College of Management and IT (CMIT)Certified Information Security Manager (CISM)

Certified Information Security Manager (CISM)

Area:
Nationwide
Price:
on request
Duration:
12 Months
Type:
Online Courses - Distance Learning
Start date: Continuous Intake

Course description

Course Details

Designed for experienced information security professionals, the CISM designation is a ground breaking credential earned by nearly 21,400 professionals since it was established in 2002. The management-focused CISM is the globally accepted standard for individuals who develop, build and manage enterprise information security programs.  The CISM certification promotes international practices and provides executive management with assurance that those earning the designation have the required experience and knowledge to provide effective security management and consulting services. The demand for skilled information security management professionals is on the rise, get the certification that distinguishes you as having knowledge and experience in the development and management of an information security program.

This course includes the following features:

Instructor-led demonstrations and visual presentations that you to develop your skills based on real world scenarios.

Unlike a live class, you can fast-forward, repeat or rewind all your lectures. This gives you all the benefit of hands-on training with the flexibility of doing it around your schedule 24/7.

Flash Cards and Education Games are also provided throughout the course.

Practice exams prepare you for your exams. These exams are on average 100 questions to ensure you are 100% prepared if you are taking a certification exam.

You can also interact and collaborate with other students through our forums, student contributions and announcement features.

 

Topics Covered in this Course

Information Security Governance, and the chapters under this domain are:

Tasks and knowledge statements

Information security governance

Effective information security governance

Information Security concepts and technologies

Scope and charter of information security governance

Information Strategy overview

Information security strategy development

Information Risk Management and Compliance, and the chapters under this domain are:

Tasks and Knowledge Statements

Introduction to risk management

Information classification

Information asset valuation methodologies

Legal, regulatory and organizational compliance

Risk Assessment

Risk Response Techniques

Controls

Business Impact Analysis

Enterprise risk management methodologies

Risk Monitoring and communication

Information Security Program Development and Management, and the chapters under this domain are:

Tasks and Knowledge Statements

Information Security Program management overview

Information Security program objectives

Information Security program concepts

Scope and charter of an Information Security program

Information security management framework

Information security framework components

Defining an information security program road map

Information security infrastructure and architecture

Architecture implementation

Security program management and administrative activities

Security program services and operational activities

Controls and counter measures

Security program metrics and monitoring

Information Security Incident Management, and the chapters under this domain are:

Tasks and Knowledge Statements

Incident management overview

Incident response procedures

Information Security Manager

Incident management resources

Incident management objectives

Incident management metrics and indicators

Defining incident management procedures

Current state of incident response capability

Developing an incident response plan

Business continuity and disaster recovery procedures

Testing incident response and business continuity/disaster recovery procedures

Executing response and recovery plans

 

Who should complete this course?

People who work in the following job roles:

Information Security Governance

Information Risk Management and Compliance

Information Security Program Development and Management

Information Security Incident Management.

 

Entry Requirements / Prerequisites

None.

 

Assessment

Following completion of the online assessment you will receive a Certificate in Information Security from College of Management and IT (CMIT).

You may optionally take an online exam to apply for CSIM certification. This is assessed through multiple choice exam. Exam fees are not included in the course price

 

Technical Requirements

Broadband internet connection.

Browser – we recommend Chrome or Safari for Tablet or Apple Mac; and Firefox or Internet Explorer for PC hardware.

Operating System – PC (Windows XP, Vista, 7 or 8), Mac or Android.

 

Accreditation

You may optionally take exams to receive CISM certification. This is assessed through computer-based multiple choice exams (ISACA-CISM). Exam fees are not included in the course price.

 


Course Enquiry

* I have read & agree to Findacourse privacy policy
Receive monthly updates about courses & colleges (unsubscribe at any time)