Certified Information Security Manager (CISM)
Course
Online
Description
-
Type
Course
-
Methodology
Online
The CISM training course has been prepared specifically to cover all of ISACA's 2010 CISM® exam objectives and more. Let us give you everything you need to thoroughly prepare you for one of the toughest exams you will ever see. A brand new addition to the CISM training course this year is a comprehensive e-learning package that each delegate will get for free as part of their CISM course booking!
Reviews
Subjects
- IT
- Security
- IT Security
- Security Manager
Course programme
- Develop information security strategy to align with business strategy and direction
- Obtain senior management commitment and support for information security across the entire enterprise
- Define information security governance roles and responsibilities
- Establish reporting and communication channels regarding information security governance activities
- Develop a systematic, analytical, and continuous risk management process
- Understand and implement risk identification, analysis, and mitigation activities
- Define and prioritize risk mitigation strategies
- Appropriately report changes in risk to the correct levels of management on a periodic and event-driven basis
- Create and maintain plans for implementing a carefully designed information security governance framework
- Develop information security baselines from organizational needs, as well as international standards
- Develop guidelines and procedures for integrating security risk management into business processes
- Develop procedures and guidelines for the IT infrastructure that comply with senior-level information security policies
- Ensure security is effectively incorporated into the organizations established change management processes
- Effectively integrate information security policies, guidelines, procedures, and accountability into the organization's culture
- Manage security risk from contracts; transfer risk with contracts
- Understand information security compliance issues resulting from Sarbanes-Oxley
- Properly align IT strategic planning with organizational strategic planning
- Control risk within software development or acquisition projects
- How to position information security management within the organization
- Control IT security risk relating to IT funding
- Manage risk associated with social engineering, physical infrastructure threats, malicious code, and software vulnerabilities
Certified Information Security Manager (CISM)