Certified Information Security Manager

Home  /  No Categories

Certified Information Security Manager

Introduction

This Official ISACA Certified Information Security Manager (CISM) training course focuses on the construction, development, and governance of information security operations. Possession of this certification displays precise knowledge, practice, and copious amounts of experience in the realm of information security management. This CISM training course takes into account practical issues, like the creation of information security programs, and incident management, whilst promoting security practices used globally. CISM teaches delegates how to tailor ever-changing technology to their enterprises. This enables the enterprises to emerge as a valuable organisation and may expand their clientele due to their implementation of CISM certified individuals.

Benefits

  • Professional credibility and recognition enhanced
  • Career moved ahead rapidly
  • Cross-border peer networking boosted
  • Earning potential unleashed as CISM certification is among the highest paying IT and impactful certifications that an IT security professional can earn
  • Information security programme aligned with your business strategy to attain your organisation’s goals and objectives
  • IT security solutions adapted to your business processes based on the corporate culture, tone from the top, technology and organisational structure
  • Threat, vulnerability and risk-driven investments in your organisation’s information security initiatives validated

Who this course applies to: 

  • Security consultants and managers
  • IT directors and managers
  • Security auditors and architects
  • Security systems engineers
  • Chief Information Security Officers (CISOs)
  • Information security managers
  • IS/IT consultants
  • Chief Compliance/Privacy/Risk Officers

Learning Objectives

  • Prepare for and pass the Certified Information Security Manager (CISM) exam
  • Develop an information security strategy and plan of action to implement the strategy
  • Manage and monitor information security risks
  • Build and maintain an information security plan both internally and externally
  • Implement policies and procedures to respond to and recover from disruptive and destructive information security events

Structure of training

Domain 1 – Information Security Governance

  • Introduction to Information Security Governance
  • Effective Information Security Governance
  • Governance and Third Party Relationships
  • Information Security Metrics
  • Information Security Governance Metrics
  • Information Security Strategy
  • Information Security Strategy Development
  • Strategy Resources and Constraints
  • Other Frameworks
  • Compliances
  • Action Plans to Implement Strategy
  • Governance of Enterprise IT

Domain 2 – Information Risk Management and Compliance

  • Information Risk Management
  • Risk Management Overview
  • Risk Assessment
  • Information Asset Classification
  • Assessment Management
  • Information Resource Valuation
  • Recovery Time Objectives
  • Security Control Baselines
  • Risk Monitoring
  • Training and Awareness
  • Information Risk Management Documentation

Domain 3 – Information Security Program Development and Management

  • Information Security Program Management Overview
  • Information Security Program Objectives
  • Information Security Program Concepts
  • Information Security Program Technology Resources
  • Information Security Program Development
  • Information Security Program Framework
  • Information Security Program Roadmap
  • Enterprise Information Security Architecture (EISA)
  • Security Program Management and Administration
  • Security Program Services and Operational Activities
  • Controls
  • Security Program Metrics and Monitoring
  • Measuring Operational Performance
  • Common Information Security Program Challenges

Domain 4 – Information Security Incident Management

  • Incident Management Overview
  • Incident Management Procedures
  • Incident Management Resources
  • Incident Management Objectives
  • Incident Management Metrics and Indicators
  • Defining Incident Management Procedures
  • Business Continuity and Disaster Recovery Procedures
  • Post Incident Activities and Investigation
  • ISACA Code of Professional Ethics
  • Laws and Regulations
  • Policy Versus Law Within an Organisation
  • Ethics and the Internet IAB
  • Certified Information Security Manager

Additional Information 

For more information and pricing please reach out to us here or at https://www.cryptv-uk.com/contacts/ through our contacts page.

Date

Sep 26 - 29 2022
Expired!

More Info

Buy & Enrol Now
Buy & Enrol Now

Leave a Reply

Your email address will not be published. Required fields are marked *