fbpx
E-learning duration:
E-learning language:
32 lessons
English
E-learning price:
1 085 500 HUF + VAT

The Certified Information Security Manager (CISM) Training equips professionals with the skills and knowledge to safeguard valuable information assets. It is a highly relevant and crucial discipline in a technology-driven landscape. CISM, offered by ISACA, is a globally recognized certification that ensures individuals are well-versed in managing and governing an organization's information security.

The CISM Course is a globally recognised certification focusing on developing a professional’s expertise in managing Information Security systems and practices. This course can be beneficial for professionals, including:

  • Information Security Managers
  • Internal Auditors
  • Risk Management Specialists
  • Compliance Officers
  • Security Analysts
  • IT Consultants
  • Data Protection Officers

There are no formal prerequisites for this CISM Certified Information Systems Manager Course. However, a basic understanding of Information Security and experience in job roles related to it can be beneficial for delegates.

CISM (Certified Information Security Manager) is a globally recognized certification validating expertise in designing and managing information security programs. It emphasises skills in risk management, governance, and strategic alignment.

Proficiency in the CISM Training Course is vital as it empowers professionals to navigate the complex landscape of Information Security, ensuring the confidentiality, integrity, and availability of data. IT and Cybersecurity Experts, Risk Managers, Compliance Officers, and those aspiring to lead and manage information security teams should aim to master CISM.

Delegates will gain expertise in risk management, governance, incident response, and security development. Through real-world case studies and practical exercises, delegates will learn how to apply their knowledge effectively, making them invaluable assets to their organizations.

Course Objectives

  • To understand the core principles of Information Security governance
  • To learn to develop and manage an Information Security aligned with business objectives
  • To master risk management processes to safeguard an organization's assets
  • To acquire skills for incident response and recovery
  • To gain the ability to establish and maintain Information Security policies and procedures
  • To develop the competence to align Information Security with regulatory and compliance requirements
  • To learn how to manage and govern Information Security teams effectively
  • To prepare for the CISM exam and enhance their career prospects

After completing this CISM Training and passing the certification exam, delegates will be recognized as Certified Information Security Managers. This globally respected certification demonstrates their expertise in Information Security management and opens up numerous career opportunities.

Domain 1: Information Security Governance

Module 1: Introduction to Information Security Governance

  • About Information Security Governance
  • Reason for Security Governance
  • Security Governance Activities and Results
  • Risk Appetite
  • Organization Culture


Module 2: Legal, Regulatory and Contractual Requirements

  • Introduction
  • Requirements for Content and Retention of Business Records


Module 3: Organizational Structures, Roles and Responsibilities

  • Roles and Responsibilities
  • Monitoring Responsibilities


Module 4: Information Security Strategy Development

  • Introduction
  • Business Goals and Objectives
  • Information Security Strategy Objectives
  • Ensuring Objective and Business Integration
  • Avoiding Common Pitfalls and Bias
  • Desired State
  • Elements of a Strategy


Module 5: Information Governance Frameworks and Standards

  • Security Balanced Scorecard
  • Architectural Approaches
  • Enterprise Risk Management Framework
  • Information Security Management Frameworks and Models


Module 6: Strategic Planning

  • Workforce Composition and Skills
  • Assurance Provisions
  • Risk Assessment and Management
  • Action Plan to Implement Strategy
  • Information Security Program Objectives


Domain 2: Information Security Risk Management

Module 7: Emerging Risk and Threat Landscape

  • Risk Identification
  • Threats
  • Defining a Risk Management Framework
  • Emerging Threats
  • Risk, Likelihood and Impact
  • Risk Register


Module 8: Vulnerability and Control Deficiency Analysis

  • Introduction
  • Security Control Baselines
  • Events Affecting Security Baselines


Module 9: Risk Assessment and Analysis

  • Introduction
  • Determining the Risk Management Context
  • Operational Risk Management
  • Risk Management Integration with IT Life Cycle Management Processes
  • Risk Scenarios
  • Risk Assessment Process
  • Risk Assessment and Analysis Methodologies
  • Other Risk Assessment Approaches
  • Risk Analysis
  • Risk Evaluation
  • Risk Ranking


Module 10: Risk Treatment or Risk Response Options

  • Risk Treatment/Risk Response Options
  • Determining Risk Capacity and Acceptable Risk
  • Risk Response Options
  • Risk Acceptance Framework
  • Inherent and Residual Risk
  • Impact
  • Controls
  • Legal and Regulatory Requirements
  • Costs and Benefits


Module 11: Risk and Control Ownership

  • Risk Ownership and Accountability
  • Risk Owner
  • Control Owner


Module 12: Risk Monitoring and Reporting

  • Risk Monitoring
  • Key Risk Indicators
  • Reporting Changes in Risk
  • Risk Communication, Awareness and Consulting
  • Documentation


Domain 3: Information Security Programme Development and Management

Module 13: Information Security Program Resources

  • Introduction
  • Information Security Program Objectives
  • Information Security Program Concepts
  • Common Information Security Program Challenges
  • Common Information Security Program Constraints


