Gain knowledge and experience to demonstrate your understanding of the relationship between an information security program and broader business goals and objectives as you prepare for the Certified Information Security Manager (CISM) certification.
Gain knowledge and experience to demonstrate your understanding of the relationship between an information security program and broader business goals and objectives as you prepare for the Certified Information Security Manager (CISM) certification.
It distinguishes you as having not only information security expertise, but also knowledge and experience in the development and management of an information security program.
The uniquely management-focused CISM certification promotes international security practices and recognises the individual who manages, designs, oversees and assesses an enterprise’s information security.
This course is an intensive, four-day review program designed to prepare professionals for the Certified Information Security Manager exam.
This course includes a digital courseware manual and access to the CISM Questions, Answers and Explanations (QAE) database for 12 months.
What You’ll Learn
After completing this course, participants should be able to:
Explain the relationship between executive leadership, enterprise governance and information security governance
Outline the components used to build an information security strategy
Explain how the risk assessment process influences the information security strategy
Articulate the process and requirements used to develop an effective information risk response strategy
Describe the components of an effective information security program
Explain the process to build and maintain an enterprise information security program
Outline techniques used to assess the enterprise’s ability and readiness to manage an information security incident
Outline methods to measure and improve response and recovery capabilities
Who Is The Course For?
This course is designed for IT professionals with technical expertise and experience in IS/IT security and control looking to transition from team player to manager, including:
Senior Executives
IT Managers
Information Security Professionals
IT Software System and Application Developers
IT Auditors
We can also deliver and customise this training course for larger groups – saving your organisation time, money and resources.
Course Subjects
Domain 1: Information Security Governance
Enterprise Governance Overview
Organisational Culture, Structures, Roles and Responsibilities
Legal, Regulatory and Contractual Requirements
Information Security Strategy
Information Governance Frameworks and Standards
Strategic Planning
Domain 2: Information Security Risk Management
Risk and Threat Landscape
Vulnerability and Control Deficiency Analysis
Risk Assessment, Evaluation and Analysis
Information Risk Response
Risk Monitoring, Reporting and Communication
Domain 3: Information Security Program Development and Management
IS Program Development and Resources
IS Standards and Frameworks
Defining an IS Program Road Map
IS Program Metrics
IS Program Management
IS Awareness and Training
Integrating the Security Program with IT Operations
Program Communications, Reporting and Performance Management
Domain 4: Information Security Incident Management
Incident Management and Incident Response Overview
Incident Management and Response Plans
Incident Classification/Categorisation
Incident Management Operations, Tools and Technologies
Incident Investigation, Evaluation, Containment and Communication
Incident Eradication, Recovery and Review
Business Impact and Continuity
Disaster Recovery Planning
Training, Testing and Evaluation
Prerequisites
Lumify Group was previously known as DDLS Group. We help business and enterprise customers turn change into opportunity through instructor-led, vendor-certified, IT and process training.
Developed in partnership with the world’s leading tech vendors and delivered by industry-accredited experts, our courses are pragmatic, future-focused and real-world ready.
From cybersecurity to cloud computing, AI to agile, our award-winning trainers deliver cutting-edge content to over 20,000 students online, in classrooms and in workplaces, every year.
Learn From The Experts
Leaders in their respective fields and with an average student rating of 4.8/5, our industry-accredited trainers will inspire your team to learn, thrive and grow.
Train Your Way
From face-to-face sessions with our expert trainers to self-directed courses delivered entirely online, our training methods can be easily adapted to suit you and your team.
With cyber attacks and data security breaches on the rise and in the headlines, keeping your organisation’s data secure has never been more important. The ISO standard for Information Security, ISO/IEC 27001:2022 Information Security Management Systems, provides the framework to ensure your b...
This skill set addresses the skills and knowledge to assist an organisation improve cyber threat awareness and protect against cyber risk across a broad range of industries.
This qualification reflects the role of individuals in a variety of information and communications technology (ICT) roles who have established specialised skills in a technical ICT function
This is a 101 IT cyber security short course designed to teach you about IT security issues, looking at the types of attacks that are happening now, how they work and how to protect yourself and your organisation against them.
The evolved CompTIA Security+ certification course aims to train information technology students with adequate skills and knowledge required to network security issues and efficiently tackle them. Being vendor-neutral, this CompTIA certification course imparts broad knowledge to develop expertise i...
© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy