CISM (Certified Information Security Manager)

by GemRain Consulting Sdn Bhd (GRC) Claim Listing

The Certified Information Security Manager (CISM) certification from ISACA certifies a person's knowledge of information security governance, program development and management, incident management, and risk management.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

GemRain Consulting Sdn Bhd (GRC) Logo

img Duration

4 Days

Course Details

The Certified Information Security Manager (CISM) certification from ISACA certifies a person's knowledge of information security governance, program development and management, incident management, and risk management.

If you're a mid-career IT professional looking to advance to senior management roles in IT security and control, CISM is definitely for you.

Designed for IT professionals with technical expertise and experience in IS/IT security and control looking to transition from team player to manager. the CISM credential can add credibility and confidence to interactions with internal and external stakeholders, peers, and regulators.

This certification indicates expertise in information security governance, program development and management, incident management and risk management.

The course features an enhanced facilitator guide, additional participant resources, knowledge check questions from the CISM Questions, Answers and Explanations (QAE) database along with scenario-based activities and enrichment materials (articles, podcasts and whitepapers) selected from the ISACA website to provide learners with an opportunity to go deeper into specific areas related to the course content.

 

Objectives:

  • Explain the relationship between executive leadership, enterprise governance and information security governance.
  • Outline the components used to build an information security strategy.
  • Explain how the risk assessment process influences the information security strategy.
  • Articulate the process and requirements used to develop an effective information risk response strategy.
  • Describe the components of an effective information security program.
  • Explain the process to build and maintain an enterprise information security program.
  • Outline techniques used to assess the enterprise’s ability and readiness to manage an information security incident.

 

  • Petaling Jaya Branch

    33-5.6, Block C, Jaya One, Jalan Profesor Diraja Ungku Aziz, Petaling Jaya

Check out more CISM courses in Malaysia

Sakra Academy (M) Sdn.Bhd. Logo

CSX Cybersecurity Fundamentals

The Cybersecurity Fundamentals (CSX) course is an excellent way to gain foundational knowledge in cybersecurity, begin to build your knowledge,, and kick-start your career in this crucial area.

by Sakra Academy (M) Sdn.Bhd. [Claim Listing ]
PSDC (Penang Skills Development Centre) Logo

Cybersecurity Essentials

This program provides general understanding on the importance of cybersecurity and aims to create awareness on the growing cyber threats, cybertrends, and how these threats can be a catalyst towards cyber terrorism and internet radicalisation.

by PSDC (Penang Skills Development Centre) [Claim Listing ]
SEGi College Subang Jaya Logo

Bachelor of Science (Honours) Computer Science (Cyber Security and Networks)

The course offers opportunities for academic, professional, and practical study, including a paid placement year and industry certifications.

by SEGi College Subang Jaya [Claim Listing ]
Iverson Associates Sdn Bhd Logo

CISSP (Certified Information Systems Security Professional)

This course is the most comprehensive review of information security concepts and industry best practices, and covers the eight domains of the official CISSP CBK (Common Body of Knowledge).

by Iverson Associates Sdn Bhd [Claim Listing ]
Orbitage Logo

Certified Information Security Engineer (CISE): Penetration Testing

This intensive hands-on practical course ensures participants are knowledgeable about the security aspects related to IT systems and have the proficiency to secure the IT environment

by Orbitage [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy