CISM (Certified Information Security Manager)

by GemRain Consulting Sdn Bhd (GRC)

The Certified Information Security Manager (CISM) certification from ISACA certifies a person's knowledge of information security governance, program development and management, incident management, and risk management.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

GemRain Consulting Sdn Bhd (GRC) Logo

img Duration

4 Days

Course Details

The Certified Information Security Manager (CISM) certification from ISACA certifies a person's knowledge of information security governance, program development and management, incident management, and risk management.

If you're a mid-career IT professional looking to advance to senior management roles in IT security and control, CISM is definitely for you.

Designed for IT professionals with technical expertise and experience in IS/IT security and control looking to transition from team player to manager. the CISM credential can add credibility and confidence to interactions with internal and external stakeholders, peers, and regulators.

This certification indicates expertise in information security governance, program development and management, incident management and risk management.

The course features an enhanced facilitator guide, additional participant resources, knowledge check questions from the CISM Questions, Answers and Explanations (QAE) database along with scenario-based activities and enrichment materials (articles, podcasts and whitepapers) selected from the ISACA website to provide learners with an opportunity to go deeper into specific areas related to the course content.

 

Objectives:

  • Explain the relationship between executive leadership, enterprise governance and information security governance.
  • Outline the components used to build an information security strategy.
  • Explain how the risk assessment process influences the information security strategy.
  • Articulate the process and requirements used to develop an effective information risk response strategy.
  • Describe the components of an effective information security program.
  • Explain the process to build and maintain an enterprise information security program.
  • Outline techniques used to assess the enterprise’s ability and readiness to manage an information security incident.

 

  • Petaling Jaya Branch

    33-5.6, Block C, Jaya One, Jalan Profesor Diraja Ungku Aziz, Petaling Jaya

© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy