Certified Information Security Manager (CISM)

Course Overview

Certified Information Security Manager (CISM) is a certification offered by ISACA,  a nonprofit,  independent association that advocates for professionals involved in information security,  assurance,  risk management,  and governance.  CISM is an advanced certification that provides validation for individuals who have demonstrated they possess the knowledge and experience required to develop and manage an enterprise information security program. The certification intended for information security managers,  aspiring managers or IT consultants who support information security program management.

Course Benefits:

    • By the end of this training, you will be able to:

·         Define and design security architecture for your IT operation.

·         Develop a working knowledge of the four domains prescribed by the ISACA Exam Candidate Information Guide.

·         Demonstrate a deep understanding of the relationship between information security programs and broader business goals and objectives.

·         Focus on IT compliance and the integrity of enterprise systems to establish a more secure enterprise IT framework.

·         Earn the requisite 16 CPEs required to take the CISM certification exam. Acquire the relevant knowledge and skills required to pass the CISM certification exam

Audience

  • The ideal candidates for the course must be:

    ·         Experienced information security managers and officers

    ·         IT consultants and managers

    ·         IT auditors

    ·         IT security policy makers

    ·         Privacy officers

    ·         Network administrators

    ·         Network security engineers

    ·         Candidates seeking CISM certification

Course Outline

·         Information Security Governance Structure

·         Information Security Governance Structure Part 2

·         Information Security Governance Structure Part 3

·         Information Security Manager Role

·         Information Security Manager Role Part 2

·         IS Standards, Frameworks, And Best Practices

·         IS Standards, Frameworks, Best Practices Pt. 2

·         IS Standards, Frameworks, Best Practices Pt. 3

 

·         Information Security Governance – Key Points

·         Risk Management Concepts

·         Risk Management Concepts Part 2

·         The Risk Management Lifecycle

·         The Risk Management Lifecycle Part 2

·         The Risk Management Lifecycle Part 3

·         The Risk Management Lifecycle Part 4

·         The Risk Management Lifecycle Part 5

·         The Risk Management Lifecycle Part 6

·         The Risk Management Lifecycle Part 7

·         The Risk Management Lifecycle Part 8

·         Operational Risk Management

·         Operational Risk Management Part 2

 

·         Information Risk Management – Key Points

·         Information Security Programs

·         Information Security Programs Part 2

·         Information Security Programs Part 3

·         Audits, Audits, Audits

·         Audits, Audits, Audits Part 2

·         Audits, Audits, Audits Part 3

·         Security Program Operations

·         Security Program Operations Part 2

·         Security Program Operations Part 3

·         Security Program Operations Part 4

·         Security Program Operations Part 5

·         Security Program Operations Part 6

·         Security Program Operations Part 7

·         Security Program Operations Part 8

·         Security Program Operations Part 9

 

·         Info. Security Program Dev. Mgmt – Key Points

·         Incident Management Overview

·         Incident Response Procedure

·         Incident Response Procedure Part 2

·         Incident Responses Procedure Part 3

·         BCP And DRP

·         BCP And DRP Part 2

·         BCP And DRP Part 3

·         BCP And DRP Part 4

·         BCP And DRP Part 5

 

·         Information Security Incident Mgmt – Key Points

₦ 30,000

  • Learn at your own pace with 24/7 access
  • Duration: 1 year
× How can we help you?