CISM Examination Preparation Course

by DataCouch Claim Listing

The Certificate Information Security Manager (CISM) by ISACA is designed to provide executive management with assurance that those earning the designation have the required knowledge and ability to provide effective information security management and consulting.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

DataCouch Logo

img Duration

3 Days

Course Details

The Certificate Information Security Manager (CISM) by ISACA is designed to provide executive management with assurance that those earning the designation have the required knowledge and ability to provide effective information security management and consulting.

While the central focus of the CISM certification is information security management, all those in the IT profession with security experience will certainly find value in the CISM.

This course covers the complete curriculum of CISM and aims to provide deep knowledge on all domains of CISM including information security governance, program development and management, incident management and risk management.

This course aims to provide sufficient knowledge to a candidate which eventually add credibility and confidence in candidate’s interactions with internal and external stakeholders, peers, and regulators.

The CISM brings credibility to the team and ensures alignment between the organization’s information security program and its broader goals and objectives. CISM can validate team’s commitment to compliance, security and integrity and increase customer retention.

 

Curriculum:

  • Information Security Governance
  • Enterprise Governance
  • Organizational Culture
  • Legal, Regulatory, and Contractual Requirements
  • Organizational Structures, Roles, and Responsibilities
  • Information Security Strategy
  • Information Security Strategy Development
  • Information Governance Frameworks and Standards
  • Strategic Planning (e.g., budgets, resources, business case)
  • Information Security Risk Management
  • Information Security Risk Assessment
  • Emerging Risk and Threat Landscape
  • Vulnerability and Control Deficiency Analysis
  • Risk Assessment and Analysis
  • Information Security Risk Response
  • Risk Treatment / Risk Response Options
  • Risk and Control Ownership
  • Risk Monitoring and Reporting
  • Information Security Program
  • Information Security Program Development
  • Information Security Program Resources (e.g., people, tools, technologies)
  • Information Asset Identification and Classification
  • Industry Standards and Frameworks for Information Security
  • Information Security Policies, Procedures, and Guidelines
  • Information Security Program Metrics
  • Information Security Program Management
  • Information Security Control Design and Selection
  • Information Security Control Implementation and Integrations
  • Information Security Control Testing and Evaluation
  • Information Security Awareness and Training/td>
  • Management of External Services (e.g., providers, suppliers, third parties, fourth parties)
  • Information Security Program Communications and Reporting
  • Incident Management
  • Incident Management Readiness
  • Incident Response Plan
  • Business Impact Analysis (BIA)
  • Business Continuity Plan (BCP)
  • Disaster Recovery Plan (DRP)
  • Incident Classification/Categorization
  • Incident Management Training, Testing, and Evaluation
  • Incident Management Operations
  • Incident Management Tools and Techniques
  • Incident Investigation and Evaluation
  • Incident Containment Methods
  • Incident Response Communications (e.g., reporting, notification, escalation)
  • Incident Eradication and Recovery
  • Post-incident Review Practices

 

Prerequisites

  • Understanding on IT Infrastructure, computer science fundamentals and networking terminologies.
  • Basic understanding on management part of IT infrastructure, information systems, IT teams etc. could be an advantage.
  • Familiarity with day-to-day information Security terminologies, however not mandatory because it will be covered in day 1 of training
  • Mohali Branch

    #7, LOWER GROUND, SBC EL COMMERCIO CITY CENTRE, Mohali

Check out more CISM courses in India

Palmeto Logo

Certified Information Systems Security Professional (CISSP)

Certified Information Systems Security Professional (CISSP) course is offered by Palmeto. We help organizations train and build the skills to transform their performance. Our training deliverables built on years of unique relationships with leading organizations.

by Palmeto [Claim Listing ]
Itronix Solutions Logo

Cyber Security Course

Cybersecurity refers to the practice of protecting computer systems, networks, programs, and data from digital attacks, unauthorized access, damage, or theft. It encompasses a range of technologies, processes, and practices designed to safeguard devices.

by Itronix Solutions [Claim Listing ]
Blue Shell Technologies Logo

CRISC

Organizations face rising cybersecurity and information system risks in today’s rapidly changing digital environment. Professionals with specialized training and knowledge are in high demand to manage these risks effectively.

by Blue Shell Technologies [Claim Listing ]
AIIT Computer Education Logo

Cyber Security

Cyber Security course is offered by AIIT Computer Education for all skill level.

by AIIT Computer Education [Claim Listing ]
IEST Computer Academy Logo

Cybersecurity Training

With the increasing importance of cybersecurity, many Computer Academies provide courses in cybersecurity, teaching students how to protect computer systems and networks from cyber threats.

by IEST Computer Academy [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy