Certified Information Security Manager

by Spectrum Networks Claim Listing

The CISM certification program was developed by ISACA for experienced information security management professionals who have experience developing and managing information security programs and who understand the programs relationship to the overall business goals.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

Spectrum Networks Logo

img Duration

Please Enquire

Course Details

The CISM certification program was developed by ISACA for experienced information security management professionals who have experience developing and managing information security programs and who understand the programs relationship to the overall business goals.

The CISM exam consists of 200 multiple-choice questions that cover the four CISM domains. The American National Standards Institute (ANSI) has accredited the CISM certification program under ISO/IEC 17024:2003, General Requirements for Bodies Operating Certification Systems of Persons.

 

Audience Profile:

Experienced information security managers and those who have information security management responsibilities, including IT consultants, auditors, managers, security policy writers, privacy officers, information security officers, network administrators, security device administrators, and security engineers.

 

At Course Completion:

  • Information Security Governance
  • Information Risk Management and Compliance
  • Information Security Program Development and Management
  • Information Security Incident Management

 

Modules:

  • Domain 1: Information Security Governance
  • Develop an information security strategy, aligned with business goals and directives.
  • Establish and maintain an information security governance framework.
  • Integrate information security governance into corporate governance.
  • Develop and maintain information security policies.
  • Develop business cases to support investments in information security.
  • Identify internal and external influences to the organization.
  • Gain ongoing commitment from senior leadership and other stakeholders.
  • Define, communicate and monitor information security responsibilities
  • Establish internal and external reporting and communication channels.
  • Domain 2: Information Risk Management
  • Establish and/or maintain a process for information asset classification to ensure that measures taken to protect assets are proportional to their business value.
  • Identify legal, regulatory, organizational and other applicable requirements to manage the risk of noncompliance to acceptable levels.
  • Ensure that risk assessments, vulnerability assessments and threat analyses are conducted consistently, and at appropriate times, to identify and assess risk to the organization’s information.
  • Identify, recommend or implement appropriate risk treatment/response options to manage risk to acceptable levels based on organizational risk appetite.
  • Determine whether information security controls are appropriate and effectively manage risk to an acceptable level.
  • Facilitate the integration of information risk management into business and IT processes to enable a consistent and comprehensive information risk management program across the organization.
  • Monitor for internal and external factors (e.g., threat landscape, cybersecurity, geopolitical, regulatory change) that may require reassessment of risk to ensure that changes to existing or new risk scenarios are identified and managed appropriately.
  • Report noncompliance and other changes in information risk to facilitate the risk management decision-making process.
  • Ensure that information security risk is reported to senior management to support an understanding of potential impact on the organizational goals and objectives.
  • Domain 3: Information Security Program Development & Management
  • Develop a security program, aligned with information security strategy
  • Ensure alignment between the information security program and other business functions
  • Establish and maintain requirements for all resources to execute the IS program
  • Establish and maintain IS architectures to execute the IS program
  • Develop documentation that ensures compliance with policies
  • Develop a program for information security awareness and training
  • Integrate information security requirements into organizational processes
  • Integrate information security requirements into contracts and activities of third parties
  • Develop procedures (metrics) to evaluate the effectiveness and efficiency of the IS program
  • Compile reports to key stakeholders on overall effectiveness of the IS program and the underlying business processes in order to communicate security performance.
  • Domain 4: Information Security Incident Management
  • Define (types of) information security incidents
  • Establish an incident response plan
  • Develop processes for timely identification of information security incidents
  • Develop processes to investigate and document information security incidents
  • Develop incident escalation and communication processes
  • Establish teams that effectively respond to information security incidents
  • Test and review the incident response plan
  • Establish communication plans and processes
  • Determine the root cause of IS incidents
  • Align incident response plan with DRP and BCP.
  • Thane Branch

    304, Nitco Biz Park, Road No. 16U, Thane

Check out more CISM courses in India

Cloudnet Logo

CCSA - R80

Advance your knowledge on the GAiA operating system. This course covers everything you need to start-up, configure and manage daily operations of Check Point Security Gateway and Management Software Blades systems on the GAiA operating system.

by Cloudnet [Claim Listing ]
  • Price
  • Start Date
  • Duration
IICNS (Indian Institute of Code Network and Security) Logo

Cyber Security, Ethical Hacking & Penetration Testing Certification Course

This intensive 6-month program equips you with the skills to become a proficient ethical hacker and penetration tester. Delivered over a 12-week period (2 hours daily, 5 days per week), the course offers a comprehensive blend of theory, hands-on labs, and real-world scenario exercises.

by IICNS (Indian Institute of Code Network and Security) [Claim Listing ]
Encarta Labs Pvt Ltd Logo

Certified Information Security Manager (CISM)

This Certified Information Security Manager (CISM) training course provides an in-depth knowledge of the four CISM domains: security governance; risk management and compliance; security program development and management; and security incident management.

by Encarta Labs Pvt Ltd [Claim Listing ]
AR Learners Logo

CRISC Certification

CRISC training will provide you with a high-level understanding of risk management, as well as the terminology and methodologies used in risk management. This course is aligned to ISACA 2015.

by AR Learners [Claim Listing ]
G-TEC Education Ghaziabad Logo

Certificate Course In Cyber Forensics

The Certificate Course in Cyber Forensics demonstrates an individual’s knowledge on how to detect hacking attacks and properly extract evidences to report the crime and conduct audits to prevent future attacks.

by G-TEC Education Ghaziabad [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy