CISM Certification Training
DATE
01 - 01 Jan, 1970
LOCATION
Accra
Why Attend?
CISM Certification Training
Course Objectives
-
By the end of the course, participants will be able to:
- Use the knowledge gained in a practical manner beneficial to your organization
- Establish and maintain information security architectures (people, your organisation process, technology)
- Establish and maintain an Information security governance and framework to achieve your organizations goals and objectives
- Integrate information security requirements into contracts and framework to achieve your organization goals and objectives activities of third parties/ suppliers
- Manage Information risk to an acceptable level to meet the business and compliance requirements
- Plan, establish and manage the capability to detect, investigate, business and compliance requirements respond to and recover from information security incidents to minimize business impact
Target Audience
This course is aimed at Security professionals with 3-5 years of front-line experience; Information security managers or those with management responsibilities; Information security staff, information security assurance providers who require an in-depth understanding of information security management including: CISO's, CIO's, CSO's, privacy officers, risk managers, security auditors and compliance personnel, BCP / DR personnel, executive and operational managers responsible for assurance functions.
Information Security Governance
- · Knowledge Statements
- · Introduction to Information Security Governance
- · Effective Information Security Governance
- · Governance and Third-Party Relationships
- · Information Security Metrics
- · Information Security Governance Metrics
- · Information Security Strategy
- · Information Security Strategy Development
- · Strategy Resources and Constraints
- · Other Frameworks
- · Compliances
- · Action Plans to Implement Strategy
- · Governance of Enterprise ITs
Information Risk Management
- · Information Risk Management
- · Task and Knowledge Statements
- · Risk Management Overview
- · Risk Assessment
- · Information Asset Classification
- · Assessment Management
- · Information Resource Valuation
- · Recovery Time Objectives
- · Security Control Baselines
- · Risk Monitoring
- · Training and Awareness
- · Information Risk Management Documentation
Infosec Program Development & Management
- · Task and Knowledge Statements
- · Information Security Program Management Overview
- · Information Security Program Objectives
- · Information Security Program Concepts
- · Information Security Program Technology Resources
- · Information Security Program Development
- · Information Security Program Framework
- · Information Security Program Roadmap
- · Enterprise Information Security Architecture (EISA)
- · Security Program Management and Administration
- · Security Program Services and Operational Activities
- · Controls
- · Security Program Metrics and Monitoring
- · Measuring Operational Performance
- · Common Information Security Program Challenges
Information Security Incident Management
- · Conduct periodic reviews of organisations objectives
- · Service level management
- · Third party management practices
- · Operations and end-user procedures
- · Process of information systems maintenance
- · Data administration practices determine the integrity and optimisation of databases
- · Use of capacity and performance monitoring tools and techniques
- · Problem and incident management practices
- · Change, configuration, and release management practices
- · Adequacy of backup and restore provisions
- · Organisation’s disaster recovery plan in the event of a disaster
- · Task and Knowledge Statements
- · Incident Management Overview
- · Incident Management Procedures
- · Incident Management Resources
- · Incident Management Objectives
- · Defining Incident Management Procedures
- · Incident Business Continuity and Disaster Recovery Procedures
- · Post Incident Activities and Investigation
- · ISACA Code of Professional Ethics
- · Laws and Regulations
- · Policy Versus Law Within an Organization
- · Ethics and the Internet IAB
- · Certified Information Security Manager
- · Certification requirements
- · CISM in the Workplace
- · The CISM Priorities
- · Understand How Questions Are Structured
- · Preparing for the Examination
- · Recommended Reading for the CISM Exam
- · Exam Favourites
Exams
- · Mock Exam Paper
- · Exam guidance, tricks
- · Previous Questions Papers
Join Our Community