fbpx
E-learning hossza:
E-learning nyelve:
32 tanóra
Angol
E-learning díja:
275 500 Ft + Áfa

The Certified Information Security Manager (CISM) Training equips professionals with the skills and knowledge to safeguard valuable information assets. It is a highly relevant and crucial discipline in a technology-driven landscape. CISM, offered by ISACA, is a globally recognized certification that ensures individuals are well-versed in managing and governing an organization's information security.

The CISM Course is a globally recognised certification focusing on developing a professional’s expertise in managing Information Security systems and practices. This course can be beneficial for professionals, including:

  • Information Security Managers
  • Internal Auditors
  • Risk Management Specialists
  • Compliance Officers
  • Security Analysts
  • IT Consultants
  • Data Protection Officers

There are no formal prerequisites for this CISM Certified Information Systems Manager Course. However, a basic understanding of Information Security and experience in job roles related to it can be beneficial for delegates.

CISM (Certified Information Security Manager) is a globally recognized certification validating expertise in designing and managing information security programs. It emphasises skills in risk management, governance, and strategic alignment.

Proficiency in the CISM Training Course is vital as it empowers professionals to navigate the complex landscape of Information Security, ensuring the confidentiality, integrity, and availability of data. IT and Cybersecurity Experts, Risk Managers, Compliance Officers, and those aspiring to lead and manage information security teams should aim to master CISM.


Delegates will gain expertise in risk management, governance, incident response, and security development. Through real-world case studies and practical exercises, delegates will learn how to apply their knowledge effectively, making them invaluable assets to their organizations.

Course Objectives

  • To understand the core principles of Information Security governance
  • To learn to develop and manage an Information Security aligned with business objectives
  • To master risk management processes to safeguard an organization's assets
  • To acquire skills for incident response and recovery
  • To gain the ability to establish and maintain Information Security policies and procedures
  • To develop the competence to align Information Security with regulatory and compliance requirements
  • To learn how to manage and govern Information Security teams effectively
  • To prepare for the CISM exam and enhance their career prospects

After completing this CISM Training and passing the certification exam, delegates will be recognized as Certified Information Security Managers. This globally respected certification demonstrates their expertise in Information Security management and opens up numerous career opportunities.

 

 

Domain 1: Information Security Governance

Module 1: Introduction to Information Security Governance

  • About Information Security Governance
  • Reason for Security Governance
  • Security Governance Activities and Results
  • Risk Appetite
  • Organization Culture


Module 2: Legal, Regulatory and Contractual Requirements

  • Introduction
  • Requirements for Content and Retention of Business Records


Module 3: Organizational Structures, Roles and Responsibilities

  • Roles and Responsibilities
  • Monitoring Responsibilities


Module 4: Information Security Strategy Development

  • Introduction
  • Business Goals and Objectives
  • Information Security Strategy Objectives
  • Ensuring Objective and Business Integration
  • Avoiding Common Pitfalls and Bias
  • Desired State
  • Elements of a Strategy


Module 5: Information Governance Frameworks and Standards

  • Security Balanced Scorecard
  • Architectural Approaches
  • Enterprise Risk Management Framework
  • Information Security Management Frameworks and Models


Module 6: Strategic Planning

  • Workforce Composition and Skills
  • Assurance Provisions
  • Risk Assessment and Management
  • Action Plan to Implement Strategy
  • Information Security Program Objectives


Domain 2: Information Security Risk Management

Module 7: Emerging Risk and Threat Landscape

  • Risk Identification
  • Threats
  • Defining a Risk Management Framework
  • Emerging Threats
  • Risk, Likelihood and Impact
  • Risk Register


Module 8: Vulnerability and Control Deficiency Analysis

  • Introduction
  • Security Control Baselines
  • Events Affecting Security Baselines


Module 9: Risk Assessment and Analysis

  • Introduction
  • Determining the Risk Management Context
  • Operational Risk Management
  • Risk Management Integration with IT Life Cycle Management Processes
  • Risk Scenarios
  • Risk Assessment Process
  • Risk Assessment and Analysis Methodologies
  • Other Risk Assessment Approaches
  • Risk Analysis
  • Risk Evaluation
  • Risk Ranking


Module 10: Risk Treatment or Risk Response Options

  • Risk Treatment/Risk Response Options
  • Determining Risk Capacity and Acceptable Risk
  • Risk Response Options
  • Risk Acceptance Framework
  • Inherent and Residual Risk
  • Impact
  • Controls
  • Legal and Regulatory Requirements
  • Costs and Benefits


Module 11: Risk and Control Ownership

  • Risk Ownership and Accountability
  • Risk Owner
  • Control Owner


Module 12: Risk Monitoring and Reporting

  • Risk Monitoring
  • Key Risk Indicators
  • Reporting Changes in Risk
  • Risk Communication, Awareness and Consulting
  • Documentation


Domain 3: Information Security Programme Development and Management

Module 13: Information Security Program Resources

  • Introduction
  • Information Security Program Objectives
  • Information Security Program Concepts
  • Common Information Security Program Challenges
  • Common Information Security Program Constraints


Module 14: Information Asset Identification and Classification

  • Information Asset Identification and Valuation
  • Information Asset Valuation Strategies
  • Information Asset Classification
  • Methods to Determine Criticality of Assets and Impact of Adverse Events



 

Module 15: Industry Standards and Frameworks for Information Security

  • Enterprise Information Security Architectures
  • Information Security Management Frameworks
  • Information Security Frameworks Components


Module 16: Information Security Policies, Procedures, and Guidelines

  • Policies
  • Standards
  • Procedures
  • Guidelines


Module 17: Information Security Program Metrics

  • Introduction
  • Effective Security Metrics
  • Security Program Metrics and Monitoring
  • Metrics Tailored to Enterprise Needs


Module 18: Information Security Control Design and Selection

  • Introduction
  • Managing Risk Through Controls
  • Controls and Countermeasures
  • Control Categories
  • Control Design Considerations
  • Control Methods


Module 19: Security Programme Management

  • Risk Management
  • Risk Management Programme
  • Risk Treatment
  • Audit and Reviews
  • Third-Party Risk Management


Module 20: Security Programme Operations

  • Event Monitoring
  • Vulnerability Management
  • Security Engineering and Development
  • Network Protection
  • Endpoint Protection and Management
  • Identity and Access Management
  • Security Incident Management
  • Security Awareness Training
  • Managed Security Service Providers
  • Data Security
  • Cryptography
  • Symmetric Key Algorithms


Module 21: IT Service Management

  • Service Desk
  • Incident Management
  • Problem Management
  • Change Management
  • Configuration Management
  • Release Management
  • Service Levels Management
  • Financial Management
  • Capacity Management
  • Service Continuity Management
  • Availability Management
  • Asset Management


Module 22: Controls

  • Internal Control Objectives
  • Information Systems Control Objectives
  • General Computing Controls
  • Control Frameworks
  • Controls Development
  • Control Assessment


Module 23: Metrics and Monitoring

  • Types of Metrics
  • Audiences
  • Continuous Improvement


Domain 4: Information Security Incident Management

Module 24: Security Incident Response Overview

  • Phases of Incident Response


Module 25: Incident Response Plan Development

  • Objectives
  • Maturity
  • Resources
  • Roles and Responsibilities
  • Gap Analysis
  • Plan Development


Module 26: Responding to Security Incidents

  • Detection
  • Initiation
  • Evaluation
  • Recovery
  • Remediation
  • Closure
  • Post-Incident Review


Module 27: Business Continuity and Disaster Recovery Planning

  • Business Continuity Planning
  • Disaster
  • Disaster Recovery Planning
  • Testing BC and DR Planning

 

Kérdésed van az e-learninggel kapcsolatban?



Ezek a tanfolyamok és e-learningek is érdekelhetnek

Tekintsd meg néhány további képzésünket a témában


EC-Council Certified Chief Information Security Officer (CCISO) E-learning and Exam
(MFCCISO)
Önálló tanulásra szánt e-learning tananyag

EC-Council Certified Secure Computer User v2 (CSCU) E-learning and Exam
(MFCSCU)
Önálló tanulásra szánt e-learning tananyag

EC-Council Certified Network Defender (CND) E-learning and Exam
(MFCND)
Önálló tanulásra szánt e-learning tananyag

EC-Council Certified Ethical Hacker (CEH) v13 AI E-learning and Exam
(MFCEHE)
Önálló tanulásra szánt e-learning tananyag

EC-Council Computer Hacking Forensic Investigator (CHFI) E-learning and Exam
(MFCHFI)
Önálló tanulásra szánt e-learning tananyag

EC-Council Disaster Recovery Professional (EDRP) E-learning and Exam
(MFEDRP)
Önálló tanulásra szánt e-learning tananyag

EC-Council Certified Incident Handler v2 (ECIH) E-learning and Exam
(MFECIH)
Önálló tanulásra szánt e-learning tananyag

EC-Council Certified SOC Analyst E-learning and Exam
(MFCSAE)
Önálló tanulásra szánt e-learning tananyag

EC-Council Certified Penetration Testing Professional (CPENT) E-learning and Exam
(MFCPENT)
Önálló tanulásra szánt e-learning tananyag

EC-Council Certified Web Application Hacking and Security Tester (WAHS) E-learning and Exam
(MFWAHS)
Önálló tanulásra szánt e-learning tananyag

EC-Council Ethical Hacking Core Skills E-learning and Exam
(MFEHCS)
Önálló tanulásra szánt e-learning tananyag

Certified Information Systems Auditor (CISA) vizsgafelkészítő e-learning
(MFCISAE)
Önálló tanulásra szánt e-learning tananyag

Certified Cloud Security Professional (CCSP) vizsgafelkészítő e-learning
(MFCCSPE)
Önálló tanulásra szánt e-learning tananyag

Certified Information Systems Security Professional (CISSP) vizsgafelkészítő e-learning
(MFCISSPE)
Önálló tanulásra szánt e-learning tananyag