Join us for a FREE hands-on Meetup webinar on From Idea to Impact: Product Management in the Age of Generative AI | Friday, December 13th, 2024 · 5:00 PM IST/ 7:30 AM EST Join us for a FREE hands-on Meetup webinar on From Idea to Impact: Product Management in the Age of Generative AI | Friday, December 13th, 2024 · 5:00 PM IST/ 7:30 AM EST
Search
Close this search box.
Search
Close this search box.

CISM Examination Preparation Course

Upgrading professional’s skillset in area of information security governance, information security program management, incident management and risk management.

Duration

3 Days

Level

Advanced Level

Design and Tailor this course

As per your team needs

Edit Content

The Certificate Information Security Manager (CISM) by ISACA is designed to provide executive management with assurance that those earning the designation have the required knowledge and ability to provide effective information security management and consulting. While the central focus of the CISM certification is information security management, all those in the IT profession with security experience will certainly find value in the CISM.

This course covers the complete curriculum of CISM and aims to provide deep knowledge on all domains of CISM including information security governance, program development and management, incident management and risk management. This course aims to provide sufficient knowledge to a candidate which eventually add credibility and confidence in candidate’s interactions with internal and external stakeholders, peers, and regulators.

The CISM brings credibility to the team and ensures alignment between the organization’s information security program and its broader goals and objectives. CISM can validate team’s commitment to compliance, security and integrity and increase customer retention.

Edit Content
  • IT Managers
  • Project Managers
  • Team Lead in IT and Information Security teams
  • IT Auditors
  • Information Security Professionals
  • Management Executives who are heading IT System or Information Security departments
  • IT Consultants
  • Business Analysts in IT and Information Security teams
Edit Content
  • Enterprise Governance
    • Organizational Culture
    • Legal, Regulatory, and Contractual Requirements
    • Organizational Structures, Roles, and Responsibilities
  • Information Security Strategy
    • Information Security Strategy Development
    • Information Governance Frameworks and Standards
    • Strategic Planning (e.g., budgets, resources, business case)
  • Information Security Risk Assessment
    • Emerging Risk and Threat Landscape
    • Vulnerability and Control Deficiency Analysis
    • Risk Assessment and Analysis
  • Information Security Risk Response
    • Risk Treatment / Risk Response Options
    • Risk and Control Ownership
    • Risk Monitoring and Reporting
  • Information Security Program Development
    • Information Security Program Resources (e.g., people, tools, technologies)
    • Information Asset Identification and Classification
    • Industry Standards and Frameworks for Information Security
    • Information Security Policies, Procedures, and Guidelines
    • Information Security Program Metrics
  • Information Security Program Management
    • Information Security Control Design and Selection
    • Information Security Control Implementation and Integrations
    • Information Security Control Testing and Evaluation
    • Information Security Awareness and Training/td>
    • Management of External Services (e.g., providers, suppliers, third parties, fourth parties)
    • Information Security Program Communications and Reporting
  • Incident Management Readiness
    • Incident Response Plan
    • Business Impact Analysis (BIA)
    • Business Continuity Plan (BCP)
    • Disaster Recovery Plan (DRP)
    • Incident Classification/Categorization
    • Incident Management Training, Testing, and Evaluation
  • Incident Management Operations
    • Incident Management Tools and Techniques
    • Incident Investigation and Evaluation
    • Incident Containment Methods
    • Incident Response Communications (e.g., reporting, notification, escalation)
    • Incident Eradication and Recovery
    • Post-incident Review Practices
Edit Content
  • Understanding on IT Infrastructure, computer science fundamentals and networking terminologies.
  • Basic understanding on management part of IT infrastructure, information systems, IT teams etc. could be an advantage.
  • Familiarity with day-to-day information Security terminologies, however not mandatory because it will be covered in day 1 of training

Connect

we'd love to have your feedback on your experience so far