fbpx
E-learning duration:
E-learning language:
32 sessions
English
E-learning price:
1 164 EUR + VAT

The Certified Information Security Manager (CISM) Professional Development Program equips professionals with the skills and knowledge to safeguard valuable information assets. It is a highly relevant and crucial discipline in a technology-driven landscape. CISM, offered by ISACA, is a globally recognized certification that ensures individuals are well-versed in managing and governing an enterprise's information security.

The CISM Course is a globally recognised certification focusing on developing a professional’s expertise in managing Information Security systems and practices. This program can be advantageous for professionals, including:

  • Information Security Managers
  • Internal Auditors
  • Risk Management Specialists
  • Compliance Officers
  • Security Analysts
  • IT Consultants
  • Data Protection Officers

There are no formal prerequisites for this CISM Certified Information Systems Manager training program. However, a foundational understanding of Information Security and experience in professional roles related to it can be beneficial for participants.

CISM (Certified Information Security Manager) is a globally recognized certification validating expertise in designing and managing information security programs. It emphasises skills in risk management, governance, and strategic alignment.

Proficiency in the CISM Training Course is vital as it empowers professionals to navigate the complex landscape of Information Security, ensuring the confidentiality, integrity, and availability of data. IT and Cybersecurity Experts, Risk Managers, Compliance Officers, and those aspiring to lead and manage information security teams should aim to master CISM.

participants will gain expertise in risk management, governance, incident response, and security development. Through production environment case studies and practical exercises, participants will gain expertise in how to apply their knowledge effectively, making them invaluable assets to their enterprises.

Learning Objectives

  • To understand the core principles of Information Security governance
  • To develop proficiency to develop and manage an Information Security aligned with business objectives
  • To master risk management processes to safeguard an enterprise's assets
  • To acquire skills for incident response and recovery
  • To gain the ability to establish and maintain Information Security policies and procedures
  • To develop the competence to align Information Security with regulatory and compliance requirements
  • To develop the skills to manage and govern Information Security teams effectively
  • To prepare for the CISM exam and enhance their career prospects

After completing this CISM Training and passing the certification exam, participants will be recognized as Certified Information Security Managers. This globally respected certification demonstrates their expertise in Information Security management and opens up numerous career opportunities.

Domain 1: Information Security Governance

Module 1: Introduction to Information Security Governance

  • About Information Security Governance
  • Reason for Security Governance
  • Security Governance Activities and Results
  • Risk Appetite
  • enterprise Culture


Module 2: Legal, Regulatory and Contractual Requirements

  • Introduction
  • Requirements for Content and Retention of Business Records


Module 3: Organizational Structures, Roles and Responsibilities

  • Roles and Responsibilities
  • Monitoring Responsibilities


Module 4: Information Security Strategy Development

  • Introduction
  • strategic business objectives and Objectives
  • Information Security Strategy Objectives
  • Ensuring Objective and Business Integration
  • Avoiding Common Pitfalls and Bias
  • Desired State
  • Elements of a Strategy


Module 5: Information Governance Frameworks and Standards

  • Security Balanced Scorecard
  • Architectural Approaches
  • Enterprise Risk Management Framework
  • Information Security Management Frameworks and Models


Module 6: Strategic Planning

  • Workforce Composition and Skills
  • Assurance Provisions
  • Risk Assessment and Management
  • Action Plan to Implement Strategy
  • Information Security Program Objectives


Domain 2: Information Security Risk Management

Module 7: Emerging Risk and Threat Landscape

  • Risk Identification
  • Threats
  • Defining a Risk Management Framework
  • Emerging Threats
  • Risk, Likelihood and Impact
  • Risk Register


Module 8: Vulnerability and Control Deficiency Analysis

  • Introduction
  • Security Control Baselines
  • Events Affecting Security Baselines


Module 9: Risk Assessment and Analysis

  • Introduction
  • Determining the Risk Management Context
  • Operational Risk Management
  • Risk Management Integration with IT Life Cycle Management Processes
  • Risk Scenarios
  • Risk Assessment Process
  • Risk Assessment and Analysis Methodologies
  • Other Risk Assessment Approaches
  • Risk Analysis
  • Risk Evaluation
  • Risk Ranking


Module 10: Risk Treatment or Risk Response Options

  • Risk Treatment/Risk Response Options
  • Determining Risk Capacity and Acceptable Risk
  • Risk Response Options
  • Risk Acceptance Framework
  • Inherent and Residual Risk
  • Impact
  • Controls
  • Legal and Regulatory Requirements
  • Costs and Benefits


Module 11: Risk and Control Ownership

  • Risk Ownership and Accountability
  • Risk Owner
  • Control Owner


Module 12: Risk Monitoring and Reporting

  • Risk Monitoring
  • Key Risk Indicators
  • Reporting Changes in Risk
  • Risk Communication, Awareness and Consulting
  • Documentation


Domain 3: Information Security Programme Development and Management

Module 13: Information Security Program Resources

  • Introduction
  • Information Security Program Objectives
  • Information Security Program Concepts
  • Common Information Security Program Challenges
  • Common Information Security Program Constraints


