CISM Certified Information Security Manager Course
The Certified Information Security Manager (CISM) course offers specialized training in managing and governing enterprise information security. Participants gain expertise in key areas such as information risk management, security governance, incident response, and program development. The course includes practical scenarios and case studies to develop strategic and managerial skills for overseeing information security programs. It prepares individuals for the CISM certification exam, validating their ability to manage and align information security with business goals.
CISM Certified Information Security Manager Course Highlights
-
01
Lifetime access
-
02
Real-time case studies
-
03
24*7 Support from our team of administrators
-
04
Lifetime video access
-
05
The project integrated into the Curriculum
-
06
Access to Recorded Sessions
-
07
Interview Prep
-
08
Lab Access – Virtual Labs
Training Calender
Start Date | End Date | Start-End Time | Batch Type | Training Mode | Batch Status | Start Learning |
---|---|---|---|---|---|---|
27th Sep 2024 | 25th Nov 2024 | 09:00 - 13:00 IST | Weekend | Online | (Open) | Enroll Now |
Course Syllabus
Domain-1(INFORMATION SECURITY GOVERNANCE )
• Organizational Culture
• Legal, Regulatory and Contractual Requirements
• Organizational Structures, Roles and Responsibilities
• Information Security Strategy Development
• Information Governance Frameworks and Standards
• Strategic Planning (e.g., Budgets, Resources, Business Case)
Domain-2 (INFORMATION SECURITY RISK MANAGEMENT )
• Emerging Risk and Threat Landscape
• Vulnerability and Control Deficiency Analysis
• Risk Assessment and Analysis
• Risk Treatment / Risk Response Options
• Risk and Control Ownership
• Risk Monitoring and Reporting
Domain-3 ( INFORMATION SECURITY PROGRAM )
• Information Security Program Resources (e.g., People, Tools, Technologies)
• Information Asset Identification and Classification
• Industry Standards and Frameworks for Information Security
• Information Security Policies, Procedures and Guidelines
• Information Security Program Metrics
• Information Security Control Design and Selection
• Information Security Control Implementation and Integrations
• Information Security Control Testing and Evaluation
• Information Security Awareness and Training
• Management of External Services (e.g., Providers, Suppliers, Third Parties, Fourth Parties)
• Information Security Program Communications and Reporting
Domain-4 ( INCIDENT MANAGEMENT )
• Incident Response Plan
• Business Impact Analysis (BIA)
• Business Continuity Plan (BCP)
• Disaster Recovery Plan (DRP)
• Incident Classification/Categorization
• Incident Management Training, Testing and Evaluation
• Incident Management Tools and Techniques
• Incident Investigation and Evaluation
• Incident Containment Methods
• Incident Response Communications (e.g., Reporting, Notification, Escalation)
• Incident Eradication and Recovery
• Post-Incident Review Practices
Our Reviews
What Says Our Happy Clients
START LEARNING
Still Unsure ? Contact us & we will get back to you.
Let’s Connect
Email Information
Trainings: trainings@cyberhuntit.com
Business : sales@cyberhuntit.com
Recruitment information / General – hr@cyberhuntit.com
Address
Meridian Plaza, office No-301A, 3rd floor, Ameerpet Rd, Greenlands, Begumpet, Hyderabad, Telangana 500016