Course Name
Certified Information Security Manager (CISM)
Contact Hours: 40
Course Description
IT Security is without question one of the hottest and most lucrative areas of Information Technology today and the CISM is one of the most valued credentials in the marketplace. This course promotes international practices and provides management with assurance that those earning this designation have the necessary knowledge and experience to provide effective security management. This course trains students for a position in Risk Management, Security Auditor, Compliance Officer or an executive management position as a CSO, CTO or CIO.
The demand for skilled information security management professionals is on the rise, and the CISM certification is the globally accepted standard of achievement in this area. CISMs understand the business. They know how to manage and adapt technology to their enterprise and industry.
Please note: Course of study may be completed earlier than indicated and students retain access for one year from date of enrollment.
Outcome
CISM certification is for IT professionals looking to gain the following security analyst skills:
Identify the tasks within the information security governance job practice area
Recognize the outcomes of information security governance
Recognize the difference between corporate governance and information security governance
Match senior management roles with their corresponding responsibilities related to information security governance
Identify the elements of the information security business model
Recognize the interconnections between the elements of the information security business model
Recognize key concepts related to information security governance
Identify the optimal reporting relationship between senior management and the information security manager
Label examples of reports about information security according to their intended recipients within an organization
Identify the goal of converging security-related functions
Identify categories of key goal indicators
Recognize key concepts related to information security management
Assessment
Visual Demonstrations & Multimedia Presentations - Our courseware includes instructor-led demonstrations and visual presentations that allow students to develop their skills based on real world scenarios explained by the instructor. We always focus on real world scenarios and skill-set development.
Required Book(s)
All training is delivered online; no additional purchase required.
Outline
Module 1: Information Security Governance
Module 2: Risk Management
Module 3: Information Security Program Development
Module 4: Information Security Program Implementation
Module 5: Information Security Program Management
Module 6: Incident Management and Response
To receive a complete and comprehensive course outline write to courseinfo@jeronline.com and include the complete course title.