CISM defines the core competencies and international standards of performance that information security managers are expected to master. It provides executive management with the assurance that those who have earned their CISM have the experience and knowledge to offer effective security management
The ISACA Certified Information Security Manager® (CISM) is one of the most important and prestigious InfoSec qualifications in the world today.
CISM defines the core competencies and international standards of performance that information security managers are expected to master. It provides executive management with the assurance that those who have earned their CISM have the experience and knowledge to offer effective security management and advice.
This 4-day CISM training course provides an intense environment in which participants can acquire, thoroughly and properly, the skills and knowledge expected of a world-class information security manager. In the process the course provides outstanding preparation for the CISM exam.
Outcomes
This course has been independently commissioned with two objectives:
To provide an environment in which security professionals can acquire, thoroughly and properly, the skills and knowledge expected of a world class information security manager. Whether or not you intend to sit for the CISM exam, this course is a powerful way to equip yourself with the knowledge of the five core competencies that define the successful information security manager.
To maximise your prospects at the CISM exam if you choose to sit it.
Who Should Attend
The CISM designation is for Information Security professionals who have 3-5 years of front-line experience with the security of information. This credential is geared towards Information Security managers and those who have information security management responsibilities.
PREREQUISITES:
Qualifying for CISM requires a combination of four “e’s”: experience, ethics, education and examination. Specifically, the requirements are:
Successful completion of the CISM exam
Adherence to a code of professional conduct
Commitment to continuing professional education
Submission of verified evidence of a minimum of five years of information security work experience, with a minimum of three years of information security management work experience in three or more of the job practice areas. Waivers for general information security work experience are available, if certain education or certification requirements are met
For detailed information on if you have the relevant full-time work experience* in the CISM Job Practice Areas, please visit the following page: ISACA – “How to Become CISM Certified”.
Contents
The Certified Information Security Manager training course is structured to follow the four Job Practice Areas as set out in the current CISM Review Manual. The course comprehensively covers each of the core competencies and associated task and knowledge statements, thereby ensuring thorough preparation for the CISM exam.
The fundamental thrust of the examination is on understanding the concepts, not on memorising facts. As a result, the course will be presented in an interactive manner to ensure the underlying concepts are understood and examination questions can be analysed properly to achieve the correct answer.
1. Information Security Governance and Strategy
Effective Information Security Governance
Key Information Security Concepts and Issues
The IS Manager
Scope and Charter of Information Security Governance
IS Governance Metrics
Developing an IS Strategy – Common Pitfalls
IS Strategy Objectives
Determining Current State of Security
Strategy Resources
Strategy Constraints
Action Plan Immediate Goals
Action Plan Intermediate Goals
Practice Questions; Review of Practice Questions;
Reference Materials and Glossary
2. Information Security Risk Management and Compliance
Effective Information Security Risk Management
Integration into Life Cycle Processes
Implementing Risk Management
Risk Identification and Analysis Methods
Mitigation Strategies and Prioritisation
Reporting Changes to Management
Practice Questions; Review of Practice Questions;
Reference Materials and Glossary
3. Information Security Program Development and Management
Planning
Security Baselines
Business Processes
Infrastructure
Malicious Code (Malware)
Life Cycles
Impact on End Users
Accountability
Security Metrics
Managing Internal and External Resources
Practice Questions; Review of Practice Questions;
Reference Materials and Glossary
4. Information Security Incident Management
Implementing Effective Information Security Management
Security Controls and Policies
Standards and Procedures
Trading Partners and Service Providers
Security Metrics and Monitoring
The Change Management Process
Vulnerability Assessments
Due Diligence
Resolution of Non-Compliance Issues
Culture, Behavior and Security Awareness
Who We Are And What We Do
ALC is a leading Australia-based provider of quality training for business and government, since 1994. Our focus is on best-practice methods and frameworks that help ensure you get the most out of your investment.
With offices in Sydney, Melbourne, Brisbane, Singapore and Kuala Lumpur, our courses are held regularly throughout Australia, New Zealand and South-East Asia. More than 55,000 people have trained with ALC.
Company Announcement
We are pleased to advise that as of 17 March 2023, ALC Training has become a part of the Tesserent Group of companies as the first key step of the new Tesserent Academy initiative.
The mission statement of the Tesserent Academy is to be the pre-eminent provider of cyber security education in the Asia-Pacific region. ALC, with its very strong background of nearly 30 years in information and cyber security training will provide Tesserent Academy with an immediate and commanding position in this sector.
By joining Tesserent, ALC will have access to a much greater range of resources which will lead to many new opportunities and significantly increased growth potential.
The focus will be on portfolio expansion, the development of new skills-based programs, and the creation of new certifications relevant to our region.
Why Choose Alc?
There are many providers of training, just as there are many providers of most services. So how do you choose?
Well, for starters, training for us is not a sideline activity – it is all that we do. And we have been doing it since March 1994. In that time, we have seen many training companies come and go. To be a market leader all this time, we must be doing something right.
We are a team of dedicated and capable people who care about what we do. We give it single-minded focus. We offer commitment, professionalism, and enthusiasm.
When You Train With ALC You Get:
Gain knowledge and experience to demonstrate your understanding of the relationship between an information security program and broader business goals and objectives as you prepare for the Certified Information Security Manager (CISM) certification.Ā
The phrase cyber security refers to the collection of processes, practices and technologies that have been designed to protect any connected systems, networks and data from unauthorised access.
This is a 101 IT cyber security short course designed to teach you about IT security issues, looking at the types of attacks that are happening now, how they work and how to protect yourself and your organisation against them.
Delve into the world of cyber security and become a trusted professional in a fast-growing industry. In a world where cyber attacks are constantly on the rise, there has never been a better time to gain in-demand skills that can set you up for a lucrative career in cyber security.
Introduction to 802.1X Operations for Cisco Security Professionals (802.1X)Ā v1.0 shows you how to configure and prepare to deploy CiscoĀ®Ā Identity-Based Networking Services (IBNS) solutions based on Cisco Identity Services Engine (ISE), Cisco Catalyst switches, and Cisco Wireless LAN Controllers.
Ā© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy