Certified Information Security Manager (CISM®

by Lumify Group Claim Listing

Gain knowledge and experience to demonstrate your understanding of the relationship between an information security program and broader business goals and objectives as you prepare for the Certified Information Security Manager (CISM) certification. 

$4015

Contact the Institutes

Fill this form

Advertisement

Lumify Group Logo

img Duration

4 Days

Course Details

Gain knowledge and experience to demonstrate your understanding of the relationship between an information security program and broader business goals and objectives as you prepare for the Certified Information Security Manager (CISM) certification. 

It distinguishes you as having not only information security expertise, but also knowledge and experience in the development and management of an information security program.

The uniquely management-focused CISM certification promotes international security practices and recognises the individual who manages, designs, oversees and assesses an enterprise’s information security. 

This course is an intensive, four-day review program designed to prepare professionals for the Certified Information Security Manager exam.

This course includes a digital courseware manual and access to the CISM Questions, Answers and Explanations (QAE) database for 12 months.

 

What You’ll Learn

After completing this course, participants should be able to:

  • Explain the relationship between executive leadership, enterprise governance and information security governance

  • Outline the components used to build an information security strategy

  • Explain how the risk assessment process influences the information security strategy

  • Articulate the process and requirements used to develop an effective information risk response strategy

  • Describe the components of an effective information security program

  • Explain the process to build and maintain an enterprise information security program

  • Outline techniques used to assess the enterprise’s ability and readiness to manage an information security incident

  • Outline methods to measure and improve response and recovery capabilities

 

Who Is The Course For?

This course is designed for IT professionals with technical expertise and experience in IS/IT security and control looking to transition from team player to manager, including:

  • Senior Executives

  • IT Managers

  • Information Security Professionals

  • IT Software System and Application Developers

  • IT Auditors

We can also deliver and customise this training course for larger groups – saving your organisation time, money and resources. 

 

Course Subjects

Domain 1: Information Security Governance

  • Enterprise Governance Overview

  • Organisational Culture, Structures, Roles and Responsibilities

  • Legal, Regulatory and Contractual Requirements

  • Information Security Strategy

  • Information Governance Frameworks and Standards

  • Strategic Planning

Domain 2: Information Security Risk Management

  • Risk and Threat Landscape

  • Vulnerability and Control Deficiency Analysis

  • Risk Assessment, Evaluation and Analysis

  • Information Risk Response

  • Risk Monitoring, Reporting and Communication

Domain 3: Information Security Program Development and Management

  • IS Program Development and Resources

  • IS Standards and Frameworks

  • Defining an IS Program Road Map

  • IS Program Metrics

  • IS Program Management

  • IS Awareness and Training

  • Integrating the Security Program with IT Operations

  • Program Communications, Reporting and Performance Management

Domain 4: Information Security Incident Management

  • Incident Management and Incident Response Overview

  • Incident Management and Response Plans

  • Incident Classification/Categorisation

  • Incident Management Operations, Tools and Technologies

  • Incident Investigation, Evaluation, Containment and Communication

  • Incident Eradication, Recovery and Review

  • Business Impact and Continuity

  • Disaster Recovery Planning

  • Training, Testing and Evaluation

 

Prerequisites

  • It is recommended that you have 3-5 years of information security experience.
  • To earn the CISM certification, students must pass the CISM Exam and also meet the additional criteria as determined by ISACA.
  • Canberra Branch

    Level 2, 221 London Circuit, Canberra
  • Sydney Branch

    Level 24, 477 Pitt Street, Sydney
  • Melbourne Branch

    Level 12A, 45 William Street, Melbourne
  • Brisbane Branch

    Level 8, 201 Charlotte Street, Brisbane
  • Perth Branch

    Level 7, 553 Hay Street, Perth
  • Adelaide Branch

    Level 15, 33 King William Street, Adelaide

Check out more CISM courses in Australia

MEGT Logo

Cyber Security Microsoft Traineeship Program

As the skills gap increases, businesses like yours have a significant role to play in ensuring a sustainable pipeline of IT talent into the workforce. The annual cohort of university graduates is not enough to meet this demand.

by MEGT [Claim Listing ]
Koenig Solutions Logo

CISSP

Certified Information Systems Security Professional (CISSP) is one of the world's premier cybersecurity certifications offered for professionals worldwide

by Koenig Solutions [Claim Listing ]
Coding Kids Logo

Cybersecurity

Security, Linux and Hacking Games is a cyber security course for 14-16 year olds who are interested in learning about security and Linux fundamentals through "hacking" games. This can be attended by beginners new to Linux. No prior experience required.

by Coding Kids [Claim Listing ]
South Sydney College Logo

Diploma Of Information Technology (Cybersecurity)

Information technology and cybersecurity is a growing industry with high demand in modern workplaces. This course is perfect for students who want to build a career in digital systems and network, and also open up opportunities for higher studies.

by South Sydney College [Claim Listing ]
CertHub Logo

Certified Information Systems Security Professional (CISSP)

The CISSP certification is a way to verify your experience in the eight domains of the Cybersecurity Book of Knowledge. You need five years of paid job experience in two or more of the eight domains to be eligible for the certification.

by CertHub [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy