CISM: Certified Information Security Manager | IT Training & Certification | Info Trek
Respect Your Dreams
Follow through on your goals with courses

CISM: Certified Information Security Manager

Location

Format What’s this?
  1. 4 Days
  1. All of our private classes are customized to your organization's needs.
  2. Click on the button below to send us your details and you will be contacted shortly.
Request more information

Inquiry for: Myself    My Company

By providing your contact details, you agree to our Privacy Policy

 

 

 

Thank You

Our learning consultant will get back to you in 1 business day

CISM: Certified Information Security Manager

WHAT YOU WILL LEARN

The ISACA® Certified Information Security Manager™ is the fastest growing and arguably the most prestigious qualification available for Information Security managers today.


CISM properly recognises that security is first and foremost a management rather than a technical issue. CISM defines the core competencies and international standards of performance that information security managers are expected to master. It provides executive management with the assurance that those who have earned their CISM have the experience and knowledge to offer effective security management and advice.
This 5-day training program provides an intense environment in which participants will acquire the skills and knowledge needed to meet the requirements of the CISM certification.

AUDIENCE

The CISM designation is for Information Security professionals who have 3-5 years of front-line experience with the security of information. This credential is geared towards Information Security managers and those who have information security management responsibilities

PREREQUISITES

Who Should Earn the CISM Designation?

CISM is more than an entry-level certification. It is specifically developed for the information security professional who has acquired experience working on the front lines of information security. Individuals with three years or more of experience managing the information security function of an enterprise or performing such duties will find CISM tailored to their knowledge and skills.


The Exam is held twice per year in June and December and exam registrations close around 2 months prior. Refer to www.isaca.org for exam dates and exam registration.


BENEFITS OF CISM CERTIFICATION

• Recognition of attainment of advanced job skills as required for an information security professional

• Worldwide recognition as an information security manager

• Opportunity to build upon existing certifications/credentials already earned

• Provides tangible evidence of career growth

• Potential for a salary increase and/or promotion


METHODOLOGY

This program will be conducted with interactive lectures, PowerPoint presentations, discussions and practical exercises

COURSE OBJECTIVES

This course has been independently commissioned with two objectives:

• To provide an environment in which security professionals can acquire, thoroughly and properly, the skills and knowledge expected of a world-class information security manager. Whether or not you intend to sit for the CISM exam, this course is a powerful way to equip yourself with the knowledge of the core competencies that define the successful information security manager.

• To maximise your prospects at the CISM exam if you choose to sit it.


Expand All

Modules

Module 1 - Information Security Governance

• Introduction

o Definition
o Objectives
o Tasks
o Overview
Topics
o Effective Information Security Governance
o Information Security Concepts and Issues
o Business Objectives
o Roles & Responsibilities
o Business Model for Information Security
o The IS Manager
o Scope and Charter of Information Security Governance
o IS Governance Metrics
o Developing an IS Strategy – Common Pitfalls
o IS Strategy Objectives
o Strategy Development
o Determining Current State of Security
o Strategy Resources
o Strategy Constraints
o Action Plan Intermediate Goals
o Practice Questions
o Review of Practice Questions
o Reference Materials and Glossary

Module 2 - Information Risk Management & Compliance

• Introduction

o Definition

o Objective

o Tasks

o Overview


• Topics

o Effective Information Security Risk Management

o Risk Management Concepts

o Technologies

o Integration into Life Cycle Processes

o Implementing Risk Management

o Risk Identification and Analysis Methods

o Mitigation Strategies and Prioritisation

o Reporting Changes to Management

o Mitigation Strategies and Prioritisation

o Reporting Changes to Management

o Practice Questions

o Review of Practice Questions

o Reference Materials and Glossary


Module 3 - Information Security Program Development & Management

• Introduction

o Definition

o Objectives

o Tasks

o Overview


• Topics

o Program objectives

o Security Program Concepts

o Management Framework

o Business Processes

o Infrastructure & Architecture

o Management/Administration

o Business cases

o Program Budgeting

o Vendor Management

o Ethics

o Culture

o Program Services

o Management of Technology

o Security Reviews and Audits

o Due Diligence

o Compliance Monitoring

o Outsourcing & Service Providers

o Cloud Computing

o Controls and Countermeasures

o Controls Design & Methods

o Controls Testing

o Program Metrics & Monitoring

o Metrics Development

o Monitoring Approaches

o Common Program Challenges

o Practice Questions

o Review of Practice Questions

o Reference Materials and Glossary


Module 4 - Information Security Incident Management

• Introduction

o Definition

o Objective

o Tasks

o Overview


• Topics

o Performing a Business Impact Analysis

o Developing Response and Recovery Plans

o Incident Response Processes

o Testing the Response and Recovery Plans

o Executing Response and Recovery Plans

o Documenting Events

o Post Event Reviews

o Practice Questions

o Review of Practice Questions

o Reference Materials and Glossary


To Be Confirm

To Be Confirm

Read More

Course Reviews

No Remarks

0

0 Ratings