Read more here
CISM Certification Training
DATE
Yet to be Determind
LOCATION
Accra
Why Attend?
CISM Certification Training
Course Objectives
- This Course Objective Hasn't Been Provided Yet
Target Audience
This course is aimed at Security professionals with 3-5 years of front-line experience; Information security managers or those with management responsibilities; Information security staff, information security assurance providers who require an in-depth understanding of information security management including: CISO's, CIO's, CSO's, privacy officers, risk managers, security auditors and compliance personnel, BCP / DR personnel, executive and operational managers responsible for assurance functions.
Information Security Governance
- · Knowledge Statements
- · Introduction to Information Security Governance
- · Effective Information Security Governance
- · Governance and Third-Party Relationships
- · Information Security Metrics
- · Information Security Governance Metrics
- · Information Security Strategy
- · Information Security Strategy Development
- · Strategy Resources and Constraints
- · Other Frameworks
- · Compliances
- · Action Plans to Implement Strategy
- · Governance of Enterprise ITs
Information Risk Management
- · Information Risk Management
- · Task and Knowledge Statements
- · Risk Management Overview
- · Risk Assessment
- · Information Asset Classification
- · Assessment Management
- · Information Resource Valuation
- · Recovery Time Objectives
- · Security Control Baselines
- · Risk Monitoring
- · Training and Awareness
- · Information Risk Management Documentation
Infosec Program Development & Management
- · Task and Knowledge Statements
- · Information Security Program Management Overview
- · Information Security Program Objectives
- · Information Security Program Concepts
- · Information Security Program Technology Resources
- · Information Security Program Development
- · Information Security Program Framework
- · Information Security Program Roadmap
- · Enterprise Information Security Architecture (EISA)
- · Security Program Management and Administration
- · Security Program Services and Operational Activities
- · Controls
- · Security Program Metrics and Monitoring
- · Measuring Operational Performance
- · Common Information Security Program Challenges
Information Security Incident Management
- · Conduct periodic reviews of organisations objectives
- · Service level management
- · Third party management practices
- · Operations and end-user procedures
- · Process of information systems maintenance
- · Data administration practices determine the integrity and optimisation of databases
- · Use of capacity and performance monitoring tools and techniques
- · Problem and incident management practices
- · Change, configuration, and release management practices
- · Adequacy of backup and restore provisions
- · Organisation’s disaster recovery plan in the event of a disaster
- · Task and Knowledge Statements
- · Incident Management Overview
- · Incident Management Procedures
- · Incident Management Resources
- · Incident Management Objectives
- · Defining Incident Management Procedures
- · Incident Business Continuity and Disaster Recovery Procedures
- · Post Incident Activities and Investigation
- · ISACA Code of Professional Ethics
- · Laws and Regulations
- · Policy Versus Law Within an Organization
- · Ethics and the Internet IAB
- · Certified Information Security Manager
- · Certification requirements
- · CISM in the Workplace
- · The CISM Priorities
- · Understand How Questions Are Structured
- · Preparing for the Examination
- · Recommended Reading for the CISM Exam
- · Exam Favourites
Exams
- · Mock Exam Paper
- · Exam guidance, tricks
- · Previous Questions Papers
Join Our Community