CISM Certified Information Security Manager

by Pearce Mayfield Claim Listing

CISM Certified Information Security Manager course provides delegates with the knowledge and skills required to secure the information systems. The course introduces delegates to the various aspects such as risk management, information security programs and governance and incident management.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

Pearce Mayfield Logo

img Duration

Please Enquire

Course Details

CISM Certified Information Security Manager course provides delegates with the knowledge and skills required to secure the information systems. The course introduces delegates to the various aspects such as risk management, information security programs and governance and incident management and response. After attending the course, the delegates will learn how to align company’s objectives with the security system. 

 

Course Outline:

  • An Overview of Information Security Governance
  • Define Asset Identification
  • What is Risk Assessment?
  • What are the Vulnerability Assessments?
  • Define Asset Management
  • Summary of Information Risk Management
  • Define Asset Classification and Ownership
  • Process of Structured Information Risk Assessment
  • Assessments of Business Impact
  • What is Change Management?
  • An Introduction to Information Security Program Development and Management
  • What is Information Security Strategy
  • Program Alignment of Other Assurance Functions
  • Development of Information Security Architectures
  • Security Awareness, Training, and Education
  • Communication and Maintenance of Standards, Procedures, and Other Documentation
  • What is Change Control?
  • What are Lifecycle Activities?
  • Describe various Security Metrics
  • Information Security Program Management
  • An Overview of Security Program Management
  • Define Planning and Security Baselines
  • What are Business Processes?
  • What is Security Program Infrastructure?
  • Describe Lifecycle Procedures
  • What is Security Impact on Users?
  • Define Accountability and Security Metrics
  • Resources Management
  • An Overview of Incident Management and Response
  • An Overview of Response Management
  • What is the importance of Response Management
  • Analysis of Business Impact
  • Emerging Response and Recovery Plans
  • What is Incident Response Process?
  • Executing Response and Recovery Plans
  • Define Response Documentation
  • Reading Branch

    Reflex, Cain Road, Reading

Check out more CISM courses in UK

Nemstar Logo

CGEIT Certified in the Governance of Enterprise IT certification

Certified in the Governance of Enterprise IT (CGEIT) certification, certified professionals can enhance the strategic value they bring to organizations. CGEIT holders bring the knowledge and experience needed to align IT with business strategies and goals.

by Nemstar [Claim Listing ]
  • Price
  • Start Date
  • Duration
Glasgow Maritime Academy Logo

Maritime Cyber Security Training (MACSET)

The ISM Code, supported by the IMO Resolution MSC.428(98), requires ship owners and managers to assess cyber risk and implement relevant measures across all functions of their safety management system

by Glasgow Maritime Academy [Claim Listing ]
London IT Training (LIT) Logo

Comptia Cybersecurity Analyst (CYSA+) Training (CS0-002)

CySA+ course will also help the candidates learn and know how to take preventive measures against such data theft. CompTIA CySA+ training course is designed to prepare IT, security professionals, to master in cybersecurity, from the beginning to the professional level.

by London IT Training (LIT)
New College Lanarkshire Logo

HNC Cyber Security

HNC Cyber Security aims to give students a fundamental understanding of how to protect networks, IT systems and individuals against Cyber-attacks and Cyber threats. Cyber-security is a fast evolving area within business and government today, as online systems make up the foundations of the digital...

by New College Lanarkshire [Claim Listing ]
Right Turn Security Logo

Penetration Testing Training

This Training course can help the employees to detect and understand the vulnerabilities of their wireless system and measures to secure it. Penetration testing prevents organisations from attackers, which can compromise their wireless network and steal their valuable data

by Right Turn Security [Claim Listing ]

© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy