Font size:

Description:

This is a bundled training package. It contains training for each of the bundled items below:

Course Price
CISM: Information Security Program Development and Management (Part 1) $74.95
CISM: Information Security Program Development and Management (Part 2) $74.95
CISM: Information Security Program Development and Management (Part 3) $74.95
CISM: Information Security Program Development and Management (Part 4) $74.95
CISM: Information Security Program Development and Management (Part 5) $74.95

Bundle Price: $199.00
Total Savings: $175.75


CISM: Information Security Program Development and Management (Part 1)

An information security program is the foundation of an information security manager's daily work. This course examines the purpose and fundamentals of IS program development and management, along with the objectives, concepts, and tasks that make up an IS program. This course also examines the scope and charter of an IS program, and how the IS Manager must understand the scope of the program, and things such as chain of command, corporate culture, existing functions, current state of security, and industry standards for information security. It outlines the steps for developing an IS program and how an information security program supports the objectives of information security governance. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2015 ISACA Candidate Information Guide.
  • define the purpose of the Information Security Program Development and Management domain
  • describe the tasks within Information Security Program Development and Management job practice area
  • describe the fundamentals of an information security program
  • recognize how an information security program supports the objectives of information security governance
  • identify the defining goals of the information security program
  • identify key information security program concepts
  • develop an information security program
  • develop an information security program

CISM: Information Security Program Development and Management (Part 2)

An information security framework represents the entire IS management structure. This course examines governance frameworks such as COBIT 5 and industry standards like ISO/IEC 27001:2013. This course also examines the components of a security framework: operational components, management components, administrative components, and education and informational components. The course then explains how an IS program road map is defined, and the elements that make up the road map. Finally, the course describes the security architectures and how they are implemented. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2015 ISACA Candidate Information Guide.
  • describe the function of COBIT 5 in the information security management framework
  • identify the objectives of the information security management framework
  • describe the function of ISO/IEC 27001:2013 in the information security management framework
  • recognize the components of the information security management framework
  • create an information security program road map
  • recognize what the information security architecture involves
  • recognize the questions an information security manager should ask when building an IS architecture
  • develop an information security management framework

CISM: Information Security Program Development and Management (Part 3)

Information security managers are responsible for all administrative activities related to the development and management of an information security program. Those activities include such things as assigning and training security personnel, overseeing the creation and distribution of policies and other documentation, and monitoring the effectiveness of the security program itself. This course examines the many activities that an information security manager is responsible for and the skills required to perform them. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2015 ISACA Candidate Information Guide.
  • identify responsibilities of an information security manager related to administering an information security program
  • identify good practices related to security personnel and positive security culture
  • identify areas that should be part of a security awareness program
  • identify areas that an information security manager must be aware of and raise awareness of amongst security personnel
  • identify responsibilities of information security manager related to documentation
  • identify project management processes that are performed by information security managers
  • recognize key activities of the PDCA methodology
  • identify key points regarding the evaluation of an information security program
  • recognize key points related to information security management
  • recognize key project management responsibilities of an information security manager
  • recognize key points about evaluating an information security program

CISM: Information Security Program Development and Management (Part 4)

Information security programs typically have numerous operational responsibilities and provide a variety of security services. While programs vary from organization to organization, there are operations and services that are typically found in all well conceived security programs. This course examines the activities and responsibilities of an information security manager related to operations and services within an organization. The course will examine different organizational units such as IT, HR, and Legal that are affected by security programs, and how their needs are integrated into the program. This course also examines how audits and compliance enforcement are performed. Finally, this course examines how technology - both legacy and new technologies such as cloud computing - are managed in modern security programs. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2015 ISACA Candidate Information Guide.
  • match information organizational roles to their corresponding responsibilities
  • determine the responsibilities of individuals within an organization related to standard security program components
  • sequence the steps of a security review, given a scenario
  • identify key points regarding audits that an information security manager should remember during program implementation
  • identify preventive measures that minimize security risk
  • identify the responsibilities of an information security manager with relation to compliance monitoring and enforcement
  • recognize the results of commonly used risk analysis methods
  • recognize the responsibilities of an information security manager related to monitoring and compliance
  • identify activities that allow an information security manager to integrate a security program within an organization
  • recognize strategies for managing risk of outsourcing when using third-party service providers
  • recognize examples of cloud computing models
  • recognize the responsibilities of an information security manager related to process integration and outsourcing

CISM: Information Security Program Development and Management (Part 5)

Security programs require strong controls and countermeasures to ensure that security activities are carried out and measures exist to deal with issues that may arise while a security program is being implemented. This course examines control categories, control design considerations, and the control methods and recommendations that a security manager should implement. This course will also discuss the metrics and monitoring practices that should be used put in place as part of a security program. Finally, this course will examine common information security program challenges. This course prepares you for the Certified Information Security Manager (CISM) exam and follows the 2015 ISACA Candidate Information Guide.
  • distinguish between two types of information security controls
  • recognize principles of effective security control
  • recognize examples of physical, environmental, and technical controls
  • distinguish between examples of controls and countermeasures
  • identify factors to consider when recommending improvements to information security controls
  • describe types of controls and how they are used in information security management
  • explain the use of controls and countermeasures to manage risk
  • categorize examples of information security metrics
  • determine whether a given metric would be effective
  • recognize examples of measures used to assess the effectiveness of an information security program
  • recognize examples of monitoring activities
  • recognize the relationship between information security metrics, measurement, and monitoring
  • recognize effective approaches to measuring and monitoring an information security program
  • recognize strategies for overcoming common challenges to information security management
Register Now
Certified Information Security Manager (CISM) 2013 Part 2 e-learning bundle
  • Course ID:
    252711
  • Duration:
    8 hours
  • Price:
    $199