preloder

CISM – Certified Information Security Manager

CISM (Certified Information Security Manager) is a key certification for information security professionals who manage, design, oversee and assess enterprise information security. This CISM course, closely aligned with ISACA best practices, will enable you to define and design enterprise security architecture, achieve IT compliance and governance, deliver reliable service to customers and understand how IT security systems can contribute to broader business goals and objectives.

This CISM certification training will give you the requisite skillsets to design, deploy and manage security architecture for your organization. The course is aligned with ISACA best practices and is designed to help you pass the CISM exam on your first attempt. Enterprises and government agencies increasingly expect their IT professionals to hold a CISM certification, and it is considered essential to ongoing education and career development. This course will see that you are well-equipped to manage the ongoing security, compliance and governance of your IT organization.

Skills you will learn

  • Define and design security architecture for your IT operation
  • Develop a working knowledge of the four domains prescribed by the ISACA Exam Candidate Information Guide 2015
  • Demonstrate a deep understanding of the relationship between information security programs and broader business goals and objectives
  • Focus on IT compliance and the integrity of enterprise systems to establish a more secure enterprise IT framework
  • Earn the requisite 16 CPEs required to take the CISM certification exam
  • Acquire the relevant knowledge and skills required to pass the CISM certification exam

Who should take this course?

CISM certification is a globally recognized professional requirement in the IT Security domain. This certification is best suited for:

  • Security consultants and managers
  • IT directors and managers
  • Security auditors and architects
  • Security systems engineers
  • Chief Information Security Officers (CISOs)
  • Information security managers
  • IS/IT consultants
  • Chief Compliance/Privacy/Risk Officers

Information Security Governance

1
Information Security Governance Overview
2
Effective Information Security Governance
3
Information Security Concepts and Technologies
4
Information Security Manage
5
Scope and Charter of Information Security Governance
6
​​Information Security Governance Metrics
7
Information Security Strategy Overview
8
Creating an Information Security Strategy
9
Determining Current State Of Security
10
Information Security Strategy Development
11
Strategy Resources
12
Strategy Constraints
13
Action Plan to Implement Strategy

Information Risk Management and Compliance

1
Risk Management Overview
2
Good Information Security Risk Management
3
Information Security Risk Management Concepts
4
Implementing Risk Management
5
Risk Assessment
6
Controls Countermeasures
7
Recovery Time Objectives
8
Risk Monitoring and Communication’

Information Security Program Development and Management

1
Development of Information Security Program
2
Information Security Program Objectives
3
Information Security Program Development Concepts
4
Scope and Charter of Information Security Program Development
5
Information Security Management Framework
6
Information Security Framework Components

Information Security Incident Management

1
Incident Management Overview
2
Incident Response Procedures
3
Incident Management Organization
4
Incident Management Resources
5
Incident Management Objectives
6
Incident Management Metrics and Indicators
7
Current State of Incident Response Capability
8
Developing an Incident Response Plan
9
BCP/DRP
No announcements at this moment.

Be the first to add a review.

Please, login to leave a review
This website uses cookies and asks your personal data to enhance your browsing experience.