Introduction

Video Activity

This lesson gives an introduction to the CISO course. CISO stands for Chief Information Security Officer. The following are some of the topics that this introduction will cover. An overview of the modules that this course will consist of An explanation of why this course exists and the course objectives An overview of the specific information neces...

Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
3 hours 54 minutes
Difficulty
Advanced
CEU/CPE
4
Video Description

This lesson gives an introduction to the CISO course. CISO stands for Chief Information Security Officer. The following are some of the topics that this introduction will cover.

  • An overview of the modules that this course will consist of
  • An explanation of why this course exists and the course objectives
  • An overview of the specific information necessary to perform the role of CISO effectively that will be covered in the following modules
  • The importance of maintaining business continuity and minimizing disruptions

Course participants will learn about the different course modules: - Why we need a CISO

  • Information security governance
  • Risk management
  • Developing a security
  • Policies, procedures, standards, and guidelines of information security
  • Details of information security technology
  • Incident management
  • Business continuity and disaster recovery
Video Transcription
00:04
Hi. This is Kelly Hander Han and I will welcome you to Cyber Aires course on becoming a chief information security officer and the reason we'd like to offer this course we have several different purposes. First of all, we know that there may be many of you that are considering going into the field of management in relation information, security,
00:23
and there's a wide realm of knowledge and expectations you would have to enter that position.
00:28
So we want to give you kind of annoyed idea of their skills that you would need to have them to basic instruction on them. We also want to tackle this course for those of you that are currently working in the information Security Management field, and we want to make sure that we fill in any gaps in your knowledge. For instance, maybe you don't have that much experience running policy.
00:47
Or maybe you're not as familiar with the technologies you would like to be. This course is for you
00:53
and then third. We also wanted to provide a course for those of you that would have an interest in this field, but also that would provide you with continuing education units for some of those certification classes that you may already have taken and certifications you may have,
01:07
whether it's security clause or C i s s pieces, um, any of those others this course will consider or will satisfy
01:15
the CTU requirements.
01:18
All right, so in this particular trip class our agenda, we've got eight modules that we're going to cover, and the very first module is gonna be an introductory module. It's gonna be why we even need a sizzle. What problems are we trying to solve? And then we'll move right into information, security, governance, and talk about
01:37
the importance of governance in our environment in relation to the world of security.
01:42
We'll go with module three and move into risk management
01:46
module for after we've completed risk management. And we know the threats and vulnerabilities that we're addressing. We're gonna move right into developing our strategy, and our strategy is gonna be very broad in sight. And we're gonna look to accomplish our strategy through policies and procedures, guidelines, standards.
02:05
Um, well, also cover the technology that as an information security officer, I would expect you to know it's a pretty high level introduction to technology. I don't need to get into the weeds into the really deep
02:19
details because an ISO doesn't necessarily have to be a technology expert. They do have to have a good foundational knowledge. Ah, Chapter seven, What do we do when these incidents do occur? How are we going to respond and manage so that we can minimize disruptions to the business and then chapter eight?
02:37
Ah, business continuity. You know, I tend to think of every decision we make, starting with risk management and all marching towards
02:45
business continuity, keeping the business going no matter what. And ultimately, when you think about it as an information security officer, that's my job, right? Minimize disruptions on the business, whether large or small.
02:59
So this is the course. That's the information that we're gonna cover. And I hope you enjoy our course on Chief Information Security Office
Up Next
Chief Information Security Officer (CISO)

In this CISO certification training, you will learn what other CISO's are focusing their time and attention on. Among the key topics, you will learn how to implement the proven best practices that make for successful cyber security leadership.

Instructed By