CISM Certified Information Security Manager

by Pearce Mayfield Claim Listing

CISM Certified Information Security Manager course provides delegates with the knowledge and skills required to secure the information systems. The course introduces delegates to the various aspects such as risk management, information security programs and governance and incident management.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

Pearce Mayfield Logo

img Duration

Please Enquire

Course Details

CISM Certified Information Security Manager course provides delegates with the knowledge and skills required to secure the information systems. The course introduces delegates to the various aspects such as risk management, information security programs and governance and incident management and response. After attending the course, the delegates will learn how to align company’s objectives with the security system. 

 

Course Outline:

  • An Overview of Information Security Governance
  • Define Asset Identification
  • What is Risk Assessment?
  • What are the Vulnerability Assessments?
  • Define Asset Management
  • Summary of Information Risk Management
  • Define Asset Classification and Ownership
  • Process of Structured Information Risk Assessment
  • Assessments of Business Impact
  • What is Change Management?
  • An Introduction to Information Security Program Development and Management
  • What is Information Security Strategy
  • Program Alignment of Other Assurance Functions
  • Development of Information Security Architectures
  • Security Awareness, Training, and Education
  • Communication and Maintenance of Standards, Procedures, and Other Documentation
  • What is Change Control?
  • What are Lifecycle Activities?
  • Describe various Security Metrics
  • Information Security Program Management
  • An Overview of Security Program Management
  • Define Planning and Security Baselines
  • What are Business Processes?
  • What is Security Program Infrastructure?
  • Describe Lifecycle Procedures
  • What is Security Impact on Users?
  • Define Accountability and Security Metrics
  • Resources Management
  • An Overview of Incident Management and Response
  • An Overview of Response Management
  • What is the importance of Response Management
  • Analysis of Business Impact
  • Emerging Response and Recovery Plans
  • What is Incident Response Process?
  • Executing Response and Recovery Plans
  • Define Response Documentation
  • Reading Branch

    Reflex, Cain Road, Reading

© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy