Icon Drop a Query Icon Request a Call Back Icon Call us
Preloader
IconCall us: +91 9354485417
  • Follow Us On :

Course Description
You will acquire the requisite skills to design, deploy, and manage security architecture for your organization with this CISM certification training. This course is aligned with ISACA best practices. Today, enterprises and government agencies increasingly expect their IT professionals to hold a CISM certification.

What you'll learn in this course?

  • Information Security Governance
  • Information Risk Management
  • Information Security Program Development and Management
  • Information Security Incident Management


Prerequisites
Professional Experience::

Work Experience: A minimum of five years of work experience in information security management. This experience should be within the last ten years, with at least three of these years in information security management in three or more of the CISM content areas (Information Security Governance, Information Risk Management, Information Security Program Development and Management, and Information Security Incident Management).

Who Can Apply?
To become a CISM certified professional, you need to fulfil the following criteria:
•    A completed application must be submitted within 5 years from the date of initially passing the examination.
•    All experience must be verified independently with employers.
•    This experience must have been gained within the 10-year period preceding the application date for certification or within five years of passing the examination.
•    Three (3) years of the five (5) years of work experience must be gained performing the role of an information security manager
•    In addition, this work experience must be broad and gained in three (3) of the four (4) CISM® domains
•    What do I need to do to unlock my certificate?
 

Course Curriculum

• Information Security Governance Overview Part One,Two, Three, Four, Five

• Importance of Information Security Governance Part One and Two

• Outcomes of Information Security Governance Part one, two, three, four, five and six

• Lesson Two Effective Information Security Governance

• Business Goals and Objectives Part One and Two

• Roles and Responsibilities of Senior Management Part One and Two

• Domain Tasks Part One and two

• Business Model for Information Security Part One, two , three and four

• Dynamic Interconnections Part One, two, three and four

Three Information Security Concepts and Technologies

• Information Security Concepts and Technologies Part One, two and three

Lesson Four Information Security Manager

• Senior Management Commitment Part One and two

• Obtaining Senior Management Commitment Part One and Two

• Establishing Reporting and Communication Channels Part One and Two

Lesson Five Scope and Charter of Information Security Governance

• Assurance Process Integration and Convergence

• Convergence

• Governance and Third-Party Relationships

Lesson Six Information Security Governance Metrics

• Effective Security Metrics Part One, two, three and four

• Security Implementation Metrics

• Strategic Alignment Part One and Two

• Risk Management

• Value Delivery

• Resource Management Part One and Two

• Performance Measurement

• Assurance Process Integration/Convergence

Information Security Strategy Overview

• Another View of Strategy

Creating Information Security Strategy

• Information Security Strategy

• Common Pitfalls Part One and Two

• Objectives of the Information Security Strategy

• What is the Goal?

• Defining Objectives

• Business Linkages

• Business Case Development Part One, two and three

• Business Case Objectives and Desired State

• COBIT Control , framework

• Capability Maturity Model

• Architectural Approaches ,ISO/IEC and Risk Objectives Part One and Two

• Current Risk Part One and two

• BIA

Ten Information Security Strategy Development

• The Roadmap

• Elements of a Strategy

• Strategy Resources and Constraints

Strategy Resources

• Policies and Standards

• Definitions

• Enterprise Information Security Architectures

• Controls

• Countermeasures

• Technologies

• Personnel

• Organizational Structure

• Employee Roles and Responsibilities

• Skills, Audits and Compliance Enforcement

• Threat Assessment

• Vulnerability Assessment

• Risk Assessment

• Insurance

• Legal and Regulatory Requirements

• Physical Constraints

• The Security Strategy

Action Plan to Implement Strategy

• Gap Analysis Part One, two and three

• Standards Development

• Training and Awareness

• Action Plan Metrics

• General Metric Considerations Part One, two , three and four

• CMM Four Statements

• Objectives for CMM Four and Section Review

One Risk Management Overview

• Risk Management Overview

• Types of Risk Analysis

• The Importance of Risk Management

• Risk Management Outcomes

• Risk Management Strategy

Good Information Security Risk Management

• Context and Purpose

• Scope and Charter

• Assets

• Other Risk Management Goals

• Roles and Responsibilities

Information Security Risk Management Concepts

Implementing Risk Management

• The Risk Management Framework

• The External Environment

• The Internal Environment

• The Risk Management Context

• Gap Analysis

• Other Organizational Support

• NIST Risk Assessment Methodology

• Aggregated or Cascading Risk

• Other Risk Assessment Approaches

• Identification of Risks

• Threats

• Vulnerabilities Part One and Two

• Risk and Analysis of Relevant Risks

• Semi -Quantitative Analysis

• Quantitative Analysis Example

• Evaluation of Risks

• Risk Treatment Options

Controls Countermeasures

• Residual Risk

• Information Resource Valuation

• Methods of Valuing Assets

• Information Asset Classification

• Determining Classification

Seven Recovery Time Objectives

• Recovery Point Objectives

• Third-Party Service Providers

• Working with Lifecycle Processes