course-image

CISM Certification Training

DATE

Yet to be Determind

LOCATION

Accra

Why Attend?

CISM Certification Training

course-obj_img Course Objectives

  • black-circle_img This Course Objective Hasn't Been Provided Yet

course-obj_img Target Audience

This course is aimed at Security professionals with 3-5 years of front-line experience; Information security managers or those with management responsibilities; Information security staff, information security assurance providers who require an in-depth understanding of information security management including: CISO's, CIO's, CSO's, privacy officers, risk managers, security auditors and compliance personnel, BCP / DR personnel, executive and operational managers responsible for assurance functions.

Information Security Governance

  • · Knowledge Statements
  • · Introduction to Information Security Governance
  • · Effective Information Security Governance
  • · Governance and Third-Party Relationships
  • · Information Security Metrics
  • · Information Security Governance Metrics
  • · Information Security Strategy
  • · Information Security Strategy Development
  • · Strategy Resources and Constraints
  • · Other Frameworks
  • · Compliances
  • · Action Plans to Implement Strategy
  • · Governance of Enterprise ITs

Information Risk Management

  • · Information Risk Management
  • · Task and Knowledge Statements
  • · Risk Management Overview
  • · Risk Assessment
  • · Information Asset Classification
  • · Assessment Management
  • · Information Resource Valuation
  • · Recovery Time Objectives
  • · Security Control Baselines
  • · Risk Monitoring
  • · Training and Awareness
  • · Information Risk Management Documentation

Infosec Program Development & Management

  • · Task and Knowledge Statements
  • · Information Security Program Management Overview
  • · Information Security Program Objectives
  • · Information Security Program Concepts
  • · Information Security Program Technology Resources
  • · Information Security Program Development
  • · Information Security Program Framework
  • · Information Security Program Roadmap
  • · Enterprise Information Security Architecture (EISA)
  • · Security Program Management and Administration
  • · Security Program Services and Operational Activities
  • · Controls
  • · Security Program Metrics and Monitoring
  • · Measuring Operational Performance
  • · Common Information Security Program Challenges

Information Security Incident Management

  • · Conduct periodic reviews of organisations objectives
  • · Service level management
  • · Third party management practices
  • · Operations and end-user procedures
  • · Process of information systems maintenance
  • · Data administration practices determine the integrity and optimisation of databases
  • · Use of capacity and performance monitoring tools and techniques
  • · Problem and incident management practices
  • · Change, configuration, and release management practices
  • · Adequacy of backup and restore provisions
  • · Organisation’s disaster recovery plan in the event of a disaster
  • · Task and Knowledge Statements
  • · Incident Management Overview
  • · Incident Management Procedures
  • · Incident Management Resources
  • · Incident Management Objectives
  • · Defining Incident Management Procedures
  • · Incident Business Continuity and Disaster Recovery Procedures
  • · Post Incident Activities and Investigation
  • · ISACA Code of Professional Ethics
  • · Laws and Regulations
  • · Policy Versus Law Within an Organization
  • · Ethics and the Internet IAB
  • · Certified Information Security Manager
  • · Certification requirements
  • · CISM in the Workplace
  • · The CISM Priorities
  • · Understand How Questions Are Structured
  • · Preparing for the Examination
  • · Recommended Reading for the CISM Exam
  • · Exam Favourites

Exams

  • · Mock Exam Paper
  • · Exam guidance, tricks
  • · Previous Questions Papers

This course hasn't been scheduled yet, however you can request for In-House training

Join Our Community