Certified Information Security Manager (CISM®)

by Lumify Group Claim Listing

Gain knowledge and experience to demonstrate your understanding of the relationship between an information security program and broader business goals and objectives as you prepare for the Certified Information Security Manager (CISM) certification. 

$3600

Contact the Institutes

Fill this form

Advertisement

Lumify Group Logo

img Duration

4 Days

Course Details

Gain knowledge and experience to demonstrate your understanding of the relationship between an information security program and broader business goals and objectives as you prepare for the Certified Information Security Manager (CISM) certification. 

It distinguishes you as having not only information security expertise, but also knowledge and experience in the development and management of an information security program.

The uniquely management-focused CISM certification promotes international security practices and recognises the individual who manages, designs, oversees and assesses an enterprise’s information security. 

This course is an intensive, four-day review program designed to prepare professionals for the Certified Information Security Manager exam.

This course includes a digital courseware manual and access to the CISM Questions, Answers and Explanations (QAE) database for 12 months.

 

After completing this course, participants should be able to:

  • Explain the relationship between executive leadership, enterprise governance and information security governance

  • Outline the components used to build an information security strategy

  • Explain how the risk assessment process influences the information security strategy

  • Articulate the process and requirements used to develop an effective information risk response strategy

  • Describe the components of an effective information security program

  • Explain the process to build and maintain an enterprise information security program

  • Outline techniques used to assess the enterprise’s ability and readiness to manage an information security incident

  • Outline methods to measure and improve response and recovery capabilities

  • Auckland Branch

    Ground Floor, 338 Ponsonby Road Ponsonby, Auckland
  • Wellington Branch

    Level 8, JacksonStone House 11 Hunter Street, Wellington
  • Christchurch Branch

    13 Stanley Street Sydenham, Christchurch

Check out more CISM courses in New Zealand

Auldhouse Logo

Understanding Cisco Cybersecurity Fundamentals

this course allows learners to understand common security concepts, and start to learn the basic security techniques used in a Security Operations Center (SOC) to find threats on a network using a variety of popular security tools within a real-life network infrastructure.

by Auldhouse [Claim Listing ]
Auldhouse Logo

CompTIA Security+

Our Security+ course provides the basic knowledge needed to plan, implement, and maintain information security in a vendor-neutral format. This includes risk management, host and network security, authentication and access control systems, cryptography, and organizational security.

by Auldhouse [Claim Listing ]
Developers Institute Logo

Application Security

This course teaches you the key concepts in cybersecurity awareness, threat assessment and secure development practices for keeping people, systems and data safe.

by Developers Institute [Claim Listing ]
Lumify Group Logo

CompTIA Security+

CompTIA Security+ is a global certification that validates the baseline skills necessary to improve baseline security readiness and incident response by applying current best practices for preventing and addressing today’s threats.

by Lumify Group [Claim Listing ]
Wellington Uni-Professional Logo

Cybersecurity Essentials

Cybersecurity is a key focus for organisations due to the increase in attacks and the huge impact these can have. All employees working in the digital space need a fundamental understanding of cybersecurity.

by Wellington Uni-Professional [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy