CISM Examination Preparation Course

by DataCouch Claim Listing

The Certificate Information Security Manager (CISM) by ISACA is designed to provide executive management with assurance that those earning the designation have the required knowledge and ability to provide effective information security management and consulting.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

DataCouch Logo

img Duration

3 Days

Course Details

The Certificate Information Security Manager (CISM) by ISACA is designed to provide executive management with assurance that those earning the designation have the required knowledge and ability to provide effective information security management and consulting.

While the central focus of the CISM certification is information security management, all those in the IT profession with security experience will certainly find value in the CISM.

This course covers the complete curriculum of CISM and aims to provide deep knowledge on all domains of CISM including information security governance, program development and management, incident management and risk management.

This course aims to provide sufficient knowledge to a candidate which eventually add credibility and confidence in candidate’s interactions with internal and external stakeholders, peers, and regulators.

The CISM brings credibility to the team and ensures alignment between the organization’s information security program and its broader goals and objectives. CISM can validate team’s commitment to compliance, security and integrity and increase customer retention.

 

Curriculum:

  • Information Security Governance
  • Enterprise Governance
  • Organizational Culture
  • Legal, Regulatory, and Contractual Requirements
  • Organizational Structures, Roles, and Responsibilities
  • Information Security Strategy
  • Information Security Strategy Development
  • Information Governance Frameworks and Standards
  • Strategic Planning (e.g., budgets, resources, business case)
  • Information Security Risk Management
  • Information Security Risk Assessment
  • Emerging Risk and Threat Landscape
  • Vulnerability and Control Deficiency Analysis
  • Risk Assessment and Analysis
  • Information Security Risk Response
  • Risk Treatment / Risk Response Options
  • Risk and Control Ownership
  • Risk Monitoring and Reporting
  • Information Security Program
  • Information Security Program Development
  • Information Security Program Resources (e.g., people, tools, technologies)
  • Information Asset Identification and Classification
  • Industry Standards and Frameworks for Information Security
  • Information Security Policies, Procedures, and Guidelines
  • Information Security Program Metrics
  • Information Security Program Management
  • Information Security Control Design and Selection
  • Information Security Control Implementation and Integrations
  • Information Security Control Testing and Evaluation
  • Information Security Awareness and Training/td>
  • Management of External Services (e.g., providers, suppliers, third parties, fourth parties)
  • Information Security Program Communications and Reporting
  • Incident Management
  • Incident Management Readiness
  • Incident Response Plan
  • Business Impact Analysis (BIA)
  • Business Continuity Plan (BCP)
  • Disaster Recovery Plan (DRP)
  • Incident Classification/Categorization
  • Incident Management Training, Testing, and Evaluation
  • Incident Management Operations
  • Incident Management Tools and Techniques
  • Incident Investigation and Evaluation
  • Incident Containment Methods
  • Incident Response Communications (e.g., reporting, notification, escalation)
  • Incident Eradication and Recovery
  • Post-incident Review Practices

 

Prerequisites

  • Understanding on IT Infrastructure, computer science fundamentals and networking terminologies.
  • Basic understanding on management part of IT infrastructure, information systems, IT teams etc. could be an advantage.
  • Familiarity with day-to-day information Security terminologies, however not mandatory because it will be covered in day 1 of training
  • Mohali Branch

    #7, LOWER GROUND, SBC EL COMMERCIO CITY CENTRE, Mohali

Check out more CISM courses in India

Zeetron Networks Logo

Cyber Security Training

In the technology world, where everything is changing and getting updated day by day, the craze and least availability of Cyber Security Training in Jaipur or in India have always been the same.

by Zeetron Networks [Claim Listing ]
Routing Switching Tigers Logo

Certified Information Security Manager (CISM)

This course is designed for anyone seeking The Certified Information Security Manager (CISM) certification. This comprehensive course covers general topics such as risk management, incident response, information security governance, compliance, and performance measurement.

by Routing Switching Tigers [Claim Listing ]
  • Price
  • Start Date
  • Duration
Cyber Hunterz Logo

Digital Forensics

Due to the escalation of computer crimes, there is a need for investigations. There is a need for law enforcement and private investigators who specialise in digital forensics. Need for best digital forensic courses in Lucknow is a must. There is growing demand for digital forensics certificates.

by Cyber Hunterz [Claim Listing ]
H.B. Institute Logo

Cybersecurity

Cybersecurity course is offered by H.B. Institute. We offer a variety of high-quality courses designed to prepare you for your next step. We offer placement tests to help match you to your skill level.

by H.B. Institute [Claim Listing ]
Sai Info Solution Logo

Network Security

Network Security course is offered by Sai Info Solution. Network security is any activity designed to protect the usability and integrity of your network and data. It includes both hardware and software technologies.

by Sai Info Solution [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy