Approach CCISO as a validation of your executive security leadership expertise and your ability to align security with business objectives, manage enterprise risk, and communicate effectively with board members and C-suite executives, not as a test of memorized frameworks. Your strategic thinking, leadership experience, and business acumen are your greatest assets.

Frequently asked questions - EC-Council Certified Chief Information Security Officer training (FAQ)

Significant experience in information security management is recommended, with a focus on governance, risk, and compliance.

The course includes governance, risk management, security controls, strategic planning, and incident response.

Yes, participants work through real-world case studies to apply executive-level security management practices.

The certification validates your leadership and technical expertise, enhancing your qualifications for executive roles.

The course bridges technical expertise with business strategy, focusing on the skills required for executive security leadership.

Yes, the training fully aligns with the domains and objectives of the CCISO certification exam.

Request form for a private class training

Dear Customer,

We thank you for your interest in our services. Here is the important information that will be provided to us upon completion of this form:

Training name: Certified Chief Information Security Officer (CCISO) (EC6155)

Language: English

Duration: 5 days / 35 hours

Number of participants from your organization *

Minimum number of participants: 6

Organization name *
Your first and last name *
Telephone number *
Professional email *
Please provide a work or professional email address.
How did you hear about us? *
Comments or Remarks
Promotional code
The General Conditions are accessible on this page.