PECB Chief Information Security Officer (CISO)
Master executive-level information security leadership through comprehensive Chief Information Security Officer training. Develop strategic governance, risk management, and compliance expertise while building the communication and leadership skills necessary for C-suite success in protecting organizational assets and enabling business objectives.
- Available in:
- Malaysia
- Upcoming intakes:
- Apr 13, 2026
- Apr 13, 2026
- Apr 13, 2026
Corporate Pricing
Pax:
Training Provider Pricing
Pax:
Features
Target Audience
Methodologies
Subsidies

What you'll learn
- Establish and lead comprehensive information security programs aligned with goals
- Implement governance frameworks and communicate effectively with executives
- Deploy technical, administrative, and physical security controls effectively
- Manage security incidents and implement business continuity strategies
- Conduct risk assessments and develop strategic risk treatment plans
- Design security architectures using Zero Trust and defense-in-depth principles
- Build security awareness programs and foster organizational security culture
- Measure program effectiveness using metrics and drive continual improvement
Why should you attend?
This comprehensive training program prepares information security professionals to assume the strategic role of Chief Information Security Officer. Participants will master the fundamental principles of information security, including the confidentiality, integrity, and availability triad, while developing the executive leadership and communication skills essential for success at the C-suite level. The course explores the full spectrum of CISO responsibilities, from building stakeholder relationships to navigating ethical considerations in professional conduct. The curriculum covers critical domains including information security governance, compliance frameworks, and risk management methodologies. Participants will learn to develop and implement robust security programs aligned with business objectives, utilizing industry-standard frameworks such as ISO 27001 and NIST Cybersecurity Framework. The training addresses security architecture design principles, including Zero Trust concepts and defense-in-depth strategies, while examining both technical and administrative security controls. Advanced topics include incident response planning, business continuity, and disaster recovery strategies. Participants will gain expertise in building security awareness programs, fostering organizational security culture, and implementing effective monitoring and measurement systems. The course emphasizes continual improvement methodologies, security metrics development, and strategic planning for long-term security program success. Emerging trends such as artificial intelligence in security, cloud environments, and Internet of Things challenges are thoroughly examined to prepare participants for future security landscapes.
Course Syllabus
Day 1 - Fundamentals of Information Security and the Role of a CISO
Short Break
15 minsRecap and Q&A
15 minsLunch
1 hourShort Break
15 minsRecap and Q&A
15 minsEnd of Day 1
Day 2 - Information Security Compliance, Risk Management, and Security Architecture
Short Break
15 minsRecap and Q&A
15 minsLunch
1 hourShort Break
15 minsRecap and Q&A
15 minsEnd of Day 2
Day 3 - Security Controls, Incident Management, and Change Management
Short Break
15 minsRecap and Q&A
15 minsLunch
1 hourShort Break
15 minsRecap and Q&A
15 minsEnd of Day 3
Day 4 - Security Awareness, Monitoring, Measurement, and Continual Improvement
Short Break
15 minsRecap and Q&A
15 minsLunch
1 hourShort Break
15 minsRecap and Q&A
15 minsEnd of Day 4
Day 5 - Certification Examination
Short Break
15 minsRecap and Q&A
15 minsLunch
1 hourShort Break
15 minsRecap and Q&A
15 minsEnd of Day 5
Ratings and Reviews
Instructor
Instructor
Instructor
Instructor Reviews
Aamer 'adam' Shah
IT Operations & Risk Management Expert"He made the knowledge very simple to understand, and he is clearly excellent at what he does. I suggest him to anyone who is suffering with computing; he will ensure that you understand precisely what you are doing."
"His teaching methods are great. Very clear and concise. Doesn’t waste your time explaining meaningless background information and always lectures with the intent to help you understand the material. He’s helped me understand content for multiple college courses and is one of the best lecturers that I’ve had."
"Very informative and relevant to todays market. Aamer is always amazing and is my favorite instructor. The way he engages with the class and presents the material is far superior to other instructors and classes I have taken."
"He made the knowledge very simple to understand, and he is clearly excellent at what he does. I suggest him to anyone who is suffering with computing; he will ensure that you understand precisely what you are doing."
"I learned more info that I can actually, practically use in this class in 2 hours than I have from months of other classes. Love Aamer! Great presentation style!"
"Aamer is a fantastic trainer. Thank you for making the class both enjoyable and instructive. Thank you for taking the effort to organise this workshop!"
"Aamer is a calm and attentive instructor who is really concerned about data. He assisted me in my studies and I would strongly recommend him!"
"Wonderful content and love that the Code is quoted in each section. Honest and upfront! Thank you for being you!"
"One of my favorite Instructors. Always learn new things. I love his classes. Learned alot today. "
"Wish I had taken this years ago. Taking another Course from him in the next season."
Mohammad Mehdi Lotfinejad
Chief Data Officer & Data Science Trainer"Mehdi and I worked on several projects with company such as Petronas , Shell and CIMB Regional ETC. I must say Mehdi's training was highly appreciated by our clients as he was able to exhibit in full display his vast knowledge as a Data professional. I would highly recommend him to anyone looking for a top tier training expert."
"Not only knowledgeable but also having hands dirty on what he knows Friendly and building networks quickly."
"I had the pleasure of working with Mehdi together on some high-level initiatives such as the Petronas data scientist program and Shell's project to become a data-driven organization. During these projects, Mehdi received numerous accolades for his ability to share his knowledge and mentor up-and-coming data scientists. Based on our shared experiences, I have no hesitation in recommending Mehdi for any project or position he may be considered for."
FAQ
Frequently Asked Questions About This Course
- Public pricing: applies for individuals signing up from different companies.
- Corporate pricing: applies if a company wants to have an intake for its employees only.
- Training provider pricing: applies only for other training providers looking to hire our trainers and use our content. Our content has a licensing fee.
We will keep you updated on the status of the intake after you enroll.
Why should you attend?
This comprehensive training program prepares information security professionals to assume the strategic role of Chief Information Security Officer. Participants will master the fundamental principles of information security, including the confidentiality, integrity, and availability triad, while developing the executive leadership and communication skills essential for success at the C-suite level. The course explores the full spectrum of CISO responsibilities, from building stakeholder relationships to navigating ethical considerations in professional conduct. The curriculum covers critical domains including information security governance, compliance frameworks, and risk management methodologies. Participants will learn to develop and implement robust security programs aligned with business objectives, utilizing industry-standard frameworks such as ISO 27001 and NIST Cybersecurity Framework. The training addresses security architecture design principles, including Zero Trust concepts and defense-in-depth strategies, while examining both technical and administrative security controls. Advanced topics include incident response planning, business continuity, and disaster recovery strategies. Participants will gain expertise in building security awareness programs, fostering organizational security culture, and implementing effective monitoring and measurement systems. The course emphasizes continual improvement methodologies, security metrics development, and strategic planning for long-term security program success. Emerging trends such as artificial intelligence in security, cloud environments, and Internet of Things challenges are thoroughly examined to prepare participants for future security landscapes.
What you'll learn
- Establish and lead comprehensive information security programs aligned with goals
- Implement governance frameworks and communicate effectively with executives
- Deploy technical, administrative, and physical security controls effectively
- Manage security incidents and implement business continuity strategies
- Conduct risk assessments and develop strategic risk treatment plans
- Design security architectures using Zero Trust and defense-in-depth principles
- Build security awareness programs and foster organizational security culture
- Measure program effectiveness using metrics and drive continual improvement
Course Syllabus
Day 1 - Fundamentals of Information Security and the Role of a CISO
Short Break
15 minsRecap and Q&A
15 minsLunch
1 hourShort Break
15 minsRecap and Q&A
15 minsEnd of Day 1
Day 2 - Information Security Compliance, Risk Management, and Security Architecture
Short Break
15 minsRecap and Q&A
15 minsLunch
1 hourShort Break
15 minsRecap and Q&A
15 minsEnd of Day 2
Day 3 - Security Controls, Incident Management, and Change Management
Short Break
15 minsRecap and Q&A
15 minsLunch
1 hourShort Break
15 minsRecap and Q&A
15 minsEnd of Day 3
Day 4 - Security Awareness, Monitoring, Measurement, and Continual Improvement
Short Break
15 minsRecap and Q&A
15 minsLunch
1 hourShort Break
15 minsRecap and Q&A
15 minsEnd of Day 4
Day 5 - Certification Examination
Short Break
15 minsRecap and Q&A
15 minsLunch
1 hourShort Break
15 minsRecap and Q&A
15 minsEnd of Day 5
Instructor Reviews
Aamer 'adam' Shah
IT Operations & Risk Management Expert"He made the knowledge very simple to understand, and he is clearly excellent at what he does. I suggest him to anyone who is suffering with computing; he will ensure that you understand precisely what you are doing."
