RING 70 23 26 50 eller send en mail og få uforpligtende informationer om, hvor kurset udbydes, datoer, priser og en status på, om kurset har deltagere nok til at det bliver gennemført.
Udbydes kurset ikke i oversigten til højre, så kontakt os endelig for ny dato.
The Certified Information Security Manager (CISM) training course will help you obtain the CISM certification. This ISACA certification is the leading certification for experienced information security managers, internationally recognised. Scroll down to learn more about this certification.
Continuing Professional Education (CPE) : 31
Practice questions (QAE = Questions, Answers and Explanations) : 12 month access
ISACA’s Certified Information Security Manager (CISM) certification is for those with technical expertise and experience in IS/IT security and control and wants to make the move from team player to manager. CISM can add credibility and confidence to your interactions with internal and external stakeholders, peers and regulators.
Experienced information security managers and those who have information security management responsibilities, including IT consultants, auditors, managers, security policy writers, privacy officers, information security officers, network administrators, security device administrators, and security engineers.
Learning Objectives:
Module 1: Information Security Governance
Describe the role of governance in creating value for the enterprise.
Explain the importance of information security governance in the context of overall enterprise governance.
Describe the influence of enterprise leadership, structure and culture on the effectiveness of an information security strategy.
Identify the relevant legal, regulatory and contractual requirements that impact the enterprise.
Describe the effects of the information security strategy on enterprise risk management.
Evaluate the common frameworks and standards used to govern an information security strategy.
Explain why metrics are critical in developing and evaluating the information security strategy.
Information Risk Management and Compliance
Information Security Program Development and Management
Information Security Incident Management
Module 2: Information Security Risk Management
Apply risk assessment strategies to reduce the impact of information security risk.
Assess the types of threats faced by the enterprise.
Explain how security control baselines affect vulnerability and control deficiency analysis.
Differentiate between application of risk treatment types from an information security perspective.
Describe the influence of risk and control ownership on the information security program.
Outline the process of monitoring and reporting information security risk.
Module 3: Information Security Program Development and Management
Outline the components and resources used to build an information security program.
Distinguish between common IS standards and frameworks available to build an information security program.
Explain how to align IS policies, procedures and guidelines with the needs of the enterprise.
Describe the process of defining an IS program road map.
Outline key IS program metrics used to track and report progress to senior management.
Explain how to manage the IS program using controls.
Create a strategy to enhance awareness and knowledge of the information security program.
Describe the process of integrating the security program with IT operations and third-party providers.
Communicate key IS program information to relevant stakeholders.
Module 4: Information Security Incident Management
Distinguish between incident management and incident response
Outline the requirements and procedures necessary to develop an incident response plan.
Identify techniques used to classify or categorize incidents.
Outline the types of roles and responsibilities required for an effective incident management and response team
Distinguish between the types of incident management tools and technologies available to an enterprise.
Describe the processes and methods used to investigate, evaluate and contain an incident.
Identify the types of communications and notifications used to inform key stakeholders of incidents and tests.
Outline the processes and procedures used to eradicate and recover from incidents.
Describe the requirements and benefits of documenting events.
Explain the relationship between business impact, continuity and incident response.
Describe the processes and outcomes related to disaster recovery.
Explain the impact of metrics and testing when evaluating the incident response plan
Domain 1: Information Security Governance
Enterprise Governance Overview
Organizational Culture, Structures, Roles and Responsibilities
Legal, Regulatory and Contractual Requirements
Information Security Strategy
Information Governance Frameworks and Standards
Strategic Planning
Domain 2: Information Risk Management
Risk and Threat Landscape
Vulnerability and Control Deficiency Analysis
Risk Assessment, Evaluation and Analysis
Information Risk Response
Risk Monitoring, Reporting and Communication
Domain 3: Information Security Program Development & Management
IS Program Development and Resources
IS Standards and Frameworks
Defining an IS Program Road Map
IS Program Metrics
IS Program Management
IS Awareness and Training
Integrating the Security Program with IT Operations
Program Communications, Reporting and Performance Management
Domain 4: Information Security Incident Management
Incident Management and Incident Response Overview
Incident Management and Response Plans
Incident Classification/Categorization
Incident Management Operations, Tools and Technologies
Incident Investigation, Evaluation, Containment and Communication
Incident Eradication, Recovery and Review
Business Impact and Continuity
Disaster Recovery Planning
Training, Testing and Evaluation
Exam:
Practice questions (QAE = Questions, Answers and Explanations) are available online via a voucher. The voucher is part of the course material. It allows you to practice during the training and is available up to 12 months after the training
To become officially CISM certified, you need to meet the requirements below:
pass the official CISM exam
have at least 5 years of relevant work experience in at least two CISM domains (or 4 years of experience supplemented by an HBO+ education).
The CISM exam is focused on the four domains defined by ISACA. The actual exam takes 4 hours and consists of 150 English-language multiple choice questions. For more information on certification, please visit: https://www.isaca.org/credentialing/cism
The exam voucher for the official CISM exam is not included
Subject to change after publishing