CISM (Certified Information Security Manager)

by Berkeleyme School of Management and Sciences Claim Listing

The security of confidential data is of utmost importance to all organisations, as it improves business reputation and makes any business more effective. Information security allows businesses to prevent unauthorised access and keep their data secure from hackers.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

Berkeleyme School of Management and Sciences Logo

img Duration

Please Enquire

Course Details

The security of confidential data is of utmost importance to all organisations, as it improves business reputation and makes any business more effective. Information security allows businesses to prevent unauthorised access and keep their data secure from hackers.

Information Security Manager plays an important role to help organisations protect themselves from various threats like viruses, security breaches, hacker attacks, and more.

Any individual who holds Certified Information Security Manager (CISM) certification is recognised as a professional in program development and management, information security governance, incident management, and risk management.

Our Certified Information Security Manager (CISM) certification covers the four domains in detail. Gaining in-depth knowledge of these domains will certify you as a professional in information security management.

This Certified Information Security Manager (CISM) certification will equip professionals for their job roles. Our specially tailored course will help professionals comprehend Certified Information Security Manager (CISM) and pass their certification exam in their 1st attempt.

 

What Is The Course Structure? 

  • Introduction to CISM (Certified Information Security Manager)
    • Objectives and Expectations
    • Understand Information Security
    • Information Security Goals
    • Principles for Information Security Professionals
  • Domain 1 – Information Security Governance
    • Knowledge Statements
    • Information Security Governance Overview
    • Effective Information Security Governance
    • Relationships of Governance and Third-Party
    • Information
    • Security Metrics
    • Governance Metrics
    • Strategy Development
    • Strategy Resources and Constraints
    • Other Frameworks
    • Compliances
    • Action Plans to Implement Strategy
  • Domain 2 – Information Risk Management and Compliance
    • Information Risk Management
    • Task and Knowledge Statements
    • Overview of Risk Management
    • Understand Risk Assessment
    • Information Asset Classification
    • Assessment Management
    • Objectives of Recovery Time
    • Security Control Baselines
    • Risk Monitoring
    • Training and Awareness
    • Information Risk Management Documentation
  • Domain 3 – Information Security Program Development and Management
    • Task and Knowledge Statements
    • Information Security Program
    • EISA (Enterprise Information Security Architecture)
    • Security Program Metrics and Monitoring
    • Measuring Operational Performance
    • Information Security Program’s Common Challenges
  • Domain 4 – Information Security Incident Management
    • Task and Knowledge Statements
    • Incident Management
    • Incident Management Procedures
    • Disaster Recovery and Business Continuity Procedures
    • Post Incident Activities and Investigation
    • ISACA Code of Professional Ethics
    • Laws and Regulations
    • Policy Versus Law Within an Organisation
    • Ethics and the Internet IAB
    • CISM in the Workplace
    • Priorities of CISM
    • Learn How Questions Are Made
    • Getting Prepared for the Examination
    • Recommended Reading for the CISM Exam
  • London Branch

    Kemp House, 152 – 160, London

Check out more CISM courses in UK

Learning Tree Logo

CISM Certified Information Security Manager

In this course, you will gain the knowledge and skills needed to successfully pass the certification exam and become a CISM Certified Information Security Manager.

by Learning Tree [Claim Listing ]
Grey Wolf Cyber Security Logo

Certified Information Systems Security Professional

The Certified Information Systems Security Professional draws from a comprehensive, up-to-date, global common body of knowledge that ensures security leaders have a deep knowledge and understanding of new threats, technologies, regulations, standards and practices.

by Grey Wolf Cyber Security [Claim Listing ]
Carlisle College Logo

Level 2 Technical Diploma In Digital Technology (Networking and Cyber Security)

This qualification is for learners who want to start a career in digital technology. It is designed for post-16 learners and can be taken as part of a wider study programme.

by Carlisle College [Claim Listing ]
London IT Training (LIT) Logo

Check Point Certified Security Expert (CCSE Training)

Check Point Certified Security Expert (CCSE)‘ training is globally recognized and well accepted as the Check Point is also known as one of the top-ranked providers for both software and hardware security products.

by London IT Training (LIT)
QA Logo

(ISC)²® Certified Information Systems Security Professional (CISSP®)

This training course will help students review and refresh their knowledge and identify areas they need to study for the CISSP exam. Content aligns with and comprehensively covers the eight domains of the (ISC)²® CISSP Common Body of Knowledge (CBK®), ensuring relevancy across all disciplines in...

by QA [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy