PECB Chief Information Security Officer (CISO)

Acquire knowledge in the field of information security management and become a CISO!

Select the training mode

Training description

Training program
Day 1
Fundamentals of information security and the role of a CISO
  • Training course objectives and structure
  • Fundamentals of information security
  • Chief information security officer (CISO)
  • Information security program
Day 2
Information security compliance program, risk management, and security architecture and design
  • Information security compliance program
  • Analysis of the existing information security capabilities
  • Information security risk management
  • Security architecture and design
Day 3
Security controls, incident management, and change management
  • Information security controls
  • Information security incident management
  • Change management
Day 4
Information security awareness, monitoring and measurement, and continual improvement
  • Awareness and training programs
  • Monitoring and measurement
  • Assurance program
  • Continual improvement
  • Closing of the training course
Day 5
Certification Exam
Who should attend?
  • Professionals actively involved in information security management
  • IT managers responsible for overseeing information security programs
  • Security professionals who aspire to advance into leadership roles, such as security architects, security analysts, and security auditors
  • Professionals responsible for managing information security risk and compliance within organizations
  • Experienced CISOs seeking to enhance their knowledge, stay up to date with the latest trends, and refine their leadership skills
  • Executives, including CIOs, CEOs, and COOs, who play a crucial role in decision-making processes related to information security
  • Professionals aiming to achieve executive-level roles within the information security field
Training objectives
  • Explain the fundamental principles and concepts of information security
  • Comprehend the roles and responsibilities of the CISO and the ethical considerations involved, and address the challenges associated with the role
  • Design and develop an effective information security program, tailored to the needs of the organization
  • Adopt applicable frameworks, laws, and regulations and effectively communicate and implement policies to ensure information security compliance
  • Identify, analyze, evaluate, and treat information security risks, using a systematic and effective approach
Exam
  •  The “PECB Chief Information Security Officer exam meets the requirements of the PECB Examination and Certification Program (ECP). It covers the following competency domains:
    •  Domain 1 Fundamental concepts of information security
    •  Domain 2 The role of CISO in an information security program
    •  Domain 3 Selecting a security compliance program, risk management, and security
    • architecture and design
    •  Domain 4 Operational aspects of information security controls, incident management, and
    • change management
    •  Domain 5 Fostering an information security culture, monitoring, measuring, and improving an
    • information security program
  • Duration: 3 hours
Certification
After successfully passing the exam, you can apply for one of the credentials shown below. You will receive the certificate once you comply with all the requirements related to the selected credential. The requirements for PECB Chief Information Security Officer certifications are as follows:
Certificate name
PECB Information Security Officer
Exam name
PECB Chief Information Security Officer exam
Experience
None
InfoSec management experience
None
Other requirements
Signing the PECB Code of Ethics
Certificate name
PECB Chief Information Security Officer
Exam name
PECB Chief Information Security Officer exam
Experience
Five years: Two years of work experience in information security
InfoSec management experience
Project activities: a total of 300 hours
Other requirements
Signing the PECB Code of Ethics
What do you get?
certificate of participation
meetings with experts
best practices / experiences
innovative forms of classes
competitive prices
General information
  • Certification and examination fees are included in the price of the training course
  • Participants will be provided with the training course material containing over 450 pages of explanatory information, examples, best practices, exercises, and quizzes.
  • An attestation of course completion worth 31 CPD (Continuing Professional Development) credits will be issued to the participants who have attended the training course.
  • In case candidates fail the exam, they can retake it within 12 months following the initial attempt for free.
Net Price
  • Online training - 1 249,00 EUR
  • Self-study with the support of a trainer - 1 085,00 EUR
  • Self-study - 739,00 EUR
PECB Certified NIS2 Directive Foundation
Become acquainted with the basic concepts and requirements of NIS2 Directive.
PECB Certified NIS2 Directive Lead Implementer
Master the implementation and management of a cybersecurity program based on NIS2 Directive.
PECB Certified DORA Lead Manager
Master the skills to lead digital resilience in financial entities and ensure compliance with DORA.
Contact us
Resilia Sp. z o.o.
Resilia Sp. z o. o.
43 Żurawia Street, Ap. 205
00-680 Warsaw
KRS 0000379789
NIP 5222972858
REGON 142839818


    I consent to the processing of my personal data by Resilia Sp. z o.o. in order to conduct marketing and sales activities regarding its products or services in the form of:


    The details regarding the processing of personal data, revocation of expressed consents, and data controller can be found in the Privacy policy.

    Dziękujemy za przesłanie formularza z pytaniem. Postaramy się jak najszybciej na nie odpowiedzieć!
    Niestety formularza nie udało się wysłać. Proszę spróbować ponownie później lub skontaktować się z nami bezpośrednio.






      I consent to the processing of my personal data by Resilia Sp. z o.o. in order to conduct marketing and sales activities regarding its products or services in the form of:


      The details regarding the processing of personal data, revocation of expressed consents, and data controller can be found in the Privacy policy.

      The application has been sent!