Skip to content

CISM - Certified Information Security Manager Training Course


Learning 247

Summary

Price
£59 inc VAT
Or £19.67/mo. for 3 months...
Study method
Online
Duration
Self-paced
Qualification
No formal qualification
Certificates
  • Certificate of completion - Free

22 students purchased this course

Add to basket or enquire

Overview

The Certified Information Security Manager (CISM) certification program was developed by ISACA to start or develop individuals careers as security managers. Once certified the CISM qualifies students to design, manage, asses and oversee an enterprise’s information security infrastructure.

IT Security is without question one of the hottest and most lucrative areas of Information Technology today and the CISM is one of the most valued credentials in the marketplace. This ITU course promotes international practices and provides management with assurance that those earning this designation have the necessary knowledge and experience to provide effective security management. This course trains students for a position in Risk Management, Security Auditor, Compliance Officer or an executive management position as a CSO, CTO or CIO.

Description

CISA COURSE OUTLINE
DOMAIN 1: Information Security Governance

  • CISM Introduction
  • Information Security
  • Business Goals Objectives and Functions
  • Business Goals and Information Security
  • Information Security Threats
  • Information Security Management
  • Identity Management
  • Data Protection
  • Network Security
  • Personnel Security
  • Facility Security
  • Security Compliance and Standards
  • Information Security Strategy
  • Inputs and Outputs of the Information Security Strategy
  • Process in an Information Security Strategy
  • People in an Information Security Strategy
  • Technologies in an Information Security Strategy
  • Logical And Physical Information Security Strategy Architectures
  • Information Security And Business Functions
  • Information Security Policies And Enterprise Objectives
  • International Standards For The Security Management
  • I S O- I E C27000 Standards
  • International Info Government Standards
  • Information Security Government Standards In The United States
  • Methods Of Coordinating Information Security Activities
  • How To Develop An Information Security Strategy
  • Information Security Governance
  • Role Of The Security In Governance
  • Scope Of Information Security Governance
  • Charter Of Information Security Governance
  • Information Security Governance And Enterprise Governance
  • How To Align Information Security Strategy With Corporate Governance
  • Regulatory Requirements And Information Security
  • Business Impact Of Regulatory Requirements
  • Liability Management
  • Liability Management Strategies
  • How To Identify Legal And Regulatory Requirements
  • Business Case Development
  • Budgetary Reporting Methods
  • Budgetary Planning Strategy
  • How To Justify Investment In InfOSecurity
  • Organizational Drivers
  • Impact Of Drivers On InfOSecurity
  • Third Party Relationships
  • How To Identify Drivers Affecting The Organization
  • Purpose Of Obtaining Commitment To InfOSecurity
  • Methods For Obtaining Commitment
  • I S S G
  • I S S G Roles And Responsibilities
  • I S S G Operation
  • How To Obtain Senior Managements Commitment To InfOSecurity
  • InfOSecurity Management Roles And Responsibilities
  • How To Define Roles And Responsibilities For InfOSecurity
  • The Need For Reporting And Communicating
  • Methods For Reporting In An Organization
  • Methods Of Communication In An Organization
  • How To Establish Reporting And Communicating Channels


DOMAIN 2 Risk Management

  • Risk
  • Risk Assessment
  • Info Threat Types
  • Info Vulnerabilities
  • Common Points of Exposure
  • InfOSecurity Controls
  • Types Of InfOSecurity Controls
  • Common InfOSecurity Countermeasures
  • Overview Of The Risk Assessment Process
  • Factors Used In Risk Assessment And Analysis
  • Risk Assessment Methodologies
  • Quantitative Risk Assessment- Part1
  • Quantitative Risk Assessment- Part2
  • Qualitative Risk Assessment
  • Hybrid Risk Assessment
  • Best Practices For InfOSecurity Management
  • Gap Analysis
  • How To Implement An Info Risk Assessment Process
  • Info Classification Schemas
  • Components Of Info Classification Schemas
  • Info Ownership Schemas
  • Components Of Info Ownership Schemas
  • Info Resource Valuation
  • Valuation Methodologies
  • How To Determine Info Asset Classification And Ownership
  • Baseline Modeling
  • Control Requirements
  • Baseline Modeling And Risk Based Assessment Of Control Requirements
  • How To Conduct Ongoing Threat And Vulnerability Evaluations
  • B I As
  • B I A Methods
  • Factors For Determining Info Resource Sensitivity And Critically
  • Impact Of Adverse Events
  • How To Conduct Periodic B I As
  • Methods For Measuring Effectiveness Of Controls And Countermeasures
  • Risk Mitigation
  • Risk Mitigation Strategies
  • Effect Of Implementing Risk Mitigation Strategies
  • Acceptable Levels Of Risk
  • Cost Benefit Analysis
  • How To Identify And Evaluate Risk Mitigation Strategies
  • Life Cycle Processes
  • Life Cycle- Based Risk Management
  • Risk Management Life Cycle
  • Business Life Cycle Processes Affected By Risk Management
  • Life Cycled- Based Risk Management Principles And Practices
  • How To Integrate Risk Management Into Business Life Cycle Processes
  • Significant Changes
  • Risk Management Process
  • Risk Reporting Methods
  • Components Of Risk Reports
  • How To Report Changes In Info Risk


DOMAIN 3: Information Security Program

  • InfOSecurity Strategies
  • Common InfOSecurity Strategies
  • InfOSecurity Implementation Plans
  • Conversation Of Strategies Into Implementation Plans
  • InfOSecurity Programs
  • InfOSecurity Program Maintenance
  • Methods For Maintaining An InfOSecurity Program
  • Succession Planning
  • Allocation Of Jobs
  • Program Documentation
  • How To Develop Plans To Implement An InfOSecurity Strategy
  • Security Technologies And Controls
  • Cryptographic Techniques
  • Symmetric Cryptography
  • Public Key Cryptography
  • Hashes
  • Access Control
  • Access Control Categories
  • Physical Access Controls
  • Technical Access Controls
  • Administrative Access Controls
  • Monitoring Tools
  • I D Ss
  • Anti- Virus Systems
  • Policy- Compliance Systems
  • Common Activities Required In InfOSecurity Programs
  • Prerequisites For Implementing The Program
  • Implementation Plan Management
  • Types Of Security Controls
  • InfOSecurity Controls Development
  • How TOSpecify InfOSecurity Program Activities
  • Business Assurance Function
  • Common Business Assurance Functions
  • Methods For Aligning InfOSecurity Program With Business Assurance Functions
  • How To Coordinate InfOSecurity Programs With Business Assurance Functions
  • S L As
  • Internal Resources
  • External Resources
  • Services Provided By External Resources- Part1
  • Services Provided By External Resources- Part2
  • Skills Commonly Required For InfOSecurity Program Implementation
  • Identification Of Resources And Skills Required For A Particular Implementation
  • Resource Acquisition Methods
  • Skills Acquisition Methods
  • How To Identify Resources Needed For InfOSecurity Program Implementation
  • InfOSecurity Architectures
  • The S A B S A Model For Security Architecture
  • Deployment Considerations
  • Deployment Of InfOSecurity Architectures
  • How To Develop InfOSecurity Architectures
  • InfOSecurity Policies
  • Components Of InfOSecurity Policies
  • InfOSecurity Policies And The InfOSecurity Strategy
  • InfOSecurity Policies And Enterprise Business Objectives
  • InfOSecurity Policy Development Factors
  • Methods For Communicating InfOSecurity Policies
  • InfOSecurity Policy Maintenance
  • How To Develop InfOSecurity Policies
  • InfOSecurity Awareness Program Training Programs And Education Programs
  • Security Awareness Training And Education Gap Analysis
  • Methods For Closing The Security Awareness Training And Education Gaps
  • Security- Based Cultures And Behaviors
  • Methods For Establishing And Maintaining A Security- Based Culture In The Enterprise
  • How To Develop InfOSecurity Awareness Training And Education Programs
  • Supporting Documentation For InfOSecurity Policies
  • Standards Procedures Guidelines And Baselines
  • Codes Of Conduct
  • N D As
  • Methods For Developing Supporting Documentation
  • Methods For Implementing Supporting Documentation And For Communicating Supporting Documentation
  • Methods For Maintaining Supporting Documentation
  • C And A
  • C And A Programs
  • How To Develop Supporting Documentation For InfOSecurity Policies


DOMAIN 4: Information Security Program Implementation


DOMAIN 5 Information Security Program Management


DOMAIN 6: Incident Management and Response

Questions and answers


No questions or answers found containing ''.


Richard Ryan asked:

Do you have module descriptions for modules five and six just as for one for example

Answer:

This is Part of Module 5 - Unable to use more than 500 characters in my response. Management Metrics Types of Management Metrics Data Collection Periodic Reviews Monitoring Approaches KPI's Types of Measurements Other Measurements Info Security Reviews The Role of Assurance Providers Comparing Internal and External Assurance Providers Line Management Technique Budgeting Staff Management Facilities How to Manage Info Security Program Resources Security Policies

This was helpful. Thank you for your feedback.
HayleyC asked:

Is this a regulated or endorsed course?

Answer:

Hi Hayley, The course does cover everything you need to prepare you for the exam but is not endorsed.

This was helpful. Thank you for your feedback.
Rashid asked:

is exam and certificate included in price

Answer:

The Official Certification exam is not included. This is the training course only but it does come with a Certificate of Completion once the course is completed.

This was helpful. Thank you for your feedback.

Certificates

Certificate of completion

Digital certificate - Included

Reviews

Currently there are no reviews for this course. Be the first to leave a review.

FAQs

Study method describes the format in which the course will be delivered. At Reed Courses, courses are delivered in a number of ways, including online courses, where the course content can be accessed online remotely, and classroom courses, where courses are delivered in person at a classroom venue.

CPD stands for Continuing Professional Development. If you work in certain professions or for certain companies, your employer may require you to complete a number of CPD hours or points, per year. You can find a range of CPD courses on Reed Courses, many of which can be completed online.

A regulated qualification is delivered by a learning institution which is regulated by a government body. In England, the government body which regulates courses is Ofqual. Ofqual regulated qualifications sit on the Regulated Qualifications Framework (RQF), which can help students understand how different qualifications in different fields compare to each other. The framework also helps students to understand what qualifications they need to progress towards a higher learning goal, such as a university degree or equivalent higher education award.

An endorsed course is a skills based course which has been checked over and approved by an independent awarding body. Endorsed courses are not regulated so do not result in a qualification - however, the student can usually purchase a certificate showing the awarding body's logo if they wish. Certain awarding bodies - such as Quality Licence Scheme and TQUK - have developed endorsement schemes as a way to help students select the best skills based courses for them.