Name: Certified Information Security Manager (CISM)

Duration: 40Hrs (Generally done in 5 days)

Objectives: The CISM course is designed to teach professionals international security practices and expertise to manage designs, administer and assess IT security for organizations of every size and scale. Here you learn to build core competencies in maintaining and completely owning the security aspect of your organization’s IT. Students develop critical thinking skills and sound judgment to perform tasks required to achieve CISM certification. It is one of the most lucrative internationally acclaimed certifications with organizations offering high paying jobs to candidates who possess this credential.

Prerequisites:

  • Basic knowledge of Networking
  • Knowledge of server and network components

Training Delivery medium: Classroom, Live Virtual Instructor Led

Course Outline:

  • Domain 1—Information Security Governance
    • Establish and maintain an information security governance framework and supporting processes to ensure that the information security strategy is aligned with organizational goals and objectives, information risk is managed appropriately and program resources are managed responsibly.
    • methods to develop an information security strategy
    • the relationship among information security and business goals, objectives, functions, processes and practices
    • methods to implement an information security governance framework
    • the fundamental concepts of governance and how they relate to information security
    • methods to integrate information security governance into corporate governance
    • internationally recognized standards, frameworks and best practices related to information security governance and strategy development
    • methods to develop information security policies
    • methods to develop business cases
    • strategic budgetary planning and reporting methods
    • the internal and external influences to the organization (for example, technology, business environment, risk tolerance, geographic location, legal and regulatory requirements) and how they impact the information security strategy
    • methods to obtain commitment from senior management and support from other stakeholders for information security
    • information security management roles and responsibilities
    • organizational structures and lines of authority
    • methods to establish new, or utilize existing, reporting and communication channels throughout an organization
    • methods to select, implement and interpret metrics (for example, key goal indicators [KGIs], key performance indicators [KPIs], key risk indicators [KRIs])
  • Domain 2—Information Risk Management and Compliance
    • Manage information risk to an acceptable level to meet the business and compliance requirements of the organization.
    • methods to establish an information asset classification model consistent with business objectives
    • methods used to assign the responsibilities for and ownership of information assets and risk
    • methods to evaluate the impact of adverse events on the business
    • information asset valuation methodologies
    • legal, regulatory, organizational and other requirements related to information security
    • reputable, reliable and timely sources of information regarding emerging information security threats and vulnerabilities
    • events that may require risk reassessments and changes to information security program elements
    • information threats, vulnerabilities and exposures and their evolving nature
    • risk assessment and analysis methodologies
    • methods used to prioritize risk
    • risk reporting requirements (for example, frequency, audience, components)
    • methods used to monitor risk
    • risk treatment strategies and methods to apply them
    • control baseline modeling and its relationship to risk-based assessments
    • information security controls and countermeasures and the methods to analyze their effectiveness and efficiency
    • gap analysis techniques as related to information security
    • techniques for integrating risk management into business and IT processes
    • compliance reporting processes and requirements
    • cost/benefit analysis to assess risk treatment options
  • Domain 3—Information Security Program Development and Management
    • Establish and manage the information security program in alignment with the information security strategy.
    • methods to align information security program requirements with those of other business functions
    • methods to identify, acquire, manage and define requirements for internal and external resources
    • information security technologies, emerging trends, (for example, cloud computing, mobile computing) and underlying concepts
    • methods to design information security controls
    • information security architectures (for example, people, process, technology) and methods to apply them
    • methods to develop information security standards, procedures and guidelines
    • methods to implement and communicate information security policies, standards, procedures and guidelines
    • methods to establish and maintain effective information security awareness and training programs
    • methods to integrate information security requirements into organizational processes
    • methods to incorporate information security requirements into contracts and third-party management processes
    • methods to design, implement and report operational information security metrics
    • methods for testing the effectiveness and applicability of information security controls
  • Domain 4—Information Security Incident Management
    • Plan, establish and manage the capability to detect, investigate, respond to and recover from information security incidents to minimize business impact.
    • the components of an incident response plan
    • incident management concepts and practices
    • business continuity planning (BCP) and disaster recovery planning (DRP) and their relationship to the incident response plan
    • incident classification methods
    • damage containment methods
    • notification and escalation processes
    • the roles and responsibilities in identifying and managing information security incidents
    • the types and sources of tools and equipment required to adequately equip incident response teams
    • forensic requirements and capabilities for collecting, preserving and presenting evidence (for example, admissibility, quality and completeness of evidence, chain of custody)
    • internal and external incident reporting requirements and procedures
    • post-incident review practices and investigative methods to identify root causes and determine corrective actions
    • techniques to quantify damages, costs and other business impacts arising from information security incidents
    • technologies and processes that detect, log and analyze information security events
    • internal and external resources available to investigate information security incidents

Contact Us

    © Copyright 2015. All Rights Reserved.

    Contact Us
    close slider