CourseInfo | SimpliTrain

Certified Information Security Manager® (CISM)

Learning plan iconE-Learning

Description

This course is designed to help candidates prepare for sitting the ISACA CISM certification examination. By taking this course and obtaining CISM certification, your experience and skills in supporting the information security needs of your organization will be validated. Securing the organization’s information is a critical business objective in today’s business environment. The information that an organization depends on to be successful can be at risk from numerous sources. By effectively managing information security, you can address these risks and ensure the organization remains healthy and competitive in the marketplace.

This course is designed to help candidates prepare for sitting the ISACA CISM certification examination. By taking this course and obtaining CISM certification, your experience and skills in supporting the information security needs of your organization will be validated. Securing the organization’s information is a critical business objective in today’s business environment. The information that an organization depends on to be successful can be at risk from numerous sources. By effectively managing information security, you can address these risks and ensure the organization remains healthy and competitive in the marketplace.

Upon successful completion of this course, students will be able to:
Establish and maintain a framework to provide assurance that information security strategies are aligned with business objectives and consistent with applicable laws and regulations
Identify and manage information security risks to achieve business objectives
Create a program to implement the information security strategy
implement an information security program
Oversee and direct information security activities to execute the information security program
Plan, develop, and manage capabilities to detect, respond to, and recover from information security incidents.

The intended audience for this course is information security and IT professionals, particularly IT managers who are interested in earning the CISM certification. The course is also applicable to individuals who are interested in learning in-depth information about information security management or who are looking for career advancement in IT security.

Lesson Id Title Description
1 Information Security Governance Enterprise Governance
Organizational Culture
Legal, Regulatory, and Contractual Requirements
Organizational Structures, Roles, and Responsibilities
Information Security Strategy
Information Security Strategy Development
Information Governance Frameworks and Standards
Strategic Planning (e.g., budgets, resources, business case)
2 Information Security Risk Management Information Security Risk Assessment
Emerging Risk and Threat Landscape
Vulnerability and Control Deficiency Analysis
Risk Assessment and Analysis
Information Security Risk Response
Risk Treatment / Risk Response Options
Risk and Control Ownership
Risk Monitoring and Reporting
3 Information Security Program Information Security Program Development
Information Security Program Resources (e.g., people, tools, technologies)
Information Asset Identification and Classification
Industry Standards and Frameworks for Information Security
Information Security Policies, Procedures, and Guidelines
Information Security Program Metrics
Information Security Program Management
Information Security Control Design and Selection
Information Security Control Implementation and Integrations
Information Security Control Testing and Evaluation
Information Security Awareness and Training/td>
Management of External Services (e.g., providers, suppliers, third parties, fourth parties)
Information Security Program Communications and Reporting
4 Incident Management Incident Management Readiness
Incident Response Plan
Business Impact Analysis (BIA)
Business Continuity Plan (BCP)
Disaster Recovery Plan (DRP)
Incident Classification/Categorization
Incident Management Training, Testing, and Evaluation
Incident Management Operations
Incident Management Tools and Techniques
Incident Investigation and Evaluation
Incident Containment Methods
Incident Response Communications (e.g., reporting, notification, escalation)
Incident Eradication and Recovery
Post-incident Review Practices
Self-Paced

Free

Enroll icon
This course includes: :
Full lifetime access