Certified Information Security Manager (CISM)

3 Days | Price: $1,995

This course is designed to help candidates prepare for sitting the ISACA CISM certification examination. By taking this course and obtaining CISM certification, your experience and skills in supporting the information security needs of your organization will be validated. Securing the organization™s information is a critical business objective in today™s business environment. The information that an organization depends on to be successful can be at risk from numerous sources. By effectively managing information security, you can address these risks and ensure the organization remains healthy and competitive in the marketplace. This course may earn a Credly Badge.

Learning Objectives

Upon successful completion of this course, students will be able to:

  • establish and maintain a framework to provide assurance that information security strategies are aligned with business objectives and consistent with applicable laws and regulations.
  • identify and manage information security risks to achieve business objectives.
  • create a program to implement the information security strategy.
  • implement an information security program.
  • oversee and direct information security activities to execute the information security program.
  • plan, develop, and manage capabilities to detect, respond to, and recover from information security incidents.

Course Details

Course Outline

1 - The Basics
  • Security Concepts
  • Governance, Goals, Strategies, Policies, Standards, and Procedures
  • Strategy
  • Risk Appetite, Tolerance, and Capacity
  • Analysis of Risk
  • Controlling Threats and Risk
  • Controls and Countermeasures
  • ALE, RTO, RPO, SDO, MTO, MTD, and AIW
  • BCP, DRP, and BIA
  • Business Continuity and Disaster Recovery
  • Testing Incident Response, Business Continuity Plans, and Disaster Recovery Plans
  • Roles, Responsibilities, RACI, and Skills
  • Due Diligence and Due Care
  • Security Principles
  • KGIs, KPIs, KRIs, and CSFs
  • Technologies
  • Standards and Frameworks
  • Culture
  • Metrics
  • Current State, Desired State, and the Gap in Between
  • Information Security Infrastructure and Architecture
  • Cloud Computing
  • Metrics Development
  • Business Model for Information Security (BMIS)
2 - Four Domains
  • Information Security Governance Overview
  • Information Security Governance The Goal
  • Information Security Governance The Strategy
  • Information Security Governance Who Does What
  • Information Security Governance Resources That Help
  • Information Security Governance Constraints That Hurt
  • Information Security Governance The Action Plan
  • Information Security Governance Metrics and Monitoring
  • Information Security GovernanceWhat Success Looks Like
  • Information Risk Management Overview
  • Information Risk Management The Goal
  • Information Risk Management The Strategy
  • Information Risk Management Who Does What
  • Information Risk Management Resources That Help
  • Information Risk Management Constraints That Hurt
  • Information Risk Management The Action Plan
  • Information Risk Management Metrics, Monitoring, and Reporting
  • Information Risk Management What Success Looks Like
  • Information Security Program Development and Management Overview
  • Information Security Program Development and Management The Goal
  • Information Security Program Development and Management The Strategy
  • Information Security Program Development and Management Who Does What
  • Information Security Program Development and Management Resources That Help
  • Information Security Program Development and Management Constraints That Hurt
  • Information Security Program Development and Management The Action Plan
  • Information Security Program Development and Management Metrics and Monitoring
  • Information Security Program Development and Management What Success Looks Like
  • Information Security Incident Management Overview
  • Information Security Incident Management The Goal
  • Information Security Incident Management The Strategy
  • Information Security Incident Management Who Does What
  • Information Security Incident Management Resources That Help
  • Information Security Incident Management Constraints That Hurt
  • Information Security Incident Management The Action Plan
  • Information Security Incident Management Metrics and Monitoring
  • Information Security Incident Management What Success Looks Like

Actual course outline may vary depending on offering center. Contact your sales representative for more information.

StartsRegister