Introduction:
This course has been designed to provide you with a solid foundation of knowledge and skills required to understand the CISM examination and excel in the field of information security management. Through a combination of theoretical concepts, practical examples, and interactive exercises, this course will empower you to understand and apply the core principles and best practices of information security management.
Objectives:
- Mastering Information Security Management with CISM Certification
- Certified Information Security Manager (CISM): Comprehensive Training
- CISM Certification: Advancing Your Career in Information Security Management
- Achieving CISM: Mastering Information Security Governance and Risk
- Certified Information Security Manager (CISM) Exam Preparation Course
- CISM: A Strategic Approach to Information Security Management
- Certified Information Security Manager (CISM): Core Concepts and Practices
- Enhance Your Information Security Skills with CISM Certification
- CISM Training: Building Expertise in Information Security and Risk Management
- Certified Information Security Manager (CISM): Leading Information Security Programs.
Course Outline:
INFORMATION SECURITY GOVERNANCE
- ENTERPRISE GOVERNANCE
- Organizational Culture
- Legal, Regulatory and Contractual Requirements
- Organizational Structures, Roles and Responsibilities
- INFORMATION SECURITY STRATEGY
- Information Security Strategy Development
- Information Governance Frameworks and Standards
- Strategic Planning (e.g., Budgets, Resources, Business Case)
INFORMATION SECURITY RISK MANAGEMENT
- INFORMATION SECURITY RISK ASSESSMENT
- Emerging Risk and Threat Landscape
- Vulnerability and Control Deficiency Analysis
- Risk Assessment and Analysis
- INFORMATION SECURITY RISK RESPONSE
- Risk Treatment / Risk Response Options
- Risk and Control Ownership
- Risk Monitoring and Reporting.
INFORMATION SECURITY PROGRAM
- INFORMATION SECURITY PROGRAM DEVELOPMENT
- Information Security Program Resources (e.g., People, Tools, Technologies)
- Information Asset Identification and Classification
- Industry Standards and Frameworks for Information Security
- Information Security Policies, Procedures and Guidelines
- Information Security Program Metrics
- INFORMATION SECURITY PROGRAM MANAGEMENT
- Information Security Control Design and Selection
- Information Security Control Implementation and Integrations
- Information Security Control Testing and Evaluation
- Information Security Awareness and Training.
- Management of External Services (e.g., Providers, Suppliers, Third Parties, Fourth Parties)
- Information Security Program Communications and Reporting.
INCIDENT MANAGEMENT
- INCIDENT MANAGEMENT READINESS
- Incident Response Plan
- Business Impact Analysis (BIA)
- Business Continuity Plan (BCP)
- Disaster Recovery Plan (DRP)
- Incident Classification/Categorization
- Incident Management Training, Testing and Evaluation.
- INCIDENT MANAGEMENT OPERATIONS
- Incident Management Tools and Techniques
- Incident Investigation and Evaluation
- Incident Containment Methods
- Incident Response Communications (e.g., Reporting, Notification, Escalation)
- Incident Eradication and Recovery
- Post-Incident Review Practices.