close

close

Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.

close

close

Press esc to close

close close

Back to course information

Thank you for your enquiry!

One of our training experts will be in touch shortly to go overy your training requirements.

close close

Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.

Course Information

Chief Information Security Officer Training​ Course Outline

Module 1: Governance and Risk Management

  • Governance
  • Information Security Management Structure
  • Principles of Information Security
  • Risk Management
  • Management and Technical Information Security Elements
  • Compliance
  • Privacy
    • Privacy Impact Assessment
    • Privacy and Security
  • Laws and Regulatory Drivers
  • Standards and Frameworks
    • ISO/IEC 27000 Series
    • ISO/IEC 27001
    • NIST Cybersecurity Framework
    • Federal Information Processing Standards
    • NIST Special Publications
    • Privacy Shield
    • COBIT
  • Information Security Trends and Best Practices
    • Open Web Application Security Project
    • Cloud Security Alliance
    • Centre for Internet Security
  • Information Security Training and Certifications
  • Ethics

Module 2: Information Security Controls, Compliance, and Audit Management

  • Information Security Controls
    • Control Fundamentals
    • Control Frameworks
  • Information Security Control Life Cycle Frameworks
    • NIST Risk Management Framework
    • NIST Cybersecurity Framework
    • ISO/IEC 27000
  • Information Security Control Life Cycle
    • Risk Assessment
    • Design
    • Implementation
    • Assessment
    • Monitoring
  • Exploring Information Security Control Frameworks
  • Auditing for the CISO
    • Audit Management
    • Audit Process
    • Control Self-Assessments
    • Continuous Auditing
    • Specific Types of Audits and Assessments

Module 3: Security Programme Management and Operations

  • Security Programme Management
    • Security Areas of Focus
    • Security Streams of Work
    • Asset Security Management
    • Security Projects
  • Security Programme Budgets, Finance, and Cost Control
    • Establishing the Budget
    • Managing and Monitoring Spending
  • Security Programme Resource Management: Building the Security Team
    • Project Management
    • Project Management Fundamentals
  • Project Management
    • Phases of Project Management
    • Initiating
    • Planning
    • Executing
    • Monitoring and Controlling
    • Closing

Module 4: Information Security Core Competencies

  • Malicious Software and Attacks
    • Malware
    • Scripting and Vulnerability – Specific Attacks
  • Social Engineering
    • Types of Social Engineering Attacks
    • Why Employees Are Susceptible to Social Engineering
    • Social Engineering Defences
  • Asset Security
    • Asset Inventory and Configuration
    • Management
    • Secure Configuration Baselines
    • Vulnerability Management
    • Asset Security Techniques
  • Data Security
    • Data at Rest
    • Data in Transit
    • Data in Use
    • Data Life Cycle
  • Identity and Access Management
    • Identity and Access Management Fundamentals
    • Identity Management Technologies
    • Authentication Factors and Mechanisms
    • Access Control Principles
    • Access Control Models
    • Access Control Administration
    • Identity and Access Management Life Cycle
  • Communication and Network Security
    • WANs and LANs
    • IP Addressing
    • Network Address Translation
    • Network Protocols and Communications
    • Wireless
    • Network Technologies and Defences
  • Cryptography
    • Cryptographic Definitions
    • Cryptographic Services
    • Symmetric, Asymmetric, and Hybrid Cryptosystems
    • Hash Algorithm s
    • Message Authentication Codes
    • Digital Signatures
    • Public Key Infrastructure
  • Cloud Security
    • Cloud Computing Characteristics
    • Cloud Deployment Models
    • Cloud Service Models
    • Cloud Security Risks and Assurance Levels
    • Cloud Security Resources
  • Physical Security
    • Physical Security Threats
    • Physical Security Programme Planning
    • Physical Security Resources
    • Physical Security Controls
    • Physical Security Auditing and Measurement
  • Personnel Security
    • Software Development Security
    • Integrating Security into the SDLC
    • Security SDLC Roles and Responsibilities
    • Software Vulnerabilities
    • Secure Coding Practices
    • Software Vulnerability Analysis and Assessments
  • Forensics, Incident Handling, and Investigations
    • Relevant Law
    • Logging and Monitoring
    • Incident Response and Investigations
    • Forensics and Digital Evidence
  • Security Assessment and Testing
    • Vulnerability Assessments
    • Penetration Testing
    • Regulatory Compliance Assessments
    • Security Programme Assessments
  • Business Continuity and Disaster Recovery
    • Continuity Planning Initiation
    • Business Impact Analysis
    • Identify Preventive Controls
    • Develop Recovery Strategies and Solutions
    • Develop the Plan
    • Test the Plan
    • Maintain the Plan

Module 5: Strategic Planning, Finance, Procurement, and Vendor Management

  • Strategic Planning
    • Organisational Strategic Planning
    • Organisational Strategic Planning Teams
    • Strategic Planning Process
    • Security Strategic Plan
  • Making Security Decisions
  • Financial Management
    • Accounting and Finance Basics
    • Information Security Annual Budget
  • Procurement and Vendor Management
    • Procurement Core Principles and Processes
    • Types of Contracts
    • Scope Agreements
    • Third-Party Vendor Risk Management

Show moredowndown

Prerequisites

In this Chief Information Security Officer (CISO) Training course, there are no formal prerequisites.

Audience

This Chief Information Security Officer (CISO) Training is designed for anyone who wants to reach a top-level position in the information security profession. However, this course is more beneficial for Information Security Officers and Digital Security Managers.

Chief Information Security Officer Training​ Course Overview

Chief Information Security Officer (CISO) is a high-rank executive who creates and executes security programmes to assure that organisation's technologies and data are secured from external and internal threats. A CISO (Chief Information Security Officer) can take on various responsibilities and duties depending on the hierarchy, size, industry, and regulations suitable to the organisation. Organisations that have a Chief Information Security Officer realise many benefits like reduced risks and limited liability issues. So, individuals holding great skills, knowledge, and abilities to perform the duties of Chief Information Security Officer are highly in demand by the various multinational organisations.

This 3-day Chief Information Security Officer Training course aims to provide delegates with a comprehensive knowledge of Information Security Officer roles and responsibilities. During this course, delegates will learn about assessing and monitoring information security control life cycle. They will also learn about the information security controls, cryptography, physical security, security SDLC roles and responsibilities, organisational strategic planning, etc. Our highly professional trainer with years of experience in teaching information security courses will conduct this training course and help delegates get a complete understanding of CISO's roles and responsibilities.

This training will also cover the following concepts:

  • Information security management structure
  • Life cycle frameworks of information security control
  • Information security core competencies
  • Identity and access management life cycle
  • Communication and network security
  • Business continuity and disaster recovery
  • Financial management

At the end of this Chief Information Security Officer Training course, delegates will be able to use various principles and structures to manage information security effectively. They will be able to effectively access the management life cycle and deal with clients using different management technologies. They will also be able to use various network security technologies to secure the organisation's data.

Show moredowndown

  • Delegate pack consisting of course notes and exercises
  • Manual
  • Experienced Instructor

Show moredowndown

Why choose us

Ways to take this course

Our easy to use Virtual platform allows you to sit the course from home with a live instructor. You will follow the same schedule as the classroom course, and will be able to interact with the trainer and other delegates.

Our fully interactive online training platform is compatible across all devices and can be accessed from anywhere, at any time. All our online courses come with a standard 90 days access that can be extended upon request. Our expert trainers are constantly on hand to help you with any questions which may arise.

This is our most popular style of learning. We run courses in 1200 locations, across 200 countries in one of our hand-picked training venues, providing the all important ‘human touch’ which may be missed in other learning styles.

best_trainers

Highly experienced trainers

All our trainers are highly qualified, have 10+ years of real-world experience and will provide you with an engaging learning experience.

venues

State of the art training venues

We only use the highest standard of learning facilities to make sure your experience is as comfortable and distraction-free as possible

small_classes

Small class sizes

We limit our class sizes to promote better discussion and ensuring everyone has a personalized experience

value_for_money

Great value for money

Get more bang for your buck! If you find your chosen course cheaper elsewhere, we’ll match it!

This is the same great training as our classroom learning but carried out at your own business premises. This is the perfect option for larger scale training requirements and means less time away from the office.

tailored_learning_experience

Tailored learning experience

Our courses can be adapted to meet your individual project or business requirements regardless of scope.

budget

Maximise your training budget

Cut unnecessary costs and focus your entire budget on what really matters, the training.

team_building

Team building opportunity

This gives your team a great opportunity to come together, bond, and discuss, which you may not get in a standard classroom setting.

monitor_progress

Monitor employees progress

Keep track of your employees’ progression and performance in your own workspace.

What our customers are saying

Chief Information Security Officer Training FAQs

FAQ's

Cloud security (cloud computing security) is used to protect cloud-based applications, data, and infrastructure from cyberattacks or cyber threats.
In this Chief Information Security Officer (CISO) Training course, there are no formal prerequisites.
This Chief Information Security Officer (CISO) Training is designed for anyone who wants to reach a top-level position in the information security profession. However, this course is more beneficial for Information Security Officers and Digital Security Managers.
Information security is a combination of methods designed to protect data from unauthorised alterations or access while being stored and transferred from one source to another.
Security operations, cyber risk and cyber intelligence, data loss and fraud prevention, security architecture, programme management, governance, etc., are the responsibilities of CISO.
Policy development and administration, communication and presentation skills, supervisory skills, collaboration and conflict management, risk assessment and management, are the skills needed to be a successful CISO.
Our Chief Information Security Officer Training course will teach you about information security controls, organisational strategic planning, and other topics to understand the security challenges for protecting organisations against information security risks and becoming a successful Chief Information Security Officer (CISO).
The price for Chief Information Security Officer Training certification in Australia starts from AUD3295
The Knowledge Academy is the Leading global training provider in the world for Chief Information Security Officer Training.
Please see our CISSP Training courses available in Australia

Why choose us

icon

Best price in the industry

You won't find better value in the marketplace. If you do find a lower price, we will beat it.

icon

Many delivery methods

Flexible delivery methods are available depending on your learning style.

icon

High quality resources

Resources are included for a comprehensive learning experience.

barclays Logo
deloitte Logo
Thames Water Logo

"Really good course and well organised. Trainer was great with a sense of humour - his experience allowed a free flowing course, structured to help you gain as much information & relevant experience whilst helping prepare you for the exam"

Joshua Davies, Thames Water

santander logo
bmw Logo
Google Logo
backBack to course information

Get a custom course package

We may not have any package deals available including this course. If you enquire or give us a call on +61 272026926 and speak to our training experts, we should be able to help you with your requirements.