Companies Home Search Profile

The Complete EC-Certified CISO (CCISO ®) - UNOFFICIAL 2024

Focused View

Nour | Cyvitrix Train

11:38:53

30 View
  • 1. What do we cover in this course.html
  • 2. Why Governance is Important.mp4
    08:24
  • 3. Steering and Strategy and Project Committees.mp4
    05:55
  • 4. Information Security Governance.mp4
    14:04
  • 5. The IT Management Functions.mp4
    11:58
  • 6. IT and Security and Help Desk.mp4
    07:02
  • 7. Organizational Structure and CISO position.mp4
    06:58
  • 8. SoD and Conflict of Interest.mp4
    01:13
  • 9. CISO Roles and Responsibilities.mp4
    10:17
  • 10. Other Roles and their relation with Security Management.mp4
    10:28
  • 11. The Need for Security Policy.mp4
    15:12
  • 12. The Security Standards and Baselines.mp4
    05:37
  • 13. The Security Procedures and Guidelines and Best Practices.mp4
    08:16
  • 14. Attributes of Good Governance Documents.mp4
    09:06
  • 1. Introduction to Risk Management.mp4
    22:16
  • 2. Risk Types and Levels.mp4
    11:57
  • 3. Risk Identification.mp4
    06:59
  • 4. Risk Analysis.mp4
    17:55
  • 5. Risk Evaluation and Response.mp4
    09:21
  • 6. Risk Reporting and Monitoring.mp4
    14:17
  • 7. Risk Management Frameworks.mp4
    02:37
  • 8. Supply Chain Risk Management.mp4
    06:35
  • 1. Security Controls.mp4
    17:15
  • 2. Control Objective and Compensating Controls.mp4
    08:51
  • 3. Defense in Depth and Control References.mp4
    08:08
  • 4. Control Monitoring and KPI and Metrics Overview.mp4
    16:06
  • 5. Control Testing and Assessment.mp4
    09:39
  • 1. Security Notable Standards and Frameworks.mp4
    11:55
  • 2. The concept of Frameworks.mp4
    12:30
  • 3. Privacy Regulations and General Data Protection Regulation - GDPR.mp4
    13:10
  • 4. International Privacy Laws and Regulations Landscape.mp4
    14:27
  • 5. Information Security Laws in US.mp4
    13:50
  • 1. Information System Auditing.mp4
    05:59
  • 2. Internal and External Audit.mp4
    02:01
  • 3. Process of Auditing.mp4
    03:26
  • 4. Audit Planning.mp4
    19:19
  • 5. Audit Execution.mp4
    07:18
  • 6. Audit Reporting.mp4
    08:39
  • 7. Audit and Legal and Regulatory Requirements.mp4
    08:15
  • 1. What is the Security Program.mp4
    17:12
  • 2. Security Program Plans.mp4
    06:34
  • 3. Gap Analysis.mp4
    12:18
  • 4. Governance Responsibilities and Roles in Information Security Program.mp4
    08:34
  • 5. What is the Business Case How to sell your Ideas.mp4
    06:30
  • 6. Senior Management Buy in.mp4
    08:09
  • 7. Acquiring new Controls.mp4
    09:13
  • 8. Security Awareness Training.mp4
    07:37
  • 9. Personnel Security.mp4
    26:57
  • 1. Project Management Overview.mp4
    12:32
  • 2. Project Planning.mp4
    07:37
  • 3. Project Scheduling tools.mp4
    12:44
  • 4. Project Closure Activities.mp4
    02:35
  • 1. Understand Business Impact Assessment.mp4
    05:18
  • 2. Disaster Recovery Plan and its components.mp4
    04:59
  • 3. Business Continuity Plan.mp4
    05:33
  • 4. Recovery Time Objective and Recovery Point Objective.mp4
    09:13
  • 5. Acceptable Interruption Window, SDO & MTO.mp4
    12:35
  • 6. Linking RPO, RTO, AIW, SDO, MTO.mp4
    05:28
  • 7. Recovery Strategies.mp4
    05:47
  • 8. Testing and evaluating the BCP and DRP.mp4
    06:19
  • 9. Data Backup Overview.mp4
    07:50
  • 10. Data Backup types and Building your Backup Strategy.mp4
    13:41
  • 1. Incident Management Process.mp4
    15:25
  • 2. Forensic Investigation and dealing with Digital Evidences.mp4
    09:50
  • 3. Incident Response Training.mp4
    03:19
  • 4. Incident Response Testing.mp4
    05:08
  • 5. Problem Management.mp4
    01:39
  • 1. Security Operation Center overview.mp4
    05:25
  • 2. SOC Tools - SIEM Solution.mp4
    08:26
  • 3. File Integrity Monitoring.mp4
    05:08
  • 4. Endpoint Detection and Response, and Network Detection and Response (EDR & NDR).mp4
    06:51
  • 5. XDR and SOAR.mp4
    06:37
  • 6. Threat Intelligence and Threat Information Sharing.mp4
    04:26
  • 7. Vulnerability Assessment and Patch Management.mp4
    07:58
  • 8. Vulnerability Scanning Tools.mp4
    05:59
  • 9. Penetration Testing.mp4
    10:12
  • Description


    Comprehensive CISO Training: EC-Council ® Certified CISO (CCISO) ® UNOFFICIAL Course

    What You'll Learn?


    • Learn to develop and manage an enterprise information security governance framework and risk management program.
    • Master designing, implementing, and managing security controls, compliance, and audit processes.
    • Gain skills in creating and managing security programs, incident response, and operational risk management.
    • Acquire technical expertise in cryptography, network security, application security, and IAM.
    • Learn strategic security planning, financial management, and vendor risk management.
    • Understand and manage legal, regulatory, and compliance requirements for information security.
    • Develop effective communication and leadership skills for managing security teams and stakeholder relations.
    • Stay updated with emerging cybersecurity trends and technologies to adapt to new threats.

    Who is this for?


  • Aspiring and Current Chief Information Security Officers (CISOs): Professionals looking to advance their careers or enhance their skills in managing enterprise-level security programs.
  • Information Security Managers and Directors: Those responsible for overseeing information security teams and strategies within their organizations.
  • IT Managers and Senior IT Professionals: Individuals involved in IT management and looking to transition into or enhance their roles in information security leadership.
  • Security Consultants and Auditors: Professionals who provide security consulting services or conduct security audits and assessments for organizations.
  • Risk Managers and Compliance Officers: Those responsible for managing risk and ensuring compliance with security standards and regulations.
  • C-Level Executives: Executives such as CIOs, CTOs, and COOs who need to understand and support their organization's information security strategies.
  • Any Professionals with Significant Information Security Responsibilities: Individuals in roles that require a deep understanding of information security management and strategy.
  • This course is ideal for anyone aiming to develop a comprehensive understanding of information security leadership and to prepare for the responsibilities of a CISO.
  • What You Need to Know?


  • Experience in senior or managerial roles within information security or IT departments.
  • A solid understanding of information security concepts, practices, and frameworks.
  • Prior certifications in information security, such as CISSP, CISM, or CEH, can be advantageous.
  • Passion to learn
  • More details


    Description

    Unlock your potential with our comprehensive EC-Council Certified CISO (CCISO) UNOFFICIAL Course, tailored for aspiring and current Chief Information Security Officers (CISOs), IT managers, and senior security professionals. This course delivers the skills and knowledge needed to excel in cybersecurity leadership.


    Designed for those with a passion for information security management, this CCISO course covers all essential domains, including governance, risk management, compliance, and security controls.

    You'll learn how to develop and manage robust security programs, ensuring your organization is protected against the latest threats.


    Our course delves deep into strategic planning, providing you with the tools to align your security strategies with business objectives.

    You'll gain a thorough understanding of legal and regulatory requirements, ensuring compliance with industry standards and laws.


    Stay ahead of emerging cybersecurity trends and technologies, enabling you to adapt and respond to new challenges effectively.  With expert instructors who bring real-world insights and practical strategies, you will be equipped to lead your organization's information security initiatives with confidence. This course is ideal for IT managers looking to transition into security leadership roles, current CISOs seeking to enhance their skills, and professionals responsible for risk management and compliance. 


    Course Highlights

    • Expert-Led Curriculum: Learn from industry experts with extensive experience in information security management.

    • Practical Insights: Gain real-world insights and practical strategies for addressing modern cybersecurity challenges.

    • Networking Opportunities: Connect with fellow professionals and expand your professional network within the cybersecurity community.

    • Instructor Support: Receive personalized guidance and support from instructors through live Q&A sessions, ensuring clarity and understanding of course material.

    Who Should Attend

    This course is ideal for:

    • IT professionals seeking to specialize in information security management.

    • Security analysts aiming to advance their careers to leadership roles.

    • Managers responsible for overseeing cybersecurity initiatives within their organizations.

    • Anyone interested in pursuing a career as a Chief Information Security Officer (CISO).


    Prerequisites

    While there are no specific prerequisites for this course, a basic understanding of cybersecurity fundamentals would be beneficial.


    Certification

    Upon successful completion of the course, participants will receive a certificate of achievement, recognizing their commitment to advancing their skills in information security management.


    Enroll Today

    Enroll now in our EC-Council Certified CISO (CCISO) UNOFFICIAL Course to elevate your career, master cybersecurity leadership, and become a trusted CISO in the ever-evolving world of information security. 

    Who this course is for:

    • Aspiring and Current Chief Information Security Officers (CISOs): Professionals looking to advance their careers or enhance their skills in managing enterprise-level security programs.
    • Information Security Managers and Directors: Those responsible for overseeing information security teams and strategies within their organizations.
    • IT Managers and Senior IT Professionals: Individuals involved in IT management and looking to transition into or enhance their roles in information security leadership.
    • Security Consultants and Auditors: Professionals who provide security consulting services or conduct security audits and assessments for organizations.
    • Risk Managers and Compliance Officers: Those responsible for managing risk and ensuring compliance with security standards and regulations.
    • C-Level Executives: Executives such as CIOs, CTOs, and COOs who need to understand and support their organization's information security strategies.
    • Any Professionals with Significant Information Security Responsibilities: Individuals in roles that require a deep understanding of information security management and strategy.
    • This course is ideal for anyone aiming to develop a comprehensive understanding of information security leadership and to prepare for the responsibilities of a CISO.

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Nour | Cyvitrix Train
    Nour | Cyvitrix Train
    Instructor's Courses
    Hi there!As cyber threats continue to evolve and become more sophisticated, the need for skilled cyber-security professionals has never been greater. A cyber-security trainer can play a critical role in preparing individuals and organizations to defend against cyber attacks and protect their sensitive information and assets.Here are 10 reasons why you should train with me as your cyber-security trainer:Expertise: With years of experience working in the cyber-security field, I bring a wealth of knowledge and expertise to my courses. I stay up-to-date with the latest trends and best practices in the industry, and I am dedicated to sharing this knowledge with my students.Comprehensive Training: My courses cover a wide range of cyber-security topics, including network security, cloud security, data protection, threat detection, and incident response. This ensures that learners have a well-rounded understanding of the cyber-security landscape.Practical Insights: My courses are designed to be practical and actionable, with a focus on real-world scenarios and challenges. I provide hands-on exercises and case studies that help learners apply their knowledge and skills in a practical setting.Accessibility: My courses are accessible to learners of all skill levels and backgrounds. I use clear and concise language, and I provide explanations and examples that are easy to understand.Engaging Instruction: I use a variety of teaching methods, including lectures, interactive exercises, and quizzes, to keep learners engaged and motivated. My courses are designed to be dynamic and interesting, with a focus on active learning.Flexibility: My courses are self-paced, which means learners can complete them at their own pace and on their own schedule. This makes it easy for busy professionals to fit training into their busy schedules.Support: I am always available to answer questions and provide support to my students. I am dedicated to helping learners succeed, and I offer personalized support to ensure that students get the most out of their training.Collaboration: I encourage collaboration and communication among learners, which helps to foster a sense of community and support. I provide opportunities for learners to connect with each other and share their experiences and insights.Soft Skills Training: In addition to technical skills, I emphasize the importance of soft skills such as critical thinking, problem-solving, and communication. These skills are essential for success in the security field, and I provide training and guidance on how to develop them.Affordability: My courses are affordable and offer exceptional value for the price. I believe that everyone should have access to quality cyber-security training, and I strive to make my courses accessible to as many learners as possible.As a cyber-security trainer on Udemy, I am committed to helping learners develop the knowledge and skills they need to succeed in the cyber-security field. I am dedicated to providing high-quality training that is relevant, engaging, and practical, and I am always available to answer questions and provide support to my students.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 75
    • duration 11:38:53
    • Release Date 2024/08/11