CISM (Certified Information Security Manager)

by GemRain Consulting Sdn Bhd (GRC)

The Certified Information Security Manager (CISM) certification from ISACA certifies a person's knowledge of information security governance, program development and management, incident management, and risk management.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

GemRain Consulting Sdn Bhd (GRC) Logo

img Duration

4 Days

Course Details

The Certified Information Security Manager (CISM) certification from ISACA certifies a person's knowledge of information security governance, program development and management, incident management, and risk management.

If you're a mid-career IT professional looking to advance to senior management roles in IT security and control, CISM is definitely for you.

Designed for IT professionals with technical expertise and experience in IS/IT security and control looking to transition from team player to manager. the CISM credential can add credibility and confidence to interactions with internal and external stakeholders, peers, and regulators.

This certification indicates expertise in information security governance, program development and management, incident management and risk management.

The course features an enhanced facilitator guide, additional participant resources, knowledge check questions from the CISM Questions, Answers and Explanations (QAE) database along with scenario-based activities and enrichment materials (articles, podcasts and whitepapers) selected from the ISACA website to provide learners with an opportunity to go deeper into specific areas related to the course content.

 

Objectives:

  • Explain the relationship between executive leadership, enterprise governance and information security governance.
  • Outline the components used to build an information security strategy.
  • Explain how the risk assessment process influences the information security strategy.
  • Articulate the process and requirements used to develop an effective information risk response strategy.
  • Describe the components of an effective information security program.
  • Explain the process to build and maintain an enterprise information security program.
  • Outline techniques used to assess the enterprise’s ability and readiness to manage an information security incident.

 

  • Petaling Jaya Branch

    33-5.6, Block C, Jaya One, Jalan Profesor Diraja Ungku Aziz, Petaling Jaya

Check out more CISM courses in Malaysia

Symphony Digest Logo

Cyber Security

Cyber Security course is offered by Symphony Digest. Whether you are looking for public courses or HR looking for in-house courses, Symphony has over 200 courses to suit your needs.

by Symphony Digest [Claim Listing ]
Iverson Logo

Cyber Security

The Certified Application Security Engineer (CASE) credential is developed in partnership with large application and software development experts globally.

by Iverson [Claim Listing ]
Inovasi EduTech Logo

Certified In The Governance Of Enterprise IT (CGEIT)

Certified in the Governance of Enterprise IT course is offered by Inovasi EduTech. We strive to empower learners with the knowledge, skills, and expertise they need to succeed in today’s rapidly evolving technology landscape.

by Inovasi EduTech [Claim Listing ]
AA Knowledge Malaysia Sdn Bhd Logo

Certificate In Cyber Security

Certificate in Cyber Security is offered by AA Knowledge Malaysia Sdn Bhd. We fill needs creatively and seek new ways of looking at old problems. By promoting learning, research, and education, we contribute to the advancement of education and training.

by AA Knowledge Malaysia Sdn Bhd [Claim Listing ]
FMM Institute Logo

Cyber Security Essential Skills

Cyber Security Essential Skills training is offered by FMM Institute. FMM Institute believes in lifelong learning. The range of Certificate programmes offered provides the opportunity for working personnel to gain qualifications to upgrade themselves for career advancements.

by FMM Institute [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy