-
- Distinguish between incident management and incident response
- Outline the requirements and procedures necessary to develop an incident response plan.
- Identify techniques used to classify or categorize incidents.
- Outline the types of roles and responsibilities required for an effective incident management and response team
- Distinguish between the types of incident management tools and technologies available to an enterprise.
- Describe the processes and methods used to investigate, evaluate and contain an incident.
- Identify the types of communications and notifications used to inform key stakeholders of incidents and tests.
- Outline the processes and procedures used to eradicate and recover from incidents.
- Describe the requirements and benefits of documenting events.
- Explain the relationship between business impact, continuity and incident response.
- Describe the processes and outcomes related to disaster recovery.
- Explain the impact of metrics and testing when evaluating the incident response plan.
Course Overview
The Certified Information Security Manager (CISM) course provides in-depth coverage of the four domains covered on the CISM certification exam: Security Governance; Risk Management and Compliance; Security Program Development and Management; and Security Incident Management. This course provides the knowledge on how to assess risks, implement effective governance and proactively respond to incidents.
Who Should Attend
The CISM security certification is designed for mid-level and advanced cybersecurity professionals with prior experience in information security. This certification helps professionals progress into managerial roles and effectively address challenges in information security. The course is ideal for the following roles:
-
- Information security managers
- Information security consultants
- Chief Information Officers (CIOs)
By earning an ISACA CISM certification, you will demonstrate your expertise in assessing and designing information security management programs. This enables you to advance your career while gaining the knowledge and skills needed to tackle cyber threats, making you a highly desirable candidate for employers in the field.
Learners will have access to the course for one year from date of purchase and will earn 20 CPE upon completion. This course has a seat time of approximately 16 hours and is accessed via the Learning Access tab of your My ISACA dashboard.
Learning Objectives:
At the completion of this course you will be able to:
- Explain the relationship between executive leadership, enterprise governance and information security governance.
- Outline the components used to build an information security strategy.
- Explain how the risk assessment process influences the information security strategy.
- Articulate the process and requirements used to develop an effective information risk response strategy.
- Describe the components of an effective information security program.
- Explain the process to build and maintain an enterprise information security program.
- Outline techniques used to assess the enterprise’s ability and readiness to manage an information security incident.
- Outline methods to measure and improve response and recovery capabilities.
Ideal For:
- Professionals preparing to become CISM certified
- CISA or CISSP-certified individuals looking to move into information security management
- General security management professionals looking to move into information security
- Information security managers
- Mid-level career change
Course Outline
Introduction
- Welcome video
Domain 1 – Information Security Governance
- Describe the role of governance in creating value for the enterprise.
- Explain the importance of information security governance in the context of overall enterprise governance.
- Describe the influence of enterprise leadership, structure and culture on the effectiveness of an information security strategy.
- Identify the relevant legal, regulatory and contractual requirements that impact the enterprise.
- Describe the effects of the information security strategy on enterprise risk management.
- Evaluate the common frameworks and standards used to govern an information security strategy.
- Explain why metrics are critical in developing and evaluating the information security strategy.
Domain 2 – Information Security Risk Management
- Apply risk assessment strategies to reduce the impact of information security risk.
- Assess the types of threats faced by the enterprise.
- Explain how security control baselines affect vulnerability and control deficiency analysis.
- Differentiate between application of risk treatment types from an information security perspective.
- Describe the influence of risk and control ownership on the information security program.
- Outline the process of monitoring and reporting information security risk.
Domain 3 – Information Security Program
- Outline the components and resources used to build an information security program.
- Distinguish between common IS standards and frameworks available to build an information security program.
- Explain how to align IS policies, procedures and guidelines with the needs of the enterprise.
- Describe the process of defining an IS program road map.
- Outline key IS program metrics used to track and report progress to senior management.
- Explain how to manage the IS program using controls.
- Create a strategy to enhance awareness and knowledge of the information security program.
- Describe the process of integrating the security program with IT operations and third-party providers.
- Communicate key IS program information to relevant stakeholders.
Domain 4 – Incident Management
Prerequisites for the course:
-
To succeed in this course and pass the CISM exam, individuals should have at least five years of information security experience in one of the roles such as:
- IT consultant
- Auditor
- Manager
- Security policy writer
- Privacy officer
- Information security officer
- Network administrator
- Security device administrator
- Security engineer
CISM – Certified Information Security Manager Training kit
$ 764.00 USD Original price was: $ 764.00 USD.$ 382.00 USDCurrent price is: $ 382.00 USD.
Included in Purchase:
- Online ISACA Review Manual for CISM
- Online ISACA Questions and Answers explanation for CISM
Related products
-
COBIT Foundation Self – paced eLearning (online review course) with official ISACA exam included.
$ 1,598.00 USDOriginal price was: $ 1,598.00 USD.$ 799.00 USDCurrent price is: $ 799.00 USD. Add to cart -
CGEIT- Certified in the Governance of Enterprise IT eLearning (online review course) with official ISACA exam included.
$ 3,998.00 USDOriginal price was: $ 3,998.00 USD.$ 1,999.00 USDCurrent price is: $ 1,999.00 USD. Add to cart -
CRISC- Certified in Risk and Information Systems Control Live Online Training with official ISACA exam included.
$ 5,398.00 USDOriginal price was: $ 5,398.00 USD.$ 2,699.00 USDCurrent price is: $ 2,699.00 USD. Select options