Certified Information Security Manager(CISM)
-
COURSE DATES AND LOCATIONS
DATE
Duration
LOCATION
FEES
Book Now
-
INTRODUCTION
The Certified Information Security Manager (CISM) course helps the candidates to achieve the CISM certification. The certification is offered by the Information Systems Audit and Control Association (ISACA) to validate the expertise and knowledge of the candidates regarding the relationship between an information security program and the broader business targets. The certification also validates that the candidate has the hands-on knowledge of developing, managing and implementing an information security program for an organization.
-
COURSE OBJECTIVES
ISACA’s Certified Information Security Manager (CISM) certification Training course indicates expertise in information security governance, program development and management, incident management and risk management.
The CISM Training course is designed to teach professionals international security practices and expertise to manage designs, administer and assess IT security for organizations of every size and scale.
By the end of the course, you‘ll be able to:
- Become a Strategic Enterprise Security Leader
- Take your career out of the technical realm to management, with CISM Certification Training Course.
- Learn to build core competencies in maintaining and completely owning the security aspect of your organization’s IT.
-
COURSE AUDIENCE
This course is made for :
- Experienced information security managers and officers
- IT consultants and managers
- IT auditors
- IT security policy makers
- Privacy officers
- Network administrators
- Network security engineers
- Candidates seeking CISM certification
-
COURSE OUTLINE
Day One
- Affirms the expertise to establish and/or maintain an information security governance framework to ensure that the information security strategy is aligned with organizational goals and objectives.
Day Two
- Domain 1 confirms your ability to develop and oversee an information security governance framework to guide activities that support the information security strategy.
Day Three
- Managing Information Risk—proficiency
- In this key realm denotes advanced ability to manage information risk to an acceptable level, in accordance with organizational risk appetite, while facilitating the attainment of organizational goals and objectives.
- Domain 2 demonstrates expertise in classifying information assets to ensure measures taken to protect those assets are proportional to their business value.
Day Four
- Developing and Managing an Information Security Program
- Establishes ability to develop and maintain an information security program that identifies, manages and protects the organization’s assets while aligning with business goals.
- Domain 3 attests to ability to ensure the information security program adds value while supporting operational objectives of other business functions.
Day Five
- Information Security Incident Management
- Domain 4 validates capacity to plan, establish and manage detection, investigation, response and recovery from information security incidents in order to minimize business impact.
Domain 5 establishes your skills in accurately classifying and categorizing information security incidents and developing plans to ensure timely and effective response.