Microtek Learning Logo

CISM - Certified Information Security Manager Prep Course Training

4.8
(4.8)

CISM - Certified Information Security Manager Prep Course Training is designed to help people develop a good understanding of the relationship between information security programs and broader organizational objectives.

  • Category : ISACA

Course Price : $2395 Per Participant

Course Description

CISM - Certified Information Security Manager Prep Course Training is designed to help people develop a good understanding of the relationship between information security programs and broader organizational objectives.

It also educates and guides the candidates to attain the CISM qualification.

This certification is issued by ISACA to validate and analyze the candidate's expertise regarding the relationship between information security programs and broader business targets.

CISM certification is for experienced security management professionals who have decent work experience managing and developing information security programs.

This certification also validates that the professional has extensive knowledge of managing, developing, and implementing an information security program for a business organization.

CISM - Certified Information Security Manager Prep Course Training covers all the four domains of the CISM certification exam and helps IT security professionals gain more knowledge, enhance their skills, and increase their practical experience.

Microsoft Course Microsoft Course
500+

Courses

experience experience
20+

Years of Experience

learners learners
95K+

Global Learners

What you will learn

  • green-tick Information Security Program Management & Development.
  • green-tick Information Risk Management & Governance of Information Security.
  • green-tick Information Risk Compliance & Information Security Incident Management.

Who should attend this course?

This training is intended for professionals who have expert-level experience as an information security manager.

However, the target audience for this course are IT managers, IT Auditors security policy writers, security device administrators, information security officers, security engineers, privacy officers, and IT consultants. 

Schedules

Oops! For this course, there are currently no public schedules available. Clicking on "Notify Me" will allow you to express your interest.

For dates, times, and location customization of this course, get in touch with us.

You can also speak with a learning consultant by calling 800-961-0337.

Curriculum

  • Develop an information security strategy, aligned with business goals and directives.
  • Establish and maintain an information security governance framework.
  • Integrate information security governance into corporate governance.
  • Develop and maintain information security policies.
  • Develop business cases to support investments in information security.
  • Identify internal and external influences to the organization.
  • Gain ongoing commitment from senior leadership and other stakeholders.
  • Define, communicate and monitor information security responsibilities
  • Establish internal and external reporting and communication channels.
  • Establish and/or maintain a process for information asset classification to ensure that measures taken to protect assets are proportional to their business value.
  • Identify legal, regulatory, organizational and other applicable requirements to manage the risk of noncompliance to acceptable levels.
  • Ensure that risk assessments, vulnerability assessments and threat analyses are conducted consistently, and at appropriate times, to identify and assess risk to the organization's information.
  • Identify, recommend or implement appropriate risk treatment/response options to manage risk to acceptable levels based on organizational risk appetite.
  • Determine whether information security controls are appropriate and effectively manage risk to an acceptable level.
  • Facilitate the integration of information risk management into business and IT processes to enable a consistent and comprehensive information risk management program across the organization.
  • Monitor for internal and external factors (e.g., threat landscape, cybersecurity, geopolitical, regulatory change) that may require reassessment of risk to ensure that changes to existing or new risk scenarios are identified and managed appropriately.
  • Report noncompliance and other changes in information risk to facilitate the risk management decision-making process.
  • Ensure that information security risk is reported to senior management to support an understanding of potential impact on the organizational goals and objectives.
  • Develop a security program, aligned with information security strategy
  • Ensure alignment between the information security program and other business functions
  • Establish and maintain requirements for all resources to execute the IS program
  • Establish and maintain IS architectures to execute the IS program
  • Develop documentation that ensures compliance with policies
  • Develop a program for information security awareness and training
  • Integrate information security requirements into organizational processes
  • Integrate information security requirements into contracts and activities of third parties
  • Develop procedures (metrics) to evaluate the effectiveness and efficiency of the IS program
  • Compile reports to key stakeholders on overall effectiveness of the IS program and the underlying business processes in order to communicate security performance.
  • Define (types of) information security incidents
  • Establish an incident response plan
  • Develop processes for timely identification of information security incidents
  • Develop processes to investigate and document information security incidents
  • Develop incident escalation and communication processes
  • Establish teams that effectively respond to information security incidents
  • Test and review the incident response plan
  • Establish communication plans and processes
  • Determine the root cause of IS incidents
  • Align incident response plan with DRP and BCP.
  • About the Certifications

    This Certified Information Security Manager Certification (CISM) is a fundamental certification designed for IT professionals in the field security who know how to oversee, assess, design, and manage an enterprise information security. However, the CISM certification training is strictly associated with ISACA best practices that support in IT security systems.

    IT professionals will gain the essential skills to deploy, design and manage security architectures for the organization with the CISM Certification training from Microtek Learning. The CISM certification validates the in-depth understanding of the connections between business goals, objectives, and information security programs. Achieving the CISM certification is recognized as the best method to cover the paths starting from technologists in security to security managers. This certification is associated with the best ISACA practices and is renowned among skilled professionals who are interested in signing up for the certification. The Certified Information Security Managers are reliably renowned among the most skilled professionals working in risk management and information security field.

     

    Who Should Attend?

    The target audience of this certification are IT directors, security auditors, security system engineers, architects, CISOs, information security managers, risk officers and IT consultants.

    However, the professionals working in information technology security domain can also sign up for this certification course.

     

    Skills Measured

    If you want to achieve this CISM certification or become a CISM certified professional, you need to apply within five years starting from the day of passing the exam. You must ensure that your experiences can be autonomously be verified by your employer. It is also recommended to have three or five years of working experience as an Information Security Manager. Additionally, the work experience must be widespread in three out of four CISM domains.

     

    Certification Latest Updates

    The CPE- CISM continuing professional education policy necessitates that you should achieve a minimum of 20 CPE hours yearly and 120 CPE hours every three years.

    Course Details

    • cert cert-green
      Certification: YES
    • skill skill-green
      Skill Level: Intermediate
    • enroll enroll-green
      Enrolled: 1439
    • duration duration green
      Duration: 3 Days

    Talk to Learning Advisor