CISM Examination Preparation Course

by DataCouch Claim Listing

The Certificate Information Security Manager (CISM) by ISACA is designed to provide executive management with assurance that those earning the designation have the required knowledge and ability to provide effective information security management and consulting.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

DataCouch Logo

img Duration

3 Days

Course Details

The Certificate Information Security Manager (CISM) by ISACA is designed to provide executive management with assurance that those earning the designation have the required knowledge and ability to provide effective information security management and consulting.

While the central focus of the CISM certification is information security management, all those in the IT profession with security experience will certainly find value in the CISM.

This course covers the complete curriculum of CISM and aims to provide deep knowledge on all domains of CISM including information security governance, program development and management, incident management and risk management.

This course aims to provide sufficient knowledge to a candidate which eventually add credibility and confidence in candidate’s interactions with internal and external stakeholders, peers, and regulators.

The CISM brings credibility to the team and ensures alignment between the organization’s information security program and its broader goals and objectives. CISM can validate team’s commitment to compliance, security and integrity and increase customer retention.

 

Curriculum:

  • Information Security Governance
  • Enterprise Governance
  • Organizational Culture
  • Legal, Regulatory, and Contractual Requirements
  • Organizational Structures, Roles, and Responsibilities
  • Information Security Strategy
  • Information Security Strategy Development
  • Information Governance Frameworks and Standards
  • Strategic Planning (e.g., budgets, resources, business case)
  • Information Security Risk Management
  • Information Security Risk Assessment
  • Emerging Risk and Threat Landscape
  • Vulnerability and Control Deficiency Analysis
  • Risk Assessment and Analysis
  • Information Security Risk Response
  • Risk Treatment / Risk Response Options
  • Risk and Control Ownership
  • Risk Monitoring and Reporting
  • Information Security Program
  • Information Security Program Development
  • Information Security Program Resources (e.g., people, tools, technologies)
  • Information Asset Identification and Classification
  • Industry Standards and Frameworks for Information Security
  • Information Security Policies, Procedures, and Guidelines
  • Information Security Program Metrics
  • Information Security Program Management
  • Information Security Control Design and Selection
  • Information Security Control Implementation and Integrations
  • Information Security Control Testing and Evaluation
  • Information Security Awareness and Training/td>
  • Management of External Services (e.g., providers, suppliers, third parties, fourth parties)
  • Information Security Program Communications and Reporting
  • Incident Management
  • Incident Management Readiness
  • Incident Response Plan
  • Business Impact Analysis (BIA)
  • Business Continuity Plan (BCP)
  • Disaster Recovery Plan (DRP)
  • Incident Classification/Categorization
  • Incident Management Training, Testing, and Evaluation
  • Incident Management Operations
  • Incident Management Tools and Techniques
  • Incident Investigation and Evaluation
  • Incident Containment Methods
  • Incident Response Communications (e.g., reporting, notification, escalation)
  • Incident Eradication and Recovery
  • Post-incident Review Practices

 

Prerequisites

  • Understanding on IT Infrastructure, computer science fundamentals and networking terminologies.
  • Basic understanding on management part of IT infrastructure, information systems, IT teams etc. could be an advantage.
  • Familiarity with day-to-day information Security terminologies, however not mandatory because it will be covered in day 1 of training
  • Mohali Branch

    #7, LOWER GROUND, SBC EL COMMERCIO CITY CENTRE, Mohali

Check out more CISM courses in India

SSDN Technologies Logo

Checkpoint Certified Security Administrator Training

The Check Point Security Administrator (CCSA) R80.20 is a course that has been aimed to provide the learners with an insight of basic skills and concepts that are required to configure and manage Check Point Security Gateway and Managing Software Blades.

by SSDN Technologies
Shikshaa Simple Learn Logo

Cyber security

Information and data privacy breaches are a few of the top issues that companies, governments, other institutions, and even individuals are facing every second.

by Shikshaa Simple Learn
Indian Institute of Computer Learning Logo

Cyber Security

Cyber Security course is offered by Indian Institute of Computer Learning for all skill level. IICL faculty are full time, qualified and friendly professionals always there to guide the students, specially trained to understand students psychology, internalize the knowledge uniformly.

by Indian Institute of Computer Learning [Claim Listing ]
InfosecTrain Logo

CCISO Certification Training

EC-Council’s CCISO certification validates a candidate’s expertise in addressing real-world challenges in information security and verifies their readiness to assume the role of the top executive responsible for information security within an organization.

by InfosecTrain [Claim Listing ]
Nux Software Solutions Logo

Certified Information Security Manager ISACA

Nux software Training & Certification Solutions in Coimbatore is truly committed to providing a top-notch learning experience. The emphasis on advanced training programs, hands-on experience, expert trainers, and flexible training options, including live project and industrial training.

by Nux Software Solutions [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy