Certified Information Security Manager (CISM)
Course Details
- College of Management and IT (CMIT)
- Nationwide
- Computers and IT Training
- on request
- Online Courses - Distance Learning
- 12 Months
- Continuous Intake
Course Description
Course Details
Designed for experienced information security professionals, the CISM designation is a ground breaking credential earned by nearly 21,400 professionals since it was established in 2002. The management-focused CISM is the globally accepted standard for individuals who develop, build and manage enterprise information security programs. The CISM certification promotes international practices and provides executive management with assurance that those earning the designation have the required experience and knowledge to provide effective security management and consulting services. The demand for skilled information security management professionals is on the rise, get the certification that distinguishes you as having knowledge and experience in the development and management of an information security program.
This course includes the following features:
Instructor-led demonstrations and visual presentations that you to develop your skills based on real world scenarios.
Unlike a live class, you can fast-forward, repeat or rewind all your lectures. This gives you all the benefit of hands-on training with the flexibility of doing it around your schedule 24/7.
Flash Cards and Education Games are also provided throughout the course.
Practice exams prepare you for your exams. These exams are on average 100 questions to ensure you are 100% prepared if you are taking a certification exam.
You can also interact and collaborate with other students through our forums, student contributions and announcement features.
Topics Covered in this Course
Information Security Governance, and the chapters under this domain are:
Tasks and knowledge statements
Information security governance
Effective information security governance
Information Security concepts and technologies
Scope and charter of information security governance
Information Strategy overview
Information security strategy development
Information Risk Management and Compliance, and the chapters under this domain are:
Tasks and Knowledge Statements
Introduction to risk management
Information classification
Information asset valuation methodologies
Legal, regulatory and organizational compliance
Risk Assessment
Risk Response Techniques
Controls
Business Impact Analysis
Enterprise risk management methodologies
Risk Monitoring and communication
Information Security Program Development and Management, and the chapters under this domain are:
Tasks and Knowledge Statements
Information Security Program management overview
Information Security program objectives
Information Security program concepts
Scope and charter of an Information Security program
Information security management framework
Information security framework components
Defining an information security program road map
Information security infrastructure and architecture
Architecture implementation
Security program management and administrative activities
Security program services and operational activities
Controls and counter measures
Security program metrics and monitoring
Information Security Incident Management, and the chapters under this domain are:
Tasks and Knowledge Statements
Incident management overview
Incident response procedures
Information Security Manager
Incident management resources
Incident management objectives
Incident management metrics and indicators
Defining incident management procedures
Current state of incident response capability
Developing an incident response plan
Business continuity and disaster recovery procedures
Testing incident response and business continuity/disaster recovery procedures
Executing response and recovery plans
Who should complete this course?
People who work in the following job roles:
Information Security Governance
Information Risk Management and Compliance
Information Security Program Development and Management
Information Security Incident Management.
Entry Requirements / Prerequisites
None.
Assessment
Following completion of the online assessment you will receive a Certificate in Information Security from College of Management and IT (CMIT).
You may optionally take an online exam to apply for CSIM certification. This is assessed through multiple choice exam. Exam fees are not included in the course price
Technical Requirements
Broadband internet connection.
Browser – we recommend Chrome or Safari for Tablet or Apple Mac; and Firefox or Internet Explorer for PC hardware.
Operating System – PC (Windows XP, Vista, 7 or 8), Mac or Android.
Accreditation
You may optionally take exams to receive CISM certification. This is assessed through computer-based multiple choice exams (ISACA-CISM). Exam fees are not included in the course price.