"His teaching methods are great. Very clear and concise. Doesn’t waste your time explaining meaningless background information and always lectures with the intent to help you understand the material. He’s helped me understand content for multiple college courses and is one of the best lecturers that I’ve had."
"Very informative and relevant to todays market. Aamer is always amazing and is my favorite instructor. The way he engages with the class and presents the material is far superior to other instructors and classes I have taken."
"He made the knowledge very simple to understand, and he is clearly excellent at what he does. I suggest him to anyone who is suffering with computing; he will ensure that you understand precisely what you are doing."
"I learned more info that I can actually, practically use in this class in 2 hours than I have from months of other classes. Love Aamer! Great presentation style!"
"Aamer is a fantastic trainer. Thank you for making the class both enjoyable and instructive. Thank you for taking the effort to organise this workshop!"
"Aamer is a calm and attentive instructor who is really concerned about data. He assisted me in my studies and I would strongly recommend him!"
"Wonderful content and love that the Code is quoted in each section. Honest and upfront! Thank you for being you!"
"One of my favorite Instructors. Always learn new things. I love his classes. Learned alot today. "
"Wish I had taken this years ago. Taking another Course from him in the next season."
Mohammad Mehdi Lotfinejad
Chief Data Officer & Data Science Trainer"Mehdi and I worked on several projects with company such as Petronas , Shell and CIMB Regional ETC. I must say Mehdi's training was highly appreciated by our clients as he was able to exhibit in full display his vast knowledge as a Data professional. I would highly recommend him to anyone looking for a top tier training expert."
"Not only knowledgeable but also having hands dirty on what he knows Friendly and building networks quickly."
"I had the pleasure of working with Mehdi together on some high-level initiatives such as the Petronas data scientist program and Shell's project to become a data-driven organization. During these projects, Mehdi received numerous accolades for his ability to share his knowledge and mentor up-and-coming data scientists. Based on our shared experiences, I have no hesitation in recommending Mehdi for any project or position he may be considered for."
Corporate Pricing
Pax:
Training Provider Pricing
Pax:
Certification
Features
Target Audience
Methodologies
Subsidies

Ratings and Reviews
Instructors
FAQ
Frequently Asked Questions About This Course
- Public pricing: applies for individuals signing up from different companies.
- Corporate pricing: applies if a company wants to have an intake for its employees only.
- Training provider pricing: applies only for other training providers looking to hire our trainers and use our content. Our content has a licensing fee.
We will keep you updated on the status of the intake after you enroll.
Our Offers
Academy for Trainers Academy for Trainers
Teach what you love. Abundent Academy gives you the tools you need to run your own trainings! We provide you with the platform, the students, the materials, and the support you need to succeed!
- Higher trainer payouts
- Ready-made course materials
- Student management system
- AI digital marketing assistant
Academy for Corporates Academy for Corporates
Get unlimited access to all of Abundent Academy's carefully curated courses for your team, all organized according to learning paths and roles! Perfect for companies looking to upskill their workforce and stay ahead in the tech industry.
- Carefully curated courses
- Role-based learning paths
- Team progress tracking
- Gap Identification and Analysis
Academy for Partners Academy for Partners
White-label IT training delivery for training providers. We become your behind-the-scenes delivery arm so you can say yes to more clients without hiring more trainers.
- Expand your training catalog
- 40+ expert trainers ready
- White-label delivery
- You keep client relationships