CismĀ® Certified Information Security Manager

by ALC Training Claim Listing

CISM defines the core competencies and international standards of performance that information security managers are expected to master. It provides executive management with the assurance that those who have earned their CISM have the experience and knowledge to offer effective security management

$4050

Contact the Institutes

Fill this form

Advertisement

ALC Training Logo

img Duration

4 Days

Course Details

The ISACA  Certified Information Security Manager® (CISM) is one of the most important and prestigious InfoSec qualifications in the world today.

CISM defines the core competencies and international standards of performance that information security managers are expected to master. It provides executive management with the assurance that those who have earned their CISM have the experience and knowledge to offer effective security management and advice.

This 4-day CISM training course provides an intense environment in which participants can acquire, thoroughly and properly, the skills and knowledge expected of a world-class information security manager. In the process the course provides outstanding preparation for the CISM exam.

 

Outcomes

This course has been independently commissioned with two objectives:

  • To provide an environment in which security professionals can acquire, thoroughly and properly, the skills and knowledge expected of a world class information security manager. Whether or not you intend to sit for the CISM exam, this course is a powerful way to equip yourself with the knowledge of the five core competencies that define the successful information security manager.

  • To maximise your prospects at the CISM exam if you choose to sit it.

 

Who Should Attend

The CISM designation is for Information Security professionals who have 3-5 years of front-line experience with the security of information. This credential is geared towards Information Security managers and those who have information security management responsibilities.

PREREQUISITES:

Qualifying for CISM requires a combination of four “e’s”: experience, ethics, education and examination. Specifically, the requirements are:

  • Successful completion of the CISM exam

  • Adherence to a code of professional conduct

  • Commitment to continuing professional education

  • Submission of verified evidence of a minimum of five years of information security work experience, with a minimum of three years of information security management work experience in three or more of the job practice areas. Waivers for general information security work experience are available, if certain education or certification requirements are met

For detailed information on if you have the relevant full-time work experience* in the CISM Job Practice Areas, please visit the following page: ISACA – “How to Become CISM Certified”.

 

Contents

The Certified Information Security Manager training course is structured to follow the four Job Practice Areas as set out in the current CISM Review Manual. The course comprehensively covers each of the core competencies and associated task and knowledge statements, thereby ensuring thorough preparation for the CISM exam.

The fundamental thrust of the examination is on understanding the concepts, not on memorising facts.  As a result, the course will be presented in an interactive manner to ensure the underlying concepts are understood and examination questions can be analysed properly to achieve the correct answer.

1. Information Security Governance and Strategy

  • Effective Information Security Governance

  • Key Information Security Concepts and Issues

  • The IS Manager

  • Scope and Charter of Information Security Governance

  • IS Governance Metrics

  • Developing an IS Strategy – Common Pitfalls

  • IS Strategy Objectives

  • Determining Current State of Security

  • Strategy Resources

  • Strategy Constraints

  • Action Plan Immediate Goals

  • Action Plan Intermediate Goals

Practice Questions; Review of Practice Questions;
Reference Materials and Glossary

2. Information Security Risk Management and Compliance

  • Effective Information Security Risk Management

  • Integration into Life Cycle Processes

  • Implementing Risk Management

  • Risk Identification and Analysis Methods

  • Mitigation Strategies and Prioritisation

  • Reporting Changes to Management

Practice Questions; Review of Practice Questions;
Reference Materials and Glossary

3. Information Security Program Development and Management

  • Planning

  • Security Baselines

  • Business Processes

  • Infrastructure

  • Malicious Code (Malware)

  • Life Cycles

  • Impact on End Users

  • Accountability

  • Security Metrics

  • Managing Internal and External Resources

Practice Questions; Review of Practice Questions;
Reference Materials and Glossary

4. Information Security Incident Management

  • Implementing Effective Information Security Management

  • Security Controls and Policies

  • Standards and Procedures

  • Trading Partners and Service Providers

  • Security Metrics and Monitoring

  • The Change Management Process

  • Vulnerability Assessments

  • Due Diligence

  • Resolution of Non-Compliance Issues

  • Culture, Behavior and Security Awareness

  • Brisbane Branch

    Level 1, 9 McInroy Street Taringa, Brisbane
  • Melbourne Branch

    Level 18, 101 Collins Street, Melbourne
  • Perth Branch

    Level 28, AMP Tower, 140 St Georges Terrace, Perth
  • Sydney Branch

    Level 14, Lumley House 309 Kent Street, Sydney
  • Canberra Branch

    Suite 7.01, Level 7 10 Hobart Place, Canberra

Check out more CISM courses in Australia

The Gordon Skills Logo

Certificate IV in Cyber Security

If you are looking to develop a career in the IT industry, love new technology and are seeking employment in Cyber Security ā€“ this is the course for you.

by The Gordon Skills [Claim Listing ]
Infotech Professionals Pty Ltd. Logo

Diploma of Information Technology (Cyber Security)

This qualification reflects the role of individuals in a variety of information and communications technology (ICT) roles who have established specialised skills in a technical ICT function

by Infotech Professionals Pty Ltd. [Claim Listing ]
Study Gurus Logo

Certificate IV In Cyber Security

You will learn a range of technical skills including how to implement network security infrastructure and detect breaches in network security, as well as stakeholder management. This course will provide you with a range of foundation knowledge and skills in website security, IT network testing, and

by Study Gurus [Claim Listing ]
ALC Training Logo

CGEITĀ® Certified in Governance of Enterprise IT

The ISACAĀ® Certified in Governance of Enterprise IT (CGEIT)Ā® certification is the world-leading vendor-neutral certification designed for IT professionals in large organisations who are responsible for directing, managing and supporting the governance of enterprise IT.

by ALC Training [Claim Listing ]
NobleProg (Australia) Logo

Advanced Nagios Training Course

Nagios is an IT system monitoring tool that monitors a network for issues and resolves IT infrastructure problems.Ā This instructor-led, live training (online or onsite) is aimed at intermediate-level systems administrators who wish to learn and utilize the advanced features and components of Nagio...

by NobleProg (Australia) [Claim Listing ]

Ā© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy