CismĀ® Certified Information Security Manager

by ALC Training Claim Listing

CISM defines the core competencies and international standards of performance that information security managers are expected to master. It provides executive management with the assurance that those who have earned their CISM have the experience and knowledge to offer effective security management

$4050

Contact the Institutes

Fill this form

Advertisement

ALC Training Logo

img Duration

4 Days

Course Details

The ISACA  Certified Information Security Manager® (CISM) is one of the most important and prestigious InfoSec qualifications in the world today.

CISM defines the core competencies and international standards of performance that information security managers are expected to master. It provides executive management with the assurance that those who have earned their CISM have the experience and knowledge to offer effective security management and advice.

This 4-day CISM training course provides an intense environment in which participants can acquire, thoroughly and properly, the skills and knowledge expected of a world-class information security manager. In the process the course provides outstanding preparation for the CISM exam.

 

Outcomes

This course has been independently commissioned with two objectives:

  • To provide an environment in which security professionals can acquire, thoroughly and properly, the skills and knowledge expected of a world class information security manager. Whether or not you intend to sit for the CISM exam, this course is a powerful way to equip yourself with the knowledge of the five core competencies that define the successful information security manager.

  • To maximise your prospects at the CISM exam if you choose to sit it.

 

Who Should Attend

The CISM designation is for Information Security professionals who have 3-5 years of front-line experience with the security of information. This credential is geared towards Information Security managers and those who have information security management responsibilities.

PREREQUISITES:

Qualifying for CISM requires a combination of four “e’s”: experience, ethics, education and examination. Specifically, the requirements are:

  • Successful completion of the CISM exam

  • Adherence to a code of professional conduct

  • Commitment to continuing professional education

  • Submission of verified evidence of a minimum of five years of information security work experience, with a minimum of three years of information security management work experience in three or more of the job practice areas. Waivers for general information security work experience are available, if certain education or certification requirements are met

For detailed information on if you have the relevant full-time work experience* in the CISM Job Practice Areas, please visit the following page: ISACA – “How to Become CISM Certified”.

 

Contents

The Certified Information Security Manager training course is structured to follow the four Job Practice Areas as set out in the current CISM Review Manual. The course comprehensively covers each of the core competencies and associated task and knowledge statements, thereby ensuring thorough preparation for the CISM exam.

The fundamental thrust of the examination is on understanding the concepts, not on memorising facts.  As a result, the course will be presented in an interactive manner to ensure the underlying concepts are understood and examination questions can be analysed properly to achieve the correct answer.

1. Information Security Governance and Strategy

  • Effective Information Security Governance

  • Key Information Security Concepts and Issues

  • The IS Manager

  • Scope and Charter of Information Security Governance

  • IS Governance Metrics

  • Developing an IS Strategy – Common Pitfalls

  • IS Strategy Objectives

  • Determining Current State of Security

  • Strategy Resources

  • Strategy Constraints

  • Action Plan Immediate Goals

  • Action Plan Intermediate Goals

Practice Questions; Review of Practice Questions;
Reference Materials and Glossary

2. Information Security Risk Management and Compliance

  • Effective Information Security Risk Management

  • Integration into Life Cycle Processes

  • Implementing Risk Management

  • Risk Identification and Analysis Methods

  • Mitigation Strategies and Prioritisation

  • Reporting Changes to Management

Practice Questions; Review of Practice Questions;
Reference Materials and Glossary

3. Information Security Program Development and Management

  • Planning

  • Security Baselines

  • Business Processes

  • Infrastructure

  • Malicious Code (Malware)

  • Life Cycles

  • Impact on End Users

  • Accountability

  • Security Metrics

  • Managing Internal and External Resources

Practice Questions; Review of Practice Questions;
Reference Materials and Glossary

4. Information Security Incident Management

  • Implementing Effective Information Security Management

  • Security Controls and Policies

  • Standards and Procedures

  • Trading Partners and Service Providers

  • Security Metrics and Monitoring

  • The Change Management Process

  • Vulnerability Assessments

  • Due Diligence

  • Resolution of Non-Compliance Issues

  • Culture, Behavior and Security Awareness

  • Brisbane Branch

    Level 1, 9 McInroy Street Taringa, Brisbane
  • Melbourne Branch

    Level 18, 101 Collins Street, Melbourne
  • Perth Branch

    Level 28, AMP Tower, 140 St Georges Terrace, Perth
  • Sydney Branch

    Level 14, Lumley House 309 Kent Street, Sydney
  • Canberra Branch

    Suite 7.01, Level 7 10 Hobart Place, Canberra

Check out more CISM courses in Australia

Lumify Group Logo

Certified Information Security Manager (CISMĀ®

Gain knowledge and experience to demonstrate your understanding of the relationship between an information security program and broader business goals and objectives as you prepare for the Certified Information Security Manager (CISM) certification.Ā 

by Lumify Group [Claim Listing ]
ILX Group Australia Logo

Introduction to Cyber Security training programmes

The phrase cyber security refers to the collection of processes, practices and technologies that have been designed to protect any connected systems, networks and data from unauthorised access.

by ILX Group Australia [Claim Listing ]
UNSW Sydney Logo

Cyber Security Bootcamp

This is a 101 IT cyber security short course designed to teach you about IT security issues, looking at the types of attacks that are happening now, how they work and how to protect yourself and your organisation against them.

by UNSW Sydney [Claim Listing ]
South Metropolitan TAFE Logo

Certificate IV in Cyber Security

Delve into the world of cyber security and become a trusted professional in a fast-growing industry. In a world where cyber attacks are constantly on the rise, there has never been a better time to gain in-demand skills that can set you up for a lucrative career in cyber security.

by South Metropolitan TAFE [Claim Listing ]
Housley Logo

Introduction to 802.1X Operations for Cisco Security Professionals (802.1X)

Introduction to 802.1X Operations for Cisco Security Professionals (802.1X)Ā v1.0 shows you how to configure and prepare to deploy CiscoĀ®Ā Identity-Based Networking Services (IBNS) solutions based on Cisco Identity Services Engine (ISE), Cisco Catalyst switches, and Cisco Wireless LAN Controllers.

by Housley [Claim Listing ]

Ā© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy