logo-img

Seat reservation

Oops! No seats reserved yet.
loading..



(603) 852 79 35 akasi-commercial@akasigroup.com 1, Tara boulevard # 101, Nashua NH 03062 United States
(603) 852 79 35 akasi-commercial@akasigroup.com 1, Tara boulevard # 101, Nashua NH 03062 United States

Course details

CISM Certified Information Security Manager

Course 00060

Description

In this course, you will gain the knowledge and skills needed to successfully pass the certification exam and become a CISM Certified Information Security Manager. This course will cover four CISM domains: security governance, risk management and compliance, security program development and management, security incident management. In addition to meeting ISACA’s certification requirements, passing the CISM Certification Exam meets U.S. DoD Directive 8140/8570.01 Management (IAM) Level-II, Management (IAM) Level-III and CSSP Manager requirements.

What you'll learn

  • Learn from ISACA official curriculum.
  • Receive an exam voucher from ISACA.
  • Prepare for and pass the Certified Information Security Manager (CISM) exam.
  • Develop an information security strategy and plan of action to implement the strategy.
  • Manage and monitor information security risks.
  • Build and maintain an information security plan.
  • Implement policies and procedures to respond to and recover from disruptive and destructive information security events.
  • Continue learning and face new challenges with after-course one-on-one instructor coaching.

Pre-requisites

  • • To succeed in this course and successfully pass the CISM exam, you should have at least five years of information security experience in at least one of the following roles:
  • • IT consultant, auditor, or manager
  • • Security policy writer
  • • Privacy officer
  • • Information security officer
  • • Network administrator
  • • Security device administrator
  • • Security engineers

Curriculum

In this module, you will learn how to:

Establish and maintain an information security strategy and align the strategy with corporate governance

Identify internal and external influences to the organization

Define roles and responsibilities

Establish, monitor, evaluate, and report metrics

In this module, you will learn how to:

Establish a process for information asset classification and ownership

Identify legal, regulatory, organizational, and other applicable requirements

Ensure that risk assessments, vulnerability assessments, and threat analyses are conducted periodically

Determine appropriate risk treatment options

Evaluate information security controls

Identify the gap between current and desired risk levels

Integrate information risk management into business and IT processes

Monitor existing risk

Report noncompliance and other changes in information risk

In this module, you will learn how to:

Establish and maintain the information security program

Identify, acquire, manage, and define requirements for internal and external resources

Establish and maintain information security architectures

Establish, communicate, and maintain organizational information security standards, procedures, and guidelines

Establish and maintain a program for information security awareness and training

Integrate information security requirements into organizational processes, as well as into contracts and activities of third parties

Establish, monitor, and periodically report program management and operational metrics

In this module, you will learn how to:

Establish and maintainizational definition and severity hierarchy for information security incidents

Establish and maintain an incident response plan

Develop and implement processes to ensure timely identification of information security incidents

Establish and maintain processes to investigate and document information security incidents

Establish and maintain incident escalation and notification processes

Organize, train, and equip teams to effectively respond to information security incidents

Test and review the incident response plan periodically

Establish and maintain communication plans and processes

Conduct post-incident reviews

Establish and maintain integration among the incident response plan, disaster recovery plan, and business continuity plan

Get this Course

3000,00 €


  • • 4 days instructor-led training course
  • • After-course coaching available

  • • No schedule defined yet