Certified Chief Information Security Officer Certification | Information Security Management Training | EC-Council - C|CISO Program
CCISO Certification
About the Program
Why CCISO?
NICE Framework
Government
How to get Certified
About the Program
About the Program
EC-Council’s CCISO Program has certified leading information security professionals around the world. A core group of high-level information security executives, the CCISO Advisory Board, contributed by forming the foundation of the program and outlining the content that would be covered by the exam, body of knowledge, and training. Some members of the Board contributed as authors, others as exam writers, others as quality assurance checks, and still others as trainers. Each segment of the program was developed with the aspiring CISO in mind and looks to transfer the knowledge of seasoned professionals to the next generation in the areas that are most critical in the development and maintenance of a successful information security program.
The Certified CISO (CCISO) program is the first of its kind training and certification program aimed at producing top-level information security executives. The CCISO does not focus solely on technical knowledge but on the application of information security management principles from an executive management point of view. The program was developed by sitting CISOs for current and aspiring CISOs.
In order to sit for the CCISO exam and earn the certification, candidates must meet the basic CCISO requirements. Candidates who do not yet meet the CCISO requirements but are interested in information security management can pursue the
EC-Council Information Security Management (EISM) certification
Why CCISO?
Why should you consider the CCISO program?
The CCISO Certification is an industry-leading program that recognizes the real-world experience necessary to succeed at the highest executive levels of information security.
Bringing together all the components required for a C-Level positions, the CCISO program combines audit management, governance, IS controls, human capital management, strategic program development, and the financial expertise vital to leading a highly successful IS program. Material in the CCISO Program assumes a high-level understanding of technical topics and doesn’t spend much time on strictly technical information, but rather on the application of technical knowledge to an information security executive’s day-to-day work. The CCISO aims to bridge the gap between the executive management knowledge that CISOs need and the technical knowledge that many aspiring CISOs have. This can be a crucial gap as a practitioner endeavors to move from mid-management to upper, executive management roles. Much of this is traditionally learned as on the job training, but the CCISO Training Program can be the key to a successful transition to the highest ranks of information security management.
NICE Framework
The NICE Cybersecurity Workforce Framework (NCWF)(link is external) NIST Special Publication 800-181, is a national resource that categorizes and describes cybersecurity work.The NCWF provides employers, employees, educators, students, and training providers with a common language to define cybersecurity work as well as a common set of tasks and skills required to perform cybersecurity work.
EC-Council has mapped the domains of CCISO to the NCWF in the following document.
Government
ANSI
DoD
NAVY
ARMY
MARINE CORPS
AIR FORCE
EC-Council is dedicated to working with the US Department of Defense to bring the highest standards of Training, Education and Certification to our military.
Independent Accreditation ensures Quality of Certification
EC-Council Certifications are developed to the highest standards and have achieved numerous accreditations including ANSI 17024 for:
DoD Directive 8570/ 8140
EC-Council’s Certified Ethical Hacker is an approved baseline certification for the following Cyber Security Service Provider sections:
IAM Level II • IAM Level III • CSSP Manager
Information on DoD 8570 can be found at the following DISA website:
Certification to Framework Mappings
A core component of EC-Council Certification development is the Job Task Analysis (JTA) Process we undertake before any certification is built. Major frameworks like the NICE/NIST Framework, NIST 800-171, GCHQ, and others contribute to content areas of each of our programs. As a result, EC-Council Certifications and Training programs are mapped to most major published Frameworks.
EC-Council Maps to the National Initiative for Cybersecurity Education Framework
Download the comprehensive mapping of EC-Council program sections to The Roles and their associated Knowledge, Skills and abilities.
Download NICE 2.0 Mapping
EC-Council Cyber Security Certifications and the US NAVY
Six EC-Council Certifications are recognized by the United States Navy in over 100 Cyber Security Job roles, across 18 occupations. Ranging from Commander in Executive Cyberspace Leadership to Cyber Warfare Engineer, Special Agents, Incident Handlers, to Cryptologic Warfare Engineers, Cybersecurity careers with the US NAVY are exciting, holding an EC-Council certification provides great opportunity for advancement in a US NAVY career.
The decisions of Department of the NAVY to incorporate industry recognized certifications into the Cyber IT & Cyber Security Workforce Framework ensures as our service personnel advance their careers and eventually transition to civilian life, their skills and credentials are widely recognized by the Industries they will continue to work in as Veterans.
Certifications recognized, accepted, and often funded by the US NAVY include:
Funding opportunities for career advancement are available for Active Duty NAVY personnel through the
NAVY COOL program
US NAVY approves EC-Council Certifications across 18 Occupations and over 100 Job roles
Cryptologic Warfare LDO
Cryptologic Warfare LDO
CTN-Cryptologic Technician Networks
CTN – Global Network Operations Director
CTN – Global Network Operations Manager
CTN – Global Network Operations Technician
Cyber IT/CSWF Cyber Defense Infrastructure Support
CNDSP-IS
CPT Network Infrastructure Service Specialist
Systems Security Engineer
Cyber IT/CSWF Executive Cyberspace Leadership
Commander
Deputy Commander
Cyber IT/CSWF Security Program Management (CISO)
Chief Information Security Officer (CISO)
Common Control Provider
Cybersecurity Officer
Enterprise Security Officer
Facility Security Officer
Information Technology (IT) Director
Principal Security Architect
Risk Executive
Security Domain Specialist
Senior Agency Information Security (SAIS) Officer
Cyber IT/CSWF Vulnerability Assessment and Management
Blue Team Technician
Close Access Technician
CNDSP AU
Network Security Vulnerability Technician (NSVT)
Penetration Tester
Cryptologic Warfare Officer
Cryptologic Warfare Officer
Cyber IT/CSWF All Source Analysis
Computer Network Defense (CND) Analyst
Cyber IT/CSWF Cyber Operations Planning
CPT Operations Officer
CPT Platoon Leader
Network Warfare Cyber Planner
Cyber IT/CSWF Incident Response
CNDSP IR
Incident Handler
Intrusion Analyst
Network Security Vulnerability Technician (NSVT)
Cyber IT/CSWF Strategic Planning and Policy Development
Chief Information Officer (CIO)
Chief Information Security Officer (CISO)
Command Information Officer
Information Security Policy Analyst
Information Security Policy Manager
Policy Writer and Strategist
Cyberspace Workforce Developer and Manager (CSWF-PM) (DCWF Role Code 751)
Cyberspace Policy and Strategy Planner (DCWF Role Code 752)
Cyber Warfare Engineer
Cyber Warfare Engineer
Cryptologic Warfare Technician CWO
Cryptologic Warfare Technician CWO
Section 2Cyber IT/CSWF Cyber Defense Analysis
CNDSP Analyst
CNDSP Manager
CPT CND Manager
CPT Interactive Operator
CPT Systems Architect
Cyber Security Analyst
Incident Analyst
Cyber IT/CSWF Digital Forensics
Computer Forensic Analyst
Computer Network Defense (CND) Analyst
Digital Forensic Examiner
Digital Media Collector
Forensic Analyst
Forensic Analyst (Cryptologic)
Forensic Technician
Network Forensic Examiner
Cyber IT/CSWF Investigation
Computer Crime Investigator
Special Agent
Cyber IT/CSWF Threat Analysis
Computer Network Defense (CND) Analyst
Threat Analyst
Cyber Warrant Officer CWO
Cyber Warrant Officer CWO
*All information represented here can be found on the
NAVY COOL
site. To find what EC-Council Certifications map to your eligible Job role, select “Full Credential Search” then under Credential Agency, select or search for “International Council of E-Commerce Consultants”.
EC-Council Cyber Security Certifications and the US ARMY
Five EC-Council Certifications are recognized by the United States ARMY across 15 occupations. Ranging from Cyber Operations Technician to Target Digital Network Analyst. Our certifications are in use as baseline credentials across ARMY Cyber throughout intelligence as well as deployed infantry. EC-Council is proud to work with various groups in the ARMY to support the Mission of ARMY Cyber.
Certifications recognized, accepted, and often funded by the US ARMY include:
Funding opportunities for career advancement are available for Active Duty ARMY personnel through the
ARMY COOL program
US ARMY approves EC-Council Certifications across 15 Occupations
Cryptologic Cyberspace Intelligence Collector - Analyst
CYBER Operations Technician
Information Protection Technician
Military Intelligence (MI) Systems Maintainer/Integrator
Senior Network Operations Technician
Cryptologic Cyberspace Intelligence Collector - Analyst
CYBER Operations Technician
Information Protection Technician
Military Intelligence (MI) Systems Maintainer/Integrator
Senior Network Operations Technician
Counterintelligence Agent
Cyber Operations Specialist
Infantryman
Information Technology Specialist
Nodal Network Systems Operator-Maintainer
EC-Council Cyber Security Certifications and the Marine Corps
Five EC-Council Certifications are recognized by the United States Marine Corps in 79 Cyber Security Job roles, across 17 occupations. Ranging from Cyber Security Technician, to Signals Intelligence and Electronic Warfare Operator, to Cyber Security Chief.
Certifications recognized, accepted, and often funded by the US Marine Corps include:
Funding opportunities for career advancement are available for Active Duty MARINE CORPS personnel through the
Marine COOL program
US ARMY approves EC-Council Certifications across 15 Occupations
Aviation Logistics Information Management System (ALIMS) Specialist
Aviation Logistics Information Management System (ALIMS) Specialist
Cyber IT/CSWF Cyber Defense Analysis
CNDSP Analyst
CNDSP Manager
CPT CND Manager
CPT Interactive Operator
CPT Systems Architect
Cyber Security Analyst
Incident Analyst
Cyber IT/CSWF Investigation
Computer Crime Investigator
Special Agent
Cybersecurity Technician
Cybersecurity Technician
Cyber IT/CSWF All Source Analysis
Computer Network Defense (CND) Analyst
Signals Intelligence and Electronic Warfare Operator/Analyst
Signals Intelligence and Electronic Warfare Operator/Analyst
Communications Chief
Cyber Network Systems Chief
Telecommunications Systems Chief
Transmissions Chief
Cyber IT/CSWF Cyber Defense Infrastructure Support
CNDSP-IS
CPT Network Infrastructure Service Specialist
Systems Security Engineer
Cyber IT/CSWF Threat Analysis
Computer Network Defense (CND) Analyst
Threat Analyst
Information Security Technician
Information Security Technician
Cyber IT/CSWF Incident Response
CNDSP IR
Incident Handler
Intrusion Analyst
Network Security Vulnerability Technician (NSVT)
Signals Intelligence/Electronic Warfare Technician
Signals Intelligence/Electronic Warfare Technician
Cryptologic Cyberspace Analysts
Cryptologic Cyberspace Analysts
Cyber IT/CSWF Digital Forensics
Computer Forensic Analyst
Computer Network Defense (CND) Analyst
Digital Forensic Examiner
Digital Media Collector
Forensic Analyst
Forensic Analyst (Cryptologic)
Forensic Technician
Network Forensic Examiner
Cyber IT/CSWF Vulnerability Assessment and Management
Blue Team Technician
Close Access Technician
CNDSP AU
Network Security Vulnerability Technician (NSVT)
Penetration Tester
Intelligence Surveillance Reconnaissance (ISR) Systems Engineer
Intelligence Surveillance Reconnaissance (ISR) Systems Engineer
Cyber Security Chief
Cyber Security Chief
Cyber Network Operator
Cyber Network Systems Chief
Intelligence Surveillance Reconnaissance (ISR) Systems Engineer
EC-Council Cyber Security Certifications and the US Air Force
Four EC-Council Certifications are recognized by the United States Air Force in 150 Cyber Security Job roles, across 8 occupations. Occupations are recognized in fields like; Cyber Transport Systems, Intelligence, and Cyber Warfare Operations.
Certifications recognized, accepted, and often funded by the US AIR FORCE include:
Funding opportunities for career advancement are available for Active Duty AIR FORCE personnel through the
AIR FORCE COOL program
Client Systems
Computer Operation Series
Computer Science Series
Cryptanalysis Series
Cryptography Series
Information Technology Management Series
Intelligence Series
Telecommunications Mechanic
Cyber Surety
Security Administration Series
Intelligence Series
Information Technology Management Series
Computer Science Series
Computer Operation Series
Security Administration Series
Cyber Transport Systems
Intelligence Series
Information Technology Management Series
Cryptography Series
Cryptanalysis Series
Computer Science Series
Computer Operation Series
Flight Engineer
Air Safety Investigating Series
Aircraft Attending
Aircraft Electrician
Aircraft Engine Mechanic
Aircraft Mechanic
Aircraft Operation Series
Aircrew Technician Series
Chief Electrician
Electrician
Electrician-Maintenance
Electronic Digital Computer Mechanic
Electronic Industrial Controls Mechanic
Electronic Integrated Systems Mechanic
Electronic Measurement Equipment Mechanic
Electronics Mechanic
Electronics Technical Series
Electronics Technician
Second Electrician
Third Electrician
Computer Systems Programming
Intelligence Series
Information Technology Management Series
Electronics Technician
Electronics Technical Series
Computer Science Series
Computer Operation Series
Cyber Systems Operations
Telecommunications Mechanic
Security Administration Series
Intelligence Series
Information Technology Management Series
Computer Science Series
Computer Operation Series
Computer Clerk and Assistant Series
Cyberspace Warfare Operations
Information Technology Management Series
Cryptography Series
Cryptanalysis Series
Computer Science Series
Computer Operation Series
Computer Clerk and Assistant Series
Fusion Analyst
Statistical Assistant Series
Intelligence Series
Information Technology Management Series
Computer Science Series
How to get Certified
Use the links below to navigate the certification process:
Content Details
Qualification Requirements
Training Options
EISM Program
The Exam
Request an Application
At a Glance:
We Care
Ensuring that you get the best experience is our only purpose for using cookies. If you wish to continue, please accept. You are welcome to provide a controlled consent by visiting the cookie settings. For any further queries or information, please see our
Do not sell my personal information
Cookie Settings
Accept
Manage consent
Privacy Overview
This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
Duration
Description
cookielawinfo-checkbox-analytics
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional
11 months
The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy
11 months
The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT