Location
-
Format
What’s this? Ways to train
Classroom
Live, instructor-led training in a standard, professional classroom environmentVirtual
Live, instructor-led training conducted over the internet, with hands-on labsOnline
An online, HTML5, self-paced learning experience available for all coursesOn-site
Private training for your entire team, delivered at your location, a training center, or onlineVideo classroom
Learn more about our training formats
High-definition video of our most popular courses, streamed to your laptop or personal device
-
4 Days
-
All of our private classes are customized to your organization's needs.
-
Click on the button below to send us your details and you will be contacted shortly.
Already purchased this offering? Log in
Request more information
Inquiry for: Myself My Company
By providing your contact details, you agree to our Privacy Policy
Thank You
Our learning consultant will get back to you in 1 business day
CISM: Certified Information Security Manager
WHAT YOU WILL LEARN
The ISACA® Certified Information Security Manager™ is the fastest growing and arguably the most prestigious qualification available for Information Security managers today.
AUDIENCE
The CISM designation is for Information Security professionals who have 3-5 years of front-line experience with the security of information. This credential is geared towards Information Security managers and those who have information security management responsibilities
PREREQUISITES
Who Should Earn the CISM Designation?
CISM is more than an entry-level certification. It is specifically developed for the information security professional who has acquired experience working on the front lines of information security. Individuals with three years or more of experience managing the information security function of an enterprise or performing such duties will find CISM tailored to their knowledge and skills.
The Exam is held twice per year in June and December and exam registrations close around 2 months prior. Refer to www.isaca.org for exam dates and exam registration.
BENEFITS OF CISM CERTIFICATION
• Recognition of attainment of advanced job skills as required for an information security professional
• Worldwide recognition as an information security manager
• Opportunity to build upon existing certifications/credentials already earned
• Provides tangible evidence of career growth
• Potential for a salary increase and/or promotion
METHODOLOGY
This program will be conducted with interactive lectures, PowerPoint presentations, discussions and practical exercises
COURSE OBJECTIVES
This course has been independently commissioned with two objectives:
• To provide an environment in which security professionals can acquire, thoroughly and properly, the skills and knowledge expected of a world-class information security manager. Whether or not you intend to sit for the CISM exam, this course is a powerful way to equip yourself with the knowledge of the core competencies that define the successful information security manager.
• To maximise your prospects at the CISM exam if you choose to sit it.
Modules
• Introduction
• Introduction
o Definition
o Objective
o Tasks
o Overview
• Topics
o Effective Information Security Risk Management
o Risk Management Concepts
o Technologies
o Integration into Life Cycle Processes
o Implementing Risk Management
o Risk Identification and Analysis Methods
o Mitigation Strategies and Prioritisation
o Reporting Changes to Management
o Mitigation Strategies and Prioritisation
o Reporting Changes to Management
o Practice Questions
o Review of Practice Questions
o Reference Materials and Glossary
• Introduction
o Definition
o Objectives
o Tasks
o Overview
• Topics
o Program objectives
o Security Program Concepts
o Management Framework
o Business Processes
o Infrastructure & Architecture
o Management/Administration
o Business cases
o Program Budgeting
o Vendor Management
o Ethics
o Culture
o Program Services
o Management of Technology
o Security Reviews and Audits
o Due Diligence
o Compliance Monitoring
o Outsourcing & Service Providers
o Cloud Computing
o Controls and Countermeasures
o Controls Design & Methods
o Controls Testing
o Program Metrics & Monitoring
o Metrics Development
o Monitoring Approaches
o Common Program Challenges
o Practice Questions
o Review of Practice Questions
o Reference Materials and Glossary
• Introduction
o Definition
o Objective
o Tasks
o Overview
• Topics
o Performing a Business Impact Analysis
o Developing Response and Recovery Plans
o Incident Response Processes
o Testing the Response and Recovery Plans
o Executing Response and Recovery Plans
o Documenting Events
o Post Event Reviews
o Practice Questions
o Review of Practice Questions
o Reference Materials and Glossary
Course Reviews
0
0 Ratings