CISM Training Program

by ZebLearn Claim Listing

Zeblearn presents the CISM (Certified Information Security Manager) Training Program, focusing on strategic information security management. Master domains such as risk management, governance, incident response, and compliance.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

ZebLearn Logo

img Duration

45 Days

Course Details

Zeblearn presents the CISM (Certified Information Security Manager) Training Program, focusing on strategic information security management. Master domains such as risk management, governance, incident response, and compliance. Acquire hands-on skills for cybersecurity leadership roles. Enroll in Zeblearns CISM program to excel in managing information security effectively.

 

Course Content:

  • Domain 1 - Security Governance - Domain Weight 17%
  • CISM - Governance vs Management
  • CISM - Governance Committees
  • CISM - Corporate Structure
  • Keep Moving: Overcome Obstacles, Success is Your Ally!
  • CISM - Information Security Governance
  • CISM - Governance, Risk and Compliance (GRC) - Overview
  • Governance Quiz (7 questions)
  • CISM - Security Function
  • CISM - Security Program Stakeholders
  • CISM - RACI Matrix
  • Security Management Quiz (5 questions)
  • CISM - Strategy, Goals and Business Alignment
  • CISM - Gap Analysis Process
  • CISM - Strategy Implementation Constraints
  • CISM - Strategy Pitfalls and Bias
  • Strategy Quiz (6 questions)
  • CISM - Data Lifecycle
  • CISM - Data Retention and Disposal
  • CISM - IT Asset Management
  • Data/Asset Classification Quiz (8 questions)
  • CISM - Data Owner and Data Custodian
  • Data Roles Quiz (6 questions)
  • CISM - Feasibility Analysis and Business Case Presentation
  • CISM - Management Buy In
  • Management Support Quiz (6 questions)
  • CISM - Maturity Assessment Models and PDCA
  • CISM - Policies
  • CISM - Policy Development References, Top-down and Bottom-up Approach
  • CISM - Standards
  • CISM - Procedures and Guidelines
  • The Policies Development and Review
  • Policies, Standards, and Procedures Quiz (10 questions)
  • CISM - The Balanced Score Card (BSC)
  • Frameworks and How They Can Be Used
  • CISM - Cybersecurity Frameworks and Standards
  • Frameworks
  • Domain 2 - Information Security Risk Management Domain Weight 20%
  • Domain 3 - Information Security Program - Domain Weight 33%
  • Domain 4 - Incident Management - Domain Weight 30%
  • Noida Branch

    C-18, Sector-2, Noida
  • Gurgaon Branch

    NM 1, Sector – 14 Old DLF, Gurgaon

Check out more CISM courses in India

L.A Bootcamps Logo

Certification In Cyber Security

Cybersecurity is the practice of protecting systems, networks and programs from digital attacks. These attacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes.

by L.A Bootcamps [Claim Listing ]
CAPS Training Institute Logo

Cyber Security

At Caps Diploma Programme in Cybersecurity, Cybersecurity is the protection of Internet-connected systems, including hardware, software, and data from cyber attacks. It is made up of two words one is cyber and other is security.

by CAPS Training Institute [Claim Listing ]
DataCouch Logo

Cyber Security Best Practices

The Cybersecurity Best Practices course is an introductory course designed for anyone in the Engineering organization who is interested in becoming more security-minded in order to establish new security guidelines.

by DataCouch [Claim Listing ]
AETOS Logo

Cyber Security Specialist

Cyber Security Specialist course is offered by AETOS. Our training facilities with state-of-the-art equipment; experienced and qualified pool of trainers and consultants help to deliver unmatched services to clients.

by AETOS [Claim Listing ]
A2 Logic Group Logo

Cybersecurity

Cybersecurity is the practice of protecting computer systems, networks, and sensitive data from unauthorized access, theft, or damage. With the increasing use of technology in our daily lives, cybersecurity has become a critical concern for individuals, businesses, and governments. ​​​​​�...

by A2 Logic Group [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy