Course Details

Certified Information Security Manager

This Certified Information Security Manager (CISM) training course focuses on the construction, development, and governance of information security operations. Possession of this certification displays precise knowledge, practice, and copious amounts of experience in the realm of information security management.  This CISM training course takes into account practical issues, like the creation of information security programs, and incident management, whilst promoting security practices used globally. CISM teaches delegates how to tailor ever-changing technology to their enterprises. This enables the enterprises to emerge as a valuable organisation and may expand their clientele due to their implementation of CISM certified individuals.

The demand for skilled information security management professionals is increasing, hence this CISM certification fulfils business needs. CISM has been accepted as the universal standard to strive towards within the sphere of information security, thus depicting the qualification as a prominent representation of expertise and commitment. This causes CISM holders to be identified as the most certified professionals in the information security realm and means delegates can recognise the link between information security programs and the larger goals of the organisation. Delegates will be provided with everything they need to pass the ISACA exam. 

Certified Information Security Manager (CISM) Training Outline

This CISM training course covers the following areas:

  • Test-Taking Tips and Study Techniques
  • Preparation for the CISM Exam
  • Submitting Required Paperwork
  • Resources and Study Aids
  • Passing the Exam First Time

The Four Domains:

Information Security Governance:

  • Asset Identification
  • Risk Assessment
  • Vulnerability Assessments
  • Asset Management

Information Risk Management:

  • Asset Classification and Ownership
  • Structured Information Risk Assessment Process
  • Business Impact Assessments
  • Change Management

Information Security Program Development and Management:

  • Information Security Strategy
  • Program Alignment of Other Assurance Functions
  • Development of Information Security Architectures
  • Security Awareness, Training, and Education
  • Communication and Maintenance of Standards, Procedures, and Other Documentation
  • Change Control
  • Lifecycle Activities
  • Security Metrics

Information Security Program Management:

  • Security Program Management Overview
  • Planning
  • Security Baselines
  • Business Processes
  • Security Program Infrastructure
  • Lifecycle Methodologies
  • Security Impact on Users
  • Accountability
  • Security Metrics
  • Managing Resources

Incident Management and Response:

  • Response Management Overview
  • Importance of Response Management
  • Performing a Business Impact Analysis
  • Developing Response and Recovery Plans
  • The Incident Response Process
  • Implementing Response and Recovery Plans
  • Response Documentation
  • Post-Event Reviews

View Schedules Download Syllabus

ONEITECH EXPERIENCE

EXPERIENTIAL WORKSHOPS

Learn from the real-world experience of accredited industry experts and advance your knowledge with in-class activities and simulations.

ELITE PANEL OF SPCS

Interact with accredited SPCs who also have years of experience as active SAFe® practitioners.

LEARN FROM PRACTITIONERS

Learn directly from active practitioners engaged in implementing SAFe® principles in real projects.

GATEWAY TO SAFE® COMMUNITIES

Get access to a wider community of active Scaled Agile experts and enhance your practical knowledge of SAFe®.

CONTINUOUS LEARNING AND SUPPORT

Avail continuous support through monthly webinars, e-books, and conferences and keep pace with the latest industry updates.

HANDY RESOURCES

Get access to tutorials, articles, interview Q&A and case studies prepared by the industry experts with latest updates in the Agile industry.