What are the course objectives?
This CISM certification training from Simplilearn will give you the requisite skillsets to design, deploy and manage security architecture for your organization. The course is aligned with ISACA best practices and is designed to help you pass the CISM exam on your first attempt. Enterprises and government agencies increasingly expect their IT professionals to hold a CISM certification, and it is considered essential to ongoing education and career development. This course will see that you are well-equipped to manage the ongoing security, compliance and governance of your IT organization.
What skills will you learn?
By the end of this training you will be able to:
- Define and design security architecture for your IT operation
- Develop a working knowledge of the four domains prescribed by the ISACA Exam Candidate Information Guide 2015
- Demonstrate a deep understanding of the relationship between information security programs and broader business goals and objectives.
- Focus on IT compliance and the integrity of enterprise systems to establish a more secure enterprise IT framework
- Earn the requisite 16 CPEs required to take the CISM certification exam
- Acquire the relevant knowledge and skills required to pass the CISM certification exam
Who should take this course?
CISM certification is a globally recognized professional requirement in the IT Security domain. This certification is best suited for:
- Security consultants and managers
- IT directors and managers
- Security auditors and architects
- Security systems engineers
- Chief Information Security Officers (CISOs)
- Information security managers
- IS/IT consultants
- Chief Compliance/Privacy/Risk Officers
-
CISM 2018
Domain 01: Information Security Governance
- Lesson 1: Information Security Governance Overview
- Lesson 2: Effective Information Security Governance
- Lesson 3: Information Security Concepts and Technologies
- Lesson 4: Information Security Manager
- Lesson 5: Scope and Charter of Information Security Governance
- Lesson 6: Information Security Governance Metrics
- Lesson 7: Information Security Strategy Overview
- Lesson 8: Creating Information Security Strategy
- Lesson 9: Determining Current State Of Security
- Lesson 10: Information Security Strategy Development
- Lesson 11: Strategy Resources
- Lesson 12: Strategy Constraints
- Lesson 13: Action Plan to Implement Strategy
-
Domain 02: Information Risk Management and Compliance
- Lesson 1: Risk Management Overview
- Lesson 2: Good Information Security Risk Management
- Lesson 3: Information Security Risk Management Concepts
- Lesson 4: Implementing Risk Management
- Lesson 5: Risk Assessment
- Lesson 6: Controls Countermeasures
- Lesson 7: Recovery Time Objectives
- Lesson 8: Risk Monitoring and Communication
-
Domain 03: Information Security Program Development and Management
- Lesson 1: Development of Information Security Program
- Lesson 2: Information Security Program Objectives
- Lesson 3: Information Security Program Development Concepts Part 1
- Lesson 4: Scope and Charter of Information Security Program Development
- Lesson 5: Incident Management Objectives
- Lesson 6: Incident Management Metrics and Indicators
- Lesson 7: Current State of Incident Response Capability
- Lesson 9: BCP/DRP
- Lesson 10: Testing Response and Recovery Plans
- Lesson 11: Executing the Plan
-
Domain 04: Information Security Incident Management
- Lesson 1: Incident Management Overview Part 1
- Lesson 2: Incident Response Procedures Part 1
- Lesson 3: Incident Management Organization
- Lesson 4: Incident Management Resources
- Lesson 5: Incident Management Objectives
- Lesson 6: Incident Management Metrics and Indicators
- Lesson 7: Current State of Incident Response Capability
- Lesson 9: BCP/DRP
- Lesson 10: Testing Response and Recovery Plans
- Lesson 11: Executing the Plan
0.0
0 total
5
4
3
2
1