Module 14: Information Asset Identification and Classification

  • Information Asset Identification and Valuation
  • Information Asset Valuation Strategies
  • Information Asset Classification
  • Methods to Determine Criticality of Assets and Impact of Adverse Events


Module 15: Industry Standards and Frameworks for Information Security

  • Enterprise Information Security Architectures
  • Information Security Management Frameworks
  • Information Security Frameworks Components


Module 16: Information Security Policies, Procedures, and Guidelines

  • Policies
  • Standards
  • Procedures
  • Guidelines


Module 17: Information Security Program Metrics

  • Introduction
  • Effective Security Metrics
  • Security Program Metrics and Monitoring
  • Metrics Tailored to Enterprise Needs


Module 18: Information Security Control Design and Selection

  • Introduction
  • Managing Risk Through Controls
  • Controls and Countermeasures
  • Control Categories
  • Control Design Considerations
  • Control Methods


Module 19: Security Programme Management

  • Risk Management
  • Risk Management Programme
  • Risk Treatment
  • Audit and Reviews
  • Third-Party Risk Management


Module 20: Security Programme Operations

  • Event Monitoring
  • Vulnerability Management
  • Security Engineering and Development
  • Network Protection
  • Endpoint Protection and Management
  • Identity and Access Management
  • Security Incident Management
  • Security Awareness Training
  • Managed Security Service Providers
  • Data Security
  • Cryptography
  • Symmetric Key Algorithms


Module 21: IT Service Management

  • Service Desk
  • Incident Management
  • Problem Management
  • Change Management
  • Configuration Management
  • Release Management
  • Service Levels Management
  • Financial Management
  • Capacity Management
  • Service Continuity Management
  • Availability Management
  • Asset Management


Module 22: Controls

  • Internal Control Objectives
  • Information Systems Control Objectives
  • General Computing Controls
  • Control Frameworks
  • Controls Development
  • Control Assessment


Module 23: Metrics and Monitoring

  • Types of Metrics
  • Audiences
  • Continuous Improvement


Domain 4: Information Security Incident Management

Module 24: Security Incident Response Overview

  • Phases of Incident Response


Module 25: Incident Response Plan Development

  • Objectives
  • Maturity
  • Resources
  • Roles and Responsibilities
  • Gap Analysis
  • Plan Development


Module 26: Responding to Security Incidents

  • Detection
  • Initiation
  • Evaluation
  • Recovery
  • Remediation
  • Closure
  • Post-Incident Review


Module 27: Business Continuity and Disaster Recovery Planning

  • Business Continuity Planning
  • Disaster
  • Disaster Recovery Planning
  • Testing BC and DR Planning

Do you have any questions about e-learning?



You may also be interested in these courses and e-learning programmes

You may find the courses below of interest.


EC-Council Certified Chief Information Security Officer (CCISO) – Self-Paced Online Training with Certification Exam (E-Learning)
(MFCCISO)
E-learning curriculum for self-study

EC-Council Certified Secure Computer User v2 (CSCU) – Self-Paced Online Training with Certification Exam (E-Learning)
(MFCSCU)
E-learning curriculum for self-study

EC-Council Certified Network Defender (CND) – Self-Paced Online Training with Certification Exam (E-Learning)
(MFCND)
E-learning curriculum for self-study

EC-Council Certified Ethical Hacker (CEH) v13 AI – Self-Paced Online Training with Certification Exam (E-Learning)
(MFCEHE)
E-learning curriculum for self-study

EC-Council Computer Hacking Forensic Investigator (CHFI) – Self-Paced Online Training with Certification Exam (E-Learning)
(MFCHFI)
E-learning curriculum for self-study

EC-Council Disaster Recovery Professional (EDRP) – Self-Paced Online Training with Certification Exam (E-Learning)
(MFEDRP)
E-learning curriculum for self-study

EC-Council Certified Incident Handler v2 (ECIH) – Self-Paced Online Training with Certification Exam (E-Learning)
(MFECIH)
E-learning curriculum for self-study

EC-Council Certified SOC Analyst (CSA) – Self-Paced Online Training with Certification Exam (E-Learning)
(MFCSAE)
E-learning curriculum for self-study

EC-Council Certified Penetration Testing Professional (CPENT) – Self-Paced Online Training with Certification Exam (E-Learning)
(MFCPENT)
E-learning curriculum for self-study

EC-Council Web Application Hacking and Security (WAHS) – Self-Paced Online Training with Certification Exam (E-Learning)
(MFWAHS)
E-learning curriculum for self-study

EC-Council Ethical Hacking Core Skills – Self-Paced Online Training with Certification Exam (E-Learning)
(MFEHCS)
E-learning curriculum for self-study

Certified Information Systems Auditor (CISA) – Self-Paced Online Exam Preparation Training (E-Learning)
(MFCISAE)
E-learning curriculum for self-study

Certified Cloud Security Professional (CCSP) – Self-Paced Online Exam Preparation Training (E-Learning)
(MFCCSPE)
E-learning curriculum for self-study

Certified Information Systems Security Professional (CISSP) – Self-Paced Online Exam Preparation Training (E-Learning)
(MFCISSPE)
E-learning curriculum for self-study