CISM Certification Training or Certified Information Security Manager Training Course Hands-on
Get ready for the CISM exam with our top-quality CISM Certification Training or Certified Information Security Manager Training preparation course
The CISM Certification Training program was developed by ISACA for experienced information security management professionals who have experience developing and managing information security programs and who understand the programs relationship to the overall business goals.
The CISM exam consists of 200 multiple-choice questions that cover the four CISM domains. The American National Standards Institute (ANSI) has accredited the CISM certification program under ISO/IEC 17024:2003, General Requirements for Bodies Operating Certification Systems of Persons.
This CISM Certification Training course supports a certification that is a DoD Approved 8570 Baseline Certification and meets DoD 8140/8570 training requirements.
Duration: 3 days
• We can adapt this CISM Certification Training course to your group’s background and work requirements at little to no added cost.
• If you are familiar with some aspects of this CISM Certification Training or Certified Information Security Manager Training course, we can omit or shorten their discussion.
• We can adjust the emphasis placed on the various topics or build the CISM Certification Training course around the mix of technologies of interest to you (including technologies other than those included in this outline).
• If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the CISM Certification Training course in manner understandable to lay audiences.
Audience / Target Group
The target audience for this CISM Certification Training course is defined here:
• Experienced information security managers and those who have information security management responsibilities, including IT consultants, auditors, managers, security policy writers, privacy officers, information security officers, network administrators, security device administrators, and security engineers.
CISM Certification Training - Prerequisites
The knowledge and skills that a learner must have before attending this CISM Certification Training course are:
• Cybersecurity Specialization: Architecture and Policy
• Cybersecurity Specialization: Governance, Risk, and Compliance
CISM Certification Training - Objectives:
After completing this CISM Certification Training course, attendees will be able to:
In-depth coverage of the four domains required to pass the CISM Certification Training exam:
1.Information Security Governance
2.Information Risk Management and Compliance
3.Information Security Program Development and Management
4.Information Security Incident Management
CISM Certification Training - Course Content:
Domain 1: Information Security Governance
Develop an information security strategy, aligned with business goals and directives.
Establish and maintain an information security governance framework.
Integrate information security governance into corporate governance.
Develop and maintain information security policies.
Develop business cases to support investments in information security.
Identify internal and external influences to the organization.
Gain ongoing commitment from senior leadership and other stakeholders.
Define, communicate and monitor information security responsibilities
Establish internal and external reporting and communication channels.
Domain 2: Information Risk Management
Establish and/or maintain a process for information asset classification to ensure that measures taken to protect assets are proportional to their business value.
Identify legal, regulatory, organizational and other applicable requirements to manage the risk of noncompliance to acceptable levels.
Ensure that risk assessments, vulnerability assessments and threat analyses are conducted consistently, and at appropriate times, to identify and assess risk to the organization’s information.
Identify, recommend or implement appropriate risk treatment/response options to manage risk to acceptable levels based on organizational risk appetite.
Determine whether information security controls are appropriate and effectively manage risk to an acceptable level.
Facilitate the integration of information risk management into business and IT processes to enable a consistent and comprehensive information risk management program across the organization.
Monitor for internal and external factors (e.g., threat landscape, cybersecurity, geopolitical, regulatory change) that may require reassessment of risk to ensure that changes to existing or new risk scenarios are identified and managed appropriately.
Report noncompliance and other changes in information risk to facilitate the risk management decision-making process.
Ensure that information security risk is reported to senior management to support an understanding of potential impact on the organizational goals and objectives.
Domain 3: Information Security Program Development & Management
Develop a security program, aligned with information security strategy
Ensure alignment between the information security program and other business functions
Establish and maintain requirements for all resources to execute the IS program
Establish and maintain IS architectures to execute the IS program
Develop documentation that ensures compliance with policies
Develop a program for information security awareness and training
Integrate information security requirements into organizational processes
Integrate information security requirements into contracts and activities of third parties
Develop procedures (metrics) to evaluate the effectiveness and efficiency of the IS program
Compile reports to key stakeholders on overall effectiveness of the IS program and the underlying business processes in order to communicate security performance.
Domain 4: Information Security Incident Management
Define (types of) information security incidents
Establish an incident response plan
Develop processes for timely identification of information security incidents
Develop processes to investigate and document information security incidents
Develop incident escalation and communication processes
Establish teams that effectively respond to information security incidents
Test and review the incident response plan
Establish communication plans and processes
Determine the root cause of IS incidents
Align incident response plan with DRP and BCP.