Course Description
This course is designed to help candidates prepare for sitting the ISACA CISM certification examination. By taking this course and obtaining CISM certification, your experience and skills in supporting the information security needs of your organization w
COURSE OBJECTIVES:Upon successful completion of this course, students will be able to:
- establish and maintain a framework to provide assurance that information security strategies are aligned with business objectives and consistent with applicable laws and regulations.
- identify and manage information security risks to achieve business objectives.
- create a program to implement the information security strategy.
- implement an information security program.
- oversee and direct information security activities to execute the information security program.
- plan, develop, and manage capabilities to detect, respond to, and recover from information security incidents.
Agenda
The Basics
- Security Concepts
- Governance, Goals, Strategies, Policies, Standards, and Procedures
- Strategy
- Risk Appetite, Tolerance, and Capacity
- Analysis of Risk
- Controlling Threats and Risk
- Controls and Countermeasures
- ALE, RTO, RPO, SDO, MTO, MTD, and AIW
- BCP, DRP, and BIA
- Business Continuity and Disaster Recovery
- Testing Incident Response, Business Continuity Plans, and Disaster Recovery Plans
- Roles, Responsibilities, RACI, and Skills
- Due Diligence and Due Care
- Security Principles
- KGIs, KPIs, KRIs, and CSFs
- Technologies
- Standards and Frameworks
- Culture
- Metrics
- Current State, Desired State, and the Gap in Between
- Information Security Infrastructure and Architecture
- Cloud Computing
- Metrics Development
- Business Model for Information Security (BMIS)
Four Domains
- Information Security Governance — Overview
- Information Security Governance — The Goal
- Information Security Governance — The Strategy
- Information Security Governance — Who Does What
- Information Security Governance — Resources That Help
- Information Security Governance — Constraints That Hurt
- Information Security Governance — The Action Plan
- Information Security Governance — Metrics and Monitoring
- Information Security Governance —What Success Looks Like
- Information Risk Management — Overview
- Information Risk Management — The Goal
- Information Risk Management — The Strategy
- Information Risk Management — Who Does What
- Information Risk Management — Resources That Help
- Information Risk Management — Constraints That Hurt
- Information Risk Management — The Action Plan
- Information Risk Management — Metrics, Monitoring, and Reporting
- Information Risk Management — What Success Looks Like
- Information Security Program Development and Management — Overview
- Information Security Program Development and Management — The Goal
- Information Security Program Development and Management — The Strategy
- Information Security Program Development and Management — Who Does What
- Information Security Program Development and Management — Resources That Help
- Information Security Program Development and Management — Constraints That Hurt
- Information Security Program Development and Management — The Action Plan
- Information Security Program Development and Management — Metrics and Monitoring
- Information Security Program Development and Management — What Success Looks Like
- Information Security Incident Management — Overview
- Information Security Incident Management — The Goal
- Information Security Incident Management — The Strategy
- Information Security Incident Management — Who Does What
- Information Security Incident Management — Resources That Help
- Information Security Incident Management — Constraints That Hurt
- Information Security Incident Management — The Action Plan
- Information Security Incident Management — Metrics and Monitoring
- Information Security Incident Management — What Success Looks Like
Audience
The intended audience for this course is information security and IT professionals, particularly IT managers who are interested in earning the CISM certification. The course is also applicable to individuals who are interested in learning in-depth information about information security management or who are looking for career advancement in IT security.
Comments
Virtual Certified Information Security Manager® (CISM) Online Live training option
Imagine an industry-leading classroom training experience from wherever you have access to the Internet.
The Virtual Online Live events listed here gives you an effective and proven online virtual learning experience with the freedom to attend virtually from anywhere.
There is also an option of experiencing Online Live from one of the many national partner centers where a computer and headset will be provided for you.
This rich and engaging virtual classroom environment lets you conveniently interact with instructors and other students.
You will hear and see your instructor as they teach the course and answer your questions via voice or text.
Choose the online live virtual training option and you can access the recorded version even after the class has finished.
The onDemand labs give you access to the same client and server technologies covered in class so you can test, apply and hone your skills by accessing the labs before and even after the class.
Technical Requirements: a computer or laptop with a modern browser and high speed internet access along with one or two monitors.