This class is designed to combine audit management, governance, IS controls, human capital management, strategic program development, and the financial expertise vital to leading a highly successful IS program. CCISO assumes a high-level understanding of technical topics and does not spend much time on strictly technical information, but instead on the application of technical knowledge to an information security executive's day-to-day work.
EC-Council 
This class is designed to combine audit management, governance, IS controls, human capital management, strategic program development, and the financial expertise vital to leading a highly successful IS program. CCISO assumes a high-level understanding of technical topics and does not spend much time on strictly technical information, but instead on the application of technical knowledge to an information security executive's day-to-day work. The CCISO aims to bridge the gap between the executive management knowledge that CISOs need and the technical knowledge that many aspiring CISOs have. This can be a critical gap as a practitioner endeavors to move from mid-management to upper, executive management roles.
Students who complete this class will be able to:
1. Understand the essentials of Risk management and risk treatment. Comply with the IT audit process and IT audit standards.
2. Comprehend the concepts of Information Security Controls, controls classification and guidelines and identify the acts, laws, and statutes of compliance management.
3. Understand the security operations program that defines the capabilities of an organization to identify security events, respond appropriately, and quickly restore operations to normal.
4. Evaluate physical security mechanisms, examine the issues and recommend the countermeasures to safeguard the network infrastructure.
5. Demonstrate the knowledge of different factors that help in the implementation of access controls and design an access control plan. Identify standards, procedures, directives, policies, regulations, and laws for physical security.
6. Analyze, forecast and develop the operational budget of the IT department and understand how to design vendor selection process and management policy.
