title
Please take a moment to fill out this form. We will get back to you as soon as possible.
All fields marked with an asterisk (*) are mandatory.
Certified Information Security Manager (CISM)
Course Description
Overview
In this course, you will gain the knowledge and skills needed to successfully pass the certification exam and become a CISM Certified Information Security Manager.This course will cover four CISM domains:
- Security governance
- Risk management and compliance
- Security programme development and management
- Security incident management
Objectives
Prerequisites
-
To succeed in this course and successfully pass the CISM exam, you should have at least five years of information security experience in at least one of the following roles:
- IT consultant, auditor, or manager
- Security policy writer
- Privacy officer
- Information security officer
- Network administrator
- Security device administrator
- Security engineers
Topics
- Establish and maintain an information security strategy and align the strategy with corporate governance
- Identify internal and external influences to the organisation
- Define roles and responsibilities
- Establish, monitor, evaluate, and report metrics
- Establish a process for information asset classification and ownership
- Identify legal, regulatory, organisational, and other applicable requirements
- Ensure that risk assessments, vulnerability assessments, and threat analyses are conducted periodically
- Determine appropriate risk treatment options
- Evaluate information security controls
- Identify the gap between current and desired risk levels
- Integrate information risk management into business and IT processes
- Monitor existing risk
- Report noncompliance and other changes in information risk
- Establish and maintain the information security program
- Identify, acquire, manage, and define requirements for internal and external resources
- Establish and maintain information security architectures
- Establish, communicate, and maintain organisational information security standards, procedures, and guidelines
- Establish and maintain a programme for information security awareness and training
- Integrate information security requirements into organisational processes, as well as into contracts and activities of third parties
- Establish, monitor, and periodically report programme management and operational metrics
- Establish and maintain an organisational definition and severity hierarchy for information security incidents
- Establish and maintain an incident response plan
- Develop and implement processes to ensure timely identification of information security incidents
- Establish and maintain processes to investigate and document information security incidents
- Establish and maintain incident escalation and notification processes
- Organise, train, and equip teams to effectively respond to information security incidents
- Test and review the incident response plan periodically
- Establish and maintain communication plans and processes
- Conduct post-incident reviews
- Establish and maintain integration among the incident response plan, disaster recovery plan, and business continuity plan
Self-Paced Training Info
Learn at your own pace with anytime, anywhere training
- Same in-demand topics as instructor-led public and private classes.
- Standalone learning or supplemental reinforcement.
- e-Learning content varies by course and technology.
- View the Self-Paced version of this outline and what is included in the SPVC course.
- Learn more about e-Learning
Course Added To Shopping Cart
bla
bla
bla
bla
bla
bla
Self-Paced Training Terms & Conditions
Exam Terms & Conditions
Sorry, there are no classes that meet your criteria.
Please contact us to schedule a class.

STOP! Before You Leave
Save 0% on this course!
Take advantage of our online-only offer & save 0% on any course !
Promo Code skip0 will be applied to your registration
Purchase Information
title
Please take a moment to fill out this form. We will get back to you as soon as possible.
All fields marked with an asterisk (*) are mandatory.