CISM defines the core competencies and international standards of performance that information security managers are expected to master. It provides executive management with the assurance that those who have earned their CISM have the experience and knowledge to offer effective security management
The ISACA Certified Information Security Manager® (CISM) is one of the most important and prestigious InfoSec qualifications in the world today.
CISM defines the core competencies and international standards of performance that information security managers are expected to master. It provides executive management with the assurance that those who have earned their CISM have the experience and knowledge to offer effective security management and advice.
This 4-day CISM training course provides an intense environment in which participants can acquire, thoroughly and properly, the skills and knowledge expected of a world-class information security manager. In the process the course provides outstanding preparation for the CISM exam.
Outcomes
This course has been independently commissioned with two objectives:
To provide an environment in which security professionals can acquire, thoroughly and properly, the skills and knowledge expected of a world class information security manager. Whether or not you intend to sit for the CISM exam, this course is a powerful way to equip yourself with the knowledge of the five core competencies that define the successful information security manager.
To maximise your prospects at the CISM exam if you choose to sit it.
Who Should Attend
The CISM designation is for Information Security professionals who have 3-5 years of front-line experience with the security of information. This credential is geared towards Information Security managers and those who have information security management responsibilities.
PREREQUISITES:
Qualifying for CISM requires a combination of four “e’s”: experience, ethics, education and examination. Specifically, the requirements are:
Successful completion of the CISM exam
Adherence to a code of professional conduct
Commitment to continuing professional education
Submission of verified evidence of a minimum of five years of information security work experience, with a minimum of three years of information security management work experience in three or more of the job practice areas. Waivers for general information security work experience are available, if certain education or certification requirements are met
For detailed information on if you have the relevant full-time work experience* in the CISM Job Practice Areas, please visit the following page: ISACA – “How to Become CISM Certified”.
Contents
The Certified Information Security Manager training course is structured to follow the four Job Practice Areas as set out in the current CISM Review Manual. The course comprehensively covers each of the core competencies and associated task and knowledge statements, thereby ensuring thorough preparation for the CISM exam.
The fundamental thrust of the examination is on understanding the concepts, not on memorising facts. As a result, the course will be presented in an interactive manner to ensure the underlying concepts are understood and examination questions can be analysed properly to achieve the correct answer.
1. Information Security Governance and Strategy
Effective Information Security Governance
Key Information Security Concepts and Issues
The IS Manager
Scope and Charter of Information Security Governance
IS Governance Metrics
Developing an IS Strategy – Common Pitfalls
IS Strategy Objectives
Determining Current State of Security
Strategy Resources
Strategy Constraints
Action Plan Immediate Goals
Action Plan Intermediate Goals
Practice Questions; Review of Practice Questions;
Reference Materials and Glossary
2. Information Security Risk Management and Compliance
Effective Information Security Risk Management
Integration into Life Cycle Processes
Implementing Risk Management
Risk Identification and Analysis Methods
Mitigation Strategies and Prioritisation
Reporting Changes to Management
Practice Questions; Review of Practice Questions;
Reference Materials and Glossary
3. Information Security Program Development and Management
Planning
Security Baselines
Business Processes
Infrastructure
Malicious Code (Malware)
Life Cycles
Impact on End Users
Accountability
Security Metrics
Managing Internal and External Resources
Practice Questions; Review of Practice Questions;
Reference Materials and Glossary
4. Information Security Incident Management
Implementing Effective Information Security Management
Security Controls and Policies
Standards and Procedures
Trading Partners and Service Providers
Security Metrics and Monitoring
The Change Management Process
Vulnerability Assessments
Due Diligence
Resolution of Non-Compliance Issues
Culture, Behavior and Security Awareness
Who We Are And What We Do
ALC is a leading Australia-based provider of quality training for business and government, since 1994. Our focus is on best-practice methods and frameworks that help ensure you get the most out of your investment.
With offices in Sydney, Melbourne, Brisbane, Singapore and Kuala Lumpur, our courses are held regularly throughout Australia, New Zealand and South-East Asia. More than 55,000 people have trained with ALC.
Company Announcement
We are pleased to advise that as of 17 March 2023, ALC Training has become a part of the Tesserent Group of companies as the first key step of the new Tesserent Academy initiative.
The mission statement of the Tesserent Academy is to be the pre-eminent provider of cyber security education in the Asia-Pacific region. ALC, with its very strong background of nearly 30 years in information and cyber security training will provide Tesserent Academy with an immediate and commanding position in this sector.
By joining Tesserent, ALC will have access to a much greater range of resources which will lead to many new opportunities and significantly increased growth potential.
The focus will be on portfolio expansion, the development of new skills-based programs, and the creation of new certifications relevant to our region.
Why Choose Alc?
There are many providers of training, just as there are many providers of most services. So how do you choose?
Well, for starters, training for us is not a sideline activity – it is all that we do. And we have been doing it since March 1994. In that time, we have seen many training companies come and go. To be a market leader all this time, we must be doing something right.
We are a team of dedicated and capable people who care about what we do. We give it single-minded focus. We offer commitment, professionalism, and enthusiasm.
When You Train With ALC You Get:
If you are looking to develop a career in the IT industry, love new technology and are seeking employment in Cyber Security ā this is the course for you.
This qualification reflects the role of individuals in a variety of information and communications technology (ICT) roles who have established specialised skills in a technical ICT function
You will learn a range of technical skills including how to implement network security infrastructure and detect breaches in network security, as well as stakeholder management. This course will provide you with a range of foundation knowledge and skills in website security, IT network testing, and
The ISACAĀ® Certified in Governance of Enterprise IT (CGEIT)Ā® certification is the world-leading vendor-neutral certification designed for IT professionals in large organisations who are responsible for directing, managing and supporting the governance of enterprise IT.
Nagios is an IT system monitoring tool that monitors a network for issues and resolves IT infrastructure problems.Ā This instructor-led, live training (online or onsite) is aimed at intermediate-level systems administrators who wish to learn and utilize the advanced features and components of Nagio...
Ā© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy