1 / 4

WL - CISM Certification and Training Course in Hyderabad

Elevate your career in information security management with our Certified Information Security Manager (CISM) certification and training course. Designed for security professionals, this comprehensive program covers essential topics such as information risk management, governance, incident response, and security program development. Our CISM course prepares you for the globally recognized CISM certification exam, equipping you with the skills and knowledge needed to manage and oversee enterprise-level information security programs.

WiseLearner
Download Presentation

WL - CISM Certification and Training Course in Hyderabad

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CISM TRAINING EXAM PREPARATION TRAINING WHAT IS CISM? ■ The CISM Online Review Course is an online preparation course that prepares learners to pass the CISM certification exam using proven instructional design techniques and interactive activities. The course covers all four of the CISM domains, and each section corresponds directly to the CISM Exam Content Outline. ■ The course incorporates video, narrated interactive eLearning modules, downloadable, interactive workbooks, downloadable job aids, case study activities, and a practice exam. Learners will be able to navigate the course at their own pace, following a recommended structure, or target preferred job practice areas. Learners may also start and stop the course based on their study schedule, picking up exactly where they left off the next time they access the course. BENEFIT OF CISM ■ CISM certification is a globally recognized professional requirement in the IT Security domain. This certification is best suited for security consultants and managers, IT directors and managers, security auditors and architects, security system engineers, CISOs, information security managers, and risk officers. Office +91 40 42603339 | info@wiselearner.com | www.wiselearner.com

  2. WHO SHOULD ATTEND? ■ ■ ■ ■ ■ Professionals preparing to become CISM certified CISA or CISSP-certified individuals looking to move into information security management General security management professionals looking to move into information security Information security managers Mid-level career chang LEARNING OBJECTIVES At the completion of this course you will be able to: ■ Explain the relationship between executive leadership, enterprise governance and information security governance. ■ Outline the components used to build an information security strategy. ■ Explain how the risk assessment process influences the information security strategy. ■ Articulate the process and requirements used to develop an effective information risk response strategy. ■ Describe the components of an effective information security program. ■ Explain the process to build and maintain an enterprise information security program. ■ Outline techniques used to assess the enterprise’s ability and readiness to manage an information security incident. ■ Outline methods to measure and improve response and recovery capabilities. Office +91 40 42603339 | info@wiselearner.com | www.wiselearner.com

  3. COURSE CONTENTS ■ Explain how to manage the IS program using con- trols. Create a strategy to enhance awareness and knowl- edge of the information security program. Describe the process of integrating the security pro- gram with IT operations and third-party providers. Communicate key IS program information to rel- evant stakeholders. Domain 1 : Information Security Governance ■ Describe the role of governance in creating value for the enterprise. ■ Explain the importance of information security govern- ance in the context of overall enterprise governance. ■ Describe the influence of enterprise leadership, struc- ture and culture on the effectiveness of an information security strategy. ■ Identify the relevant legal, regulatory and contractual requirements that impact the enterprise. ■ Describe the effects of the information security strategy on enterprise risk management. ■ Evaluate the common frameworks and standards used to govern an information security strategy. ■ Explain why metrics are critical in developing and evalu- ating the information security strategy. ■ ■ ■ Domain 4 – Incident Management ■ Distinguish between incident management and incident response ■ Outline the requirements and procedures necessary to develop an incident response plan. ■ Identify techniques used to classify or categorize incidents. ■ Outline the types of roles and responsibilities required for an effective incident management and response team ■ Distinguish between the types of incident manage- ment tools and technologies available to an enter- prise. ■ Describe the processes and methods used to investi- gate, evaluate and contain an incident. ■ Identify the types of communications and notifica- tions used to inform key stakeholders of incidents and tests. ■ Outline the processes and procedures used to eradi- cate and recover from incidents. ■ Describe the requirements and benefits of docu- menting events. ■ Explain the relationship between business impact, continuity and incident response. ■ Describe the processes and outcomes related to disaster recovery. ■ Explain the impact of metrics and testing when evaluating the incident response plan. Domain 2 : Information Security Risk Management ■ Apply risk assessment strategies to reduce the impact of information security risk. ■ Assess the types of threats faced by the enterprise. ■ Explain how security control baselines affect vulnerabil- ity and control deficiency analysis. ■ Differentiate between application of risk treatment types from an information security perspective. ■ Describe the influence of risk and control ownership on the information security program. ■ Outline the process of monitoring and reporting infor- mation security risk. Domain 3: Information Security Program ■ Outline the components and resources used to build an information security program. ■ Distinguish between common IS standards and frameworks available to build an information security program. ■ Explain how to align IS policies, procedures and guide- lines with the needs of the enterprise. ■ Describe the process of defining an IS program road map. ■ Outline key IS program metrics used to track and report progress to senior management. Office +91 40 42603339 | info@wiselearner.com | www.wiselearner.com

  4. CERTIFICATION CISM Exam Information: ■ Exam Duration : 2 Hours ■ Exam Format : Multiple Choices ■ Number of Questions : 80 Questions PREREQUISITE Learners need to possess an undergraduate degree or a high school diploma. A completed application submitted within five years from the date of initially passing the examination (you must ensure that all experience is independently verified by employers). The experience must have been gained within the 10-year period preceding the application date for certification or within five years of passing the examination. Three of the five years of work experience must be gained in the role of an information security manager (it must be broad and gained in three of the four CISM domains). Office +91 40 42603339 | info@wiselearner.com | www.wiselearner.com

More Related