In this course, you will gain the knowledge and skills needed to successfully pass the certification exam and become a CISM Certified Information Security Manager.
In this course, you will gain the knowledge and skills needed to successfully pass the certification exam and become a CISM Certified Information Security Manager.
This course will cover four CISM domains:
Security governance
Risk management and compliance
Security programme development and management
Security incident management
In addition to meeting ISACA’s certification requirements, passing the CISM Certification Exam meets U.S. DoD Directive 8140/8570.01 Management (IAM) Level-II, Management (IAM) Level-III and CSSP Manager requirements.
CISM Certified Information Security Manager Training Information
In this course, you will:
Learn from ISACA official curriculum.
Receive an exam voucher from ISACA.
Prepare for and pass the Certified Information Security Manager (CISM) exam.
Develop an information security strategy and plan of action to implement the strategy.
Manage and monitor information security risks.
Build and maintain an information security plan.
Implement policies and procedures to respond to and recover from disruptive and destructive information security events.
Continue learning and face new challenges with after-course one-on-one instructor coaching.
Training Prerequisites
To succeed in this course and successfully pass the CISM exam, you should have at least five years of information security experience in at least one of the following roles:
IT consultant, auditor, or manager
Security policy writer
Privacy officer
Information security officer
Network administrator
Security device administrator
Security engineers
Certification Information
The ISACA Exam Candidate Information Guide provides valuable information regarding exam day rules and information, as well as exam dates and deadlines. You can find the most recent version at ISACA.org
CISM Certified Information Security Manager Training Outline
Module 1: Information Security Governance
In this module, you will learn how to:
Establish and maintain an information security strategy and align the strategy with corporate governance
Identify internal and external influences to the organisation
Define roles and responsibilities
Establish, monitor, evaluate, and report metrics
Module 2: Information Risk Management and Compliance
In this module, you will learn how to:
Establish a process for information asset classification and ownership
Identify legal, regulatory, organisational, and other applicable requirements
Ensure that risk assessments, vulnerability assessments, and threat analyses are conducted periodically
Determine appropriate risk treatment options
Evaluate information security controls
Identify the gap between current and desired risk levels
Integrate information risk management into business and IT processes
Monitor existing risk
Report noncompliance and other changes in information risk
Module 3: Information Security Programme Development and Management
In this module, you will learn how to:
Establish and maintain the information security program
Identify, acquire, manage, and define requirements for internal and external resources
Establish and maintain information security architectures
Establish, communicate, and maintain organisational information security standards, procedures, and guidelines
Establish and maintain a programme for information security awareness and training
Integrate information security requirements into organisational processes, as well as into contracts and activities of third parties
Establish, monitor, and periodically report programme management and operational metrics
Module 4: Information Security Incident Management
In this module, you will learn how to:
Establish and maintain an organisational definition and severity hierarchy for information security incidents
Establish and maintain an incident response plan
Develop and implement processes to ensure timely identification of information security incidents
Establish and maintain processes to investigate and document information security incidents
Establish and maintain incident escalation and notification processes
Organise, train, and equip teams to effectively respond to information security incidents
Test and review the incident response plan periodically
Establish and maintain communication plans and processes
Conduct post-incident reviews
Establish and maintain integration among the incident response plan, disaster recovery plan, and business continuity plan
Learning Tree has helped more than 65,000 organisations and 2.5 million individuals worldwide develop the skills and earn the certifications necessary to support their careers and power organisational performance. Get started by exploring our enterprise solutions, services and capabilities.
Learn how to defend yourself and your organisation from the potentially devastating risks and types of cyber attacks that most businesses face. This 5-star rated training course equips you with practical strategies in just one day.
We believe that we have the right core elements to ensure that the key areas of a young persons life are covered to understand how we can all keep both their homelife and school life safer.
The Certified Secure Computer User Course is aimed at end users in order to educate them about the main threats to their data’s security. It also equips the students with the basic knowledge that helps them to keep their devices and data secure in daily life
This course provides you with an opportunity to study in the field of Computer Science through the context of Games Development & Cyber Security.
CISMP is for anyone wishing to progress their career in the rapidly expanding fields of Information Security, risk and cyber especially within the UK public sector.
© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy