SU Q/ISO Qualified/ Chief Information Security Officer
If you're pursuing your Q/CISO Qualified/ Chief Information Security Officer Certification class, you'll need to study hard. This class is a comprehensive review of executive levels of information security & industry best practices merged with a comprehensive exam preparation for the Q/CISO exam. Bringing together all the components required for a C-Level positions, the CCISO program combines audit management, governance, IS controls, human capital management, strategic program development, and the financial expertise vital to leading a highly successful IS program.
|Contact Hours:||72 Lecture Hours|
|Credits:||72 CPE / 3 CEU|
|Method of Delivery:||Residential (100% face-to-face) or Hybrid|
|Method of Evaluation:||95 % attendance 2. 100 % completion of Lab|
|Grading:||Pass = Attendance+ labs & quizzes Fail > 95% Attendance|
Sample Job Titles:
Contracting Officer (CO)
Contracting Officer Technical Representative (COTR)
Information Assurance (IA) Manager
Information Assurance (IA) Program Manager
Information Assurance (IA) Security Officer
Information Security Program Manager
Information Systems Security Manager (ISSM)
Information Systems Security Officer (ISSO)
Information Systems Security Operator
This 72 hour accelerated class is taught using face to face modality or hybrid modality. Class includes 72 hours of contact studies, labs, reading assignments and final exam - passing the final exam is a requirement for graduation.
Who should attend: CIOs with responsibility for Contingency Planning, Network Administrators, Information Security Architects, Auditors, Consultants, and all others seeking to plan, implement, and/or manage an Contingency Planning program.
How much does a Chief Information Security Officer make in the United States? The average Chief Information Security Officer salary in the United States is $230,204 as of April 26, 2022, but the range typically falls between $201,017 and $265,867. Salary ranges can vary widely depending on many important factors, including education, certifications, additional skills, the number of years you have spent in your profession. With more online, real-time compensation data than any other website, Salary.com helps you determine your exact pay target.
Chief information security officers may have been best known for being thrown under the bus in the aftermath of a data breach. Now they’re making a reputation for themselves as tech’s most wanted, and highest paid. And rightfully so.
Cybercrime Magazine recently caught up with Jeremy King, president and founder at Benchmark Executive Search, for a discussion about CISOs at the world’s largest companies. It used to be that a cyberattack was a CISO’s worst nightmare, and a sure-fire sign that a pink slip would follow. In 2020, it’s a fact that every company has been hacked (or will be). Major corporations globally, with the help of law enforcement and private sector cyber defenders, have come to the realization that it’s not the CISO’s fault, and ousting one will only open up another can of worms — namely recruiting a replacement in a highly competitive market that is suffering through a severe workforce shortage. Instead, CISOs are being heralded for their ability to plan for the worst, and to react calmly, legally, methodically, and swiftly, in response to cyber intrusions.
50 hrs lecture/ 22 hrs labs:
10 hrs lecture 2 hrs labs
Domain 1: Governance (Policy, Legal, and Compliance)
Information Security Management Program
Defining an Information Security Governance Program
Regulatory and Legal Compliance
10 hrs Lecture 4 hr Labs
Domain 2: IS Management Controls and Auditing Management
Designing, deploying, and managing security controls
Understanding security controls types and objectives
Implementing control assurance frameworks
Understanding the audit management process
10 hrs Lecture 6 hr Labs
Domain 3: Security Program Management & Operations
The role of the CISO
Information Security Projects
Integration of security requirements into other operational processes
10 hrs Lecture 3 hr Labs
Domain 4: Information Security Core Concepts
Disaster Recovery and Business Continuity Planning
Threat and Vulnerability Management
Vulnerability Assessments and Penetration Testing
10 hrs Lecture 7 hr Labs
Domain 5: Strategic Planning, Finance, & Vendor Management
Security Strategic Planning
Alignment with business goals and risk tolerance
Security emerging trends
Key Performance Indicators (KPI)
Development of business cases for security
Analyzing, forecasting, and developing a capital expense budget
Analyzing, forecasting, and developing an operating expense budget
Return on Investment (ROI) and cost-benefit analysis
Integrating security requirements into the contractual agreement and procurement process
**Note: If required student information is not brought to class a "practice set" of information will be available.
Grades - All students must ordinarily take all quizzes, labs, final exam and submit the class practical in order to be eligible for a Q/ISP, Q/IAP, Q/SSE, or Q/WP credential unless granted an exception in writing by the President. Know that Q/ISP classes draws quite the spectrum of students, including "those less comfortable," "those more comfortable," and those somewhere in between. However, what ultimately matters in this course is not so much where you end up relative to your classmates but where you end up relative to yourself in on Friday of class. The course is graded as a pass or fail solely on your attendance and participation. Books - No books are required for this course. However, you may want to supplement your preparation.