Certified Chief Information Security Officer (C|CISO)

Certified Chief Information Security Officer (CCISO)

The C|CISO program is designed to train strategic leaders in cybersecurity. This certification prepares professionals to assume executive roles such as Chief Information Security Officer (CISO) by developing critical competencies in risk management, compliance, operations, governance, and strategic…

40 hours
Official Certificate
Expert Instructors
Online Learning
Certificacion Internacional Certified Chief Information Security Officer (C|CISO)
EC-COUNCIL logo

The C|CISO program is designed to train strategic leaders in cybersecurity. This certification prepares professionals to assume executive roles such as Chief Information Security Officer (CISO) by developing critical competencies in risk management, compliance, operations, governance, and strategic planning.

Through real-world cases, wargaming, and content developed by active CISOs, the course supports a strong transition from technical expertise to executive leadership.

At the end of the course, participants will be able to:

  • • Be leaders capable of aligning security with business objectives
  • • Teach how to build and mature enterprise cybersecurity programs
  • • Train in risk management, legal compliance, and financial oversight
  • • Strengthen executive communication and decision-making skills in the face of incidents
  • • Understand emerging technologies such as AI, automation, and autonomous security

To fully benefit from the course, participants are required to have:

  • • A minimum of 5 years of experience in at least 3 of the 5 program domains
  • • For the exam without training: 5 years of experience in all 5 domains
  • • Academic equivalencies (e
  • g
  • , MSc or PhD in security) may be accepted to reduce experience requirements
  • • There is also an Associate C|CISO program available for those who do not yet meet the full requirements

Certificacion Internacional Certified Chief Information Security Officer (C|CISO) Applies
Certificacion Internacional Certified Chief Information Security Officer (C|CISO) 40 hours

Learning Methodology

The learning methodology, regardless of the modality (in-person or remote), is based on the development of workshops or labs that lead to the construction of a project, emulating real activities in a company.

The instructor (live), a professional with extensive experience in work environments related to the topics covered, acts as a workshop leader, guiding students' practice through knowledge transfer processes, applying the concepts of the proposed syllabus to the project.

The methodology seeks that the student does not memorize, but rather understands the concepts and how they are applied in a work environment.

As a result of this work, at the end of the training the student will have gained real experience, will be prepared for work and to pass an interview, a technical test, and/or achieve higher scores on international certification exams.

Conditions to guarantee successful results:
  • a. An institution that requires the application of the model through organization, logistics, and strict control over the activities to be carried out by the participants in each training session.
  • b. An instructor located anywhere in the world, who has the required in-depth knowledge, expertise, experience, and outstanding values, ensuring a very high-level knowledge transfer.
  • c. A committed student, with the space, time, and attention required by the training process, and the willingness to focus on understanding how concepts are applied in a work environment, and not memorizing concepts just to take an exam.

Pre-enrollment

You do not need to pay to pre-enroll. By pre-enrolling, you reserve a spot in the group for this course or program. Our team will contact you to complete your enrollment.

Pre-enroll now

Infinity Payments

Make your payment quickly, safely and reliably


- For bank transfer payments, request the details by email capacita@aulamatriz.edu.co.

- If you wish to finance your payment through our credit options
(Sufi, Cooperativa Unimos or Fincomercio), click on the following link:
Ver opciones de crédito.

To continue you must
Or if you don't have an account you must

Description

The C|CISO program is designed to train strategic leaders in cybersecurity. This certification prepares professionals to assume executive roles such as Chief Information Security Officer (CISO) by developing critical competencies in risk management, compliance, operations, governance, and strategic planning.

Through real-world cases, wargaming, and content developed by active CISOs, the course supports a strong transition from technical expertise to executive leadership.

Objectives

At the end of the course, participants will be able to:

  • • Be leaders capable of aligning security with business objectives
  • • Teach how to build and mature enterprise cybersecurity programs
  • • Train in risk management, legal compliance, and financial oversight
  • • Strengthen executive communication and decision-making skills in the face of incidents
  • • Understand emerging technologies such as AI, automation, and autonomous security

To fully benefit from the course, participants are required to have:

  • • A minimum of 5 years of experience in at least 3 of the 5 program domains
  • • For the exam without training: 5 years of experience in all 5 domains
  • • Academic equivalencies (e
  • g
  • , MSc or PhD in security) may be accepted to reduce experience requirements
  • • There is also an Associate C|CISO program available for those who do not yet meet the full requirements

offers

Certificacion Internacional Certified Chief Information Security Officer (C|CISO) Applies
Certificacion Internacional Certified Chief Information Security Officer (C|CISO) 40 hours

Learning Methodology

The learning methodology, regardless of the modality (in-person or remote), is based on the development of workshops or labs that lead to the construction of a project, emulating real activities in a company.

The instructor(live), a professional with extensive experience in work environments related to the topics covered, acts as a workshop leader, guiding students' practice through knowledge transfer processes, applying the concepts of the proposed syllabus to the project.

La metodología persigue que el estudiante "does not memorize", but rather "understands" the concepts and how they are applied in a work environment."

As a result of this work, at the end of the training the student will have gained real experience, will be prepared for work and to pass an interview, a technical test, and/or achieve higher scores on international certification exams.

Conditions to guarantee successful results:
  • a. An institution that requires the application of the model through organization, logistics, and strict control over the activities to be carried out by the participants in each training session.
  • b. An instructor located anywhere in the world, who has the required in-depth knowledge, expertise, experience, and outstanding values, ensuring a very high-level knowledge transfer.
  • c. A committed student, with the space, time, and attention required by the training process, and the willingness to focus on understanding how concepts are applied in a work environment, and not memorizing concepts just to take an exam.

Course Modules

Domain 1: Governance and Risk Management

  • Development and implementation of security policies aligned with legal and regulatory frameworks.

  • Evaluation of regulatory compliance (such as ISO, NIST, GDPR, HIPAA).

  • Construction of security governance frameworks and organizational culture.

  • Identification, evaluation, and management of corporate risks.

  • Alignment of cyber risk with business strategy.

  • Design and implementation of information security controls.

  • Management of the complete internal and external audit cycle.

  • Application of frameworks such as NIST RMF, ISO/IEC 27001/27005, COBIT, COSO, and FAIR.

  • Use of KPIs and security metrics for auditing and continuous improvement.

  • Creation of compliance structures tailored to multiple industries (financial, healthcare, government).

  • Construction and maturity of information security programs (including SOC, IR, IAM, etc.).

  • Implementation of strategies for incident response and business continuity (BCP/DRP).

  • Evaluation of the operational security lifecycle: detection, containment, recovery, and reporting.

  • Leadership over technical and operational teams.

  • Governance of critical operations and vulnerability management.

  • Technical fundamentals on networks, cryptography, cloud, endpoint, IAM, SIEM, DevSecOps, and more.

  • Assessment of secure architectures and emerging technologies (AI, automation, Zero Trust, etc.).

  • Translating technical concepts into executive language for decision-making.

  • Assessment of threats, vulnerabilities, and cyberattack scenarios.

  • Governance of complex and multi-cloud technological solutions.

  • Development of the cybersecurity strategic plan (short, medium, and long-term vision).

  • Budget management, return on investment (ROI) in security, and financial justification to senior management.

  • Evaluation, selection, and control of vendors and security service contracts.

  • Use of performance metrics and executive dashboards for KPI tracking.

  • Leadership in secure digital transformation initiatives.