Module 14: Information Asset Identification and Classification

  • Information Asset Identification and Valuation
  • Information Asset Valuation Strategies
  • Information Asset Classification
  • Methods to Determine Criticality of Assets and Impact of Adverse Events


Module 15: Industry Standards and Frameworks for Information Security

  • Enterprise Information Security Architectures
  • Information Security Management Frameworks
  • Information Security Frameworks Components


Module 16: Information Security Policies, Procedures, and Guidelines

  • Policies
  • Standards
  • Procedures
  • Guidelines


Module 17: Information Security Program Metrics

  • Introduction
  • Effective Security Metrics
  • Security Program Metrics and Monitoring
  • Metrics Tailored to Enterprise Needs


Module 18: Information Security Control Design and Selection

  • Introduction
  • Managing Risk Through Controls
  • Controls and Countermeasures
  • Control Categories
  • Control Design Considerations
  • Control Methods


Module 19: Security Programme Management

  • Risk Management
  • Risk Management Programme
  • Risk Treatment
  • Audit and Reviews
  • Third-Party Risk Management


Module 20: Security Programme Operations

  • Event Monitoring
  • Vulnerability Management
  • Security Engineering and Development
  • Network Protection
  • Endpoint Protection and Management
  • Identity and Access Management
  • Security Incident Management
  • Security Awareness Training
  • Managed Security Service Providers
  • Data Security
  • Cryptography
  • Symmetric Key Algorithms


Module 21: IT Service Management

  • Service Desk
  • Incident Management
  • Problem Management
  • Change Management
  • Configuration Management
  • Release Management
  • Service Levels Management
  • Financial Management
  • Capacity Management
  • Service Continuity Management
  • Availability Management
  • Asset Management


Module 22: Controls

  • Internal Control Objectives
  • Information Systems Control Objectives
  • General Computing Controls
  • Control Frameworks
  • Controls Development
  • Control Assessment


Module 23: Metrics and Monitoring

  • Types of Metrics
  • Audiences
  • Continuous Improvement


Domain 4: Information Security Incident Management

Module 24: Security Incident Response Overview

  • Phases of Incident Response


Module 25: Incident Response Plan Development

  • Objectives
  • Maturity
  • Resources
  • Roles and Responsibilities
  • Gap Analysis
  • Plan Development


Module 26: Responding to Security Incidents

  • Detection
  • Initiation
  • Evaluation
  • Recovery
  • Remediation
  • Closure
  • Post-Incident Review


Module 27: Business Continuity and Disaster Recovery Planning

  • Business Continuity Planning
  • Disaster
  • Disaster Recovery Planning
  • Testing BC and DR Planning

Do you have any questions about e-learning?



You may also be interested in these courses and e-learning packages

You may find the courses below interesting


EC-Council Certified Chief Information Security Officer (CCISO) E-learning and Exam
(MFCCISO)

Price:
499 500 HUF + VAT
The CCISO certification is an industry-leading program that recognises the real-world experience necessary to succeed at the highest executive levels of information security. Bringing together all the components required for C-Level positions, the CCISO program combines audit management, governance, IS controls, human capital management, strategic program development and the financial expertise vital for leading a highly successful IS program. The CCISO Training Program can be the key to a successful transition to the highest ranks of information security management.
EC-Council Certified Secure Computer User v2 (CSCU) E-learning and Exam
(MFCSCU)

Price:
79 500 HUF + VAT
The CSCU training program aims at equipping students with the necessary knowledge and skills to protect their information assets. This course covers the fundamentals of various computer and network security threats, such as identity theft, credit card fraud, phishing, virus and backdoors, email hoaxes, loss of confidential information, hacking attacks and social engineering.
EC-Council Certified Network Defender (CND) E-learning and Exam
(MFCND)

Price:
429 500 HUF + VAT
The Certified Network Defender v3 (CND) credential is the most trusted network security certification that employers worldwide value and for good reasons. The comprehensive curriculum focuses on loT security, network virtualization practices for the remote workforce, enhanced cloud security, loT and operational technology (OT) modules, introduction to threat intelligence, in-depth attack surface analysis, and much more. 
EC-Council Certified Ethical Hacker (CEH) E-learning and Exam
(MFCEHE)

Price:
499 500 HUF + VAT
CEH is the world’s most advanced certified ethical hacking course that covers 20 of the most current security domains any individual will ever want to know when they are planning to beef-up the information security posture of their organisation. This accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals. 
EC-Council Computer Hacking Forensic Investigator (CHFI) E-learning and Exam
(MFCHFI)

Price:
429 500 HUF + VAT
CHFI v10 captures all the essentials of digital forensics analysis and evaluation required for the modern world — tested and approved by veterans and top practitioners of the cyber forensics industry. From identifying the footprints of a breach to collecting evidence for a prosecution, CHFI v10 handholds students through every step of the process with experiential learning. CHFI v10 is engineered by industry practitioners for professionals including those such as forensic analysts, cybercrime investigator, cyber defense forensic analyst, incident responders, information technology auditor, malware analyst, security consultant, chief security officers and aspirants alike.
EC-Council Disaster Recovery Professional (EDRP) E-learning and Exam
(MFEDRP)

Price:
429 500 HUF + VAT
The EDRP v3 course identifies vulnerabilities and takes appropriate countermeasures to prevent and mitigate failure risks for an orginization. It also provides the networking professional with a foundation in disaster recovery course principles, including preparation of a disaster recovery plan, assessment of risks in the enterprise, development of policies and procedures, an understanding of the roles and relationships of various members of organisation, implementation of a plan and recovering from a disaster.
EC-Council Certified Incident Handler v2 (ECIH) E-learning and Exam
(MFECIH)

Price:
229 500 HUF + VAT
The ECIH program is designed to provide the fundamental skills to handle and respond to the computer security incidents in an information system. The course addresses various underlying principles and techniques for detecting and responding to current and emerging computer security threats. The comprehensive training program will make students proficient in handling as well as responding to various security incidents, such as network security incidents, malicious code incidents and insider attack threats.
EC-Council Certified SOC Analyst E-learning and Exam
(MFCSAE)

Price:
279 500 HUF + VAT
The Certified SOC Analyst (CSA) program is the first step to joining a security operations center (SOC). It is engineered for current and aspiring Tier I and Tier II SOC analysts to achieve proficiency in performing entry-level and intermediate-level operations. CSA is a training and credentialing program that helps the candidate acquire trending and in-demand technical skills through instruction by some of the most experienced trainers in the industry. The program focuses on creating new career opportunities through extensive, meticulous knowledge with enhanced level capabilities for dynamically contributing to a SOC team. Being an intense 3-day program, it thoroughly covers the fundamentals of SOC operations, before relaying the knowledge of log management and correlation, SIEM deployment, advanced incident detection, and incident response. Additionally, the candidate will learn to manage various SOC processes and collaborate with CSIRT at the time of need. 
EC-Council Certified Penetration Testing Professional (CPENT) E-learning and Exam
(MFCPENT)

Price:
429 500 HUF + VAT
EC-Council’s Certified Penetration Testing Professional (CPENT) program teaches you how to perform an effective penetration test in an enterprise network environment that must be attacked, exploited, evaded, and defended. If you have only been working in flat networks, CPENT’s live practice range will teach you to take your skills to the next level by teaching you how to pen test IoT systems, OT systems, how to write your own exploits, build your own tools, conduct advanced binaries exploitation, double pivot to access hidden networks, and also customize scripts/exploits to get into the innermost segments of the network.
EC-Council Certified Web Application Hacking and Security (WAHS) E-learning and Exam
(MFWAHS)

Price:
199 500 HUF + VAT
Web Application Hacking and Security has challenges derived from the engaging iLab environments of EC Council – from Certified Ethical Hacker (CEH) to the Certified Penetration Testing Professional (CPENT); from Certified Application Security Engineer (CASE) .Net to Java. But Web Application Hacking and Security goes beyond this to more difficult scenarios as you advance through each problem. Web Application Hacking and Security is like a Capture-The-Flag (CTF) competitions meant to test your hacking skills. But you can keep on trying until you achieve the goal. Test your skills and work alone to solve complex problems or follow the instructor as they do a walkthrough to help you learn Web Application Hacking and Security. Watch your name rise on the leader board, a place where you’ll see who’s cracking the most challenges, who’s making the most progress, who’s cranking out the h@ck$!
EC-Council Ethical Hacking Core Skills E-learning and Exam
(MFEHCS)

Price:
429 500 HUF + VAT
In this course you will learn the core skills to build a solid security foundation. You will examine in detail the traffic that traverses the network at the packet and binary level. You will build solid knowledge on the lowest layers of the network. In the course, you will conduct extensive hands-on exercises. You will learn to master the TCP/IP protocol. You will learn essential UNIX and Linux survival skills that separate you from the many security professionals who are Windows centric.
Certified Information Systems Auditor (CISA) exam preparation e-learning with exam voucher
(MFCISAE)

Price:
1 085 500 HUF + VAT
This Certified Information Systems Auditor (CISA) Course provides delegates with in-depth knowledge about the Information Systems Audit process. During this training, they will learn about quality assurance, a systematic approach to determining if a product meets quality standards. They will also learn about disaster recovery plans that contain detailed instructions on responding to unplanned incidents.
Certified Cloud Security Professional (CCSP) exam preparation e-learning with exam voucher
(MFCCSPE)

Price:
1 739 500 HUF + VAT
This Certified Cloud Security Professional (CCSP) Certification Training Course is designed to empower delegates with the ability to understand the audit processes, methodologies, and adaptations required in a cloud environment. Delegates will gain insights into transitioning data, infrastructure, and applications from on-premises hardware to the cloud, ultimately boosting hybrid workforce productivity.
Certified Information Systems Security Professional (CISSP) exam preparation e-learning
(MFCISSPE)

Price:
1 739 500 HUF + VAT
This Certified Information Systems Security Professional (CISSP) Training Course is designed to provide delegates with a rapid and comprehensive understanding of key CISSP concepts. Through interactive sessions, real-world case studies, and expert guidance, delegates will gain valuable insights into security policies, risk management, cryptography, and access control systems.