CISM_Certified Information Security Manager Training

excellent presentation skills,cism

CISM” (Certified Information Security Manager) Training properly recognizes that security is first and foremost a management

START:
March 14, 2018
DURATION:
4 days
CREDIT:
30
PRICE
150,000.00

Address

PLOT 21 PEACE AVENUE,OSHORUN HERITAGE ESTATE,OFF CHANNELS TV AVENUE,ISHERI-NORTH OPIC,LAGOS   View map

CISM” (Certified Information Security Manager) Training Overview

JK Michaels brings you the “ CISM” (Certified Information Security Manager) training course.

CISM” (Certified Information Security Manager) Training properly recognizes that security is first and foremost a management rather than a technical issue. CISM defines the core competencies and international standards of performance that information security managers are expected to master. It provides executive management with the assurance that those who have earned their CISM have the experience and knowledge to offer effective security management and advice.   The course provides an intense environment in which participants can acquire, thoroughly and properly, the skills and knowledge expected of a world-class information security manager. In the process the course provides outstanding preparation for the CISM exam.

Course Objectives

CISM” (Certified Information Security Manager) Training has been independently commissioned with two objectives:

  1. To provide an environment in which security professionals can acquire, thoroughly and properly, the skills and knowledge expected of a world class information security manager. Whether or not you intend to sit for the CISM exam, this course is a powerful way to equip yourself with the knowledge of the five core competencies that define the successful information security manager.
  2. To maximise your prospects at the CISM exam if you choose to sit it.

Course Structure

This 5-day course is structured to follow the CISM review manual and examination flow. A full day is provided for each of the core competencies and associated task and knowledge statements, thereby ensuring a detailed and thorough coverage of all areas that will be tested. The fundamental thrust of examination is on understanding the concepts, not on memorising facts. As a result, the course will be presented in an interactive manner to ensure the underlying concepts are understood and examination questions can be analyzed properly to achieve the correct answer.

FAQ:EXAM AND CERTIFICATION

How do you become a CISM certified professional?

How do you become a CISM certified professional?

To be a certified CISM professional, you need to meet the following requirements:
  1. Successful completion of the CISM examination
  2. Adherence to the ISACA Code of Professional Ethics
  3. Agree to comply with the Continuing Education Policy.
  4. Work experience in the field of information security
  5. Submit an Application for CISM Certification
For additional information on how to become a certified CISM and to understand the CISM certification requirements please refer the following link:
http://www.isaca.org/Certification/CISM-Certified-Information-Security-Manager/How-to-Become-Certified/Pages/default.aspx

What are the prerequisites for CISM certification?

What are the prerequisites for CISM certification?

To become a CISM certified professional, you need to fulfill the following criteria:
  • A completed application must be submitted within 5 years from the date of initially passing the examination.
  • All experience must be verified independently with employers.
  • This experience must have been gained within the 10-year period preceding the application date for certification or within five years of passing the examination.
  • Three (3) years of the five (5) years of work experience must be gained performing the role of an information security manager
  • In addition, this work experience must be broad and gained in three (3) of the four (4) CISM® domains

What do I need to do to unlock my certificate?

What do I need to do to unlock my certificate?

:
  1. Complete 1 simulation test with a minimum score of 60%.for online course
  2. But for classroom complete the class exam with a  score of 60%.

What all will I get as part of the training?

What all will I get as part of the training?

You get access to our e-learning content along with the practice simulation tests that help you tackle the toughest of the exam questions. You will also get an online participant handbook with cross references to the e-learning for reinforcement of your learning.

Is exam fee included in the course fee?

Is exam fee included in the course fee?

No. The exam fee is not included in the course fee as it is directly paid to ISACA for the membership, application and examination.

How many questions are there in the CISM certification exam?

How many questions are there in the CISM certification exam?

ISACA uses and reports scores on a common scale from 200 to 800. For example, the scaled score of 800 represents a perfect score with all questions answered correctly; a scaled score of 200 is the lowest score possible and signifies that only a small number of questions were answered correctly. You need to achieve a score of 450 or higher to pass the CISM® Exam.

 

What is the CISM certification cost?

What is the CISM certification cost?

The CISM Certification cost varies between $450 – $760 based on  the mode of registration and if you are a registered member or not.

Please click on the below link for further details :
http://www.isaca.org/certification/pages/exam-registration.aspx

What certification will I receive after completing the training?

What certification will I receive after completing the training?

After successful completion of the training, you will be awarded the course completion certificate along with the 16 CPE certificate from JK Michaels

Course Outlines

1. Information Security Governance and Strategy
Introduction:
Definition
Objective
Tasks
Overview

Topics:
Effective Information Security Governance
Key Information Security Concepts and Issues
The IS Manager
Scope and Charter of Information Security Governance
IS Governance Metrics
Developing an IS Strategy – Common Pitfalls
IS Strategy Objectives
Determining Current State of Security
Strategy Resources
Strategy Constraints
Action Plan Immediate Goals
Action Plan Intermediate Goals

Practice Questions; Review of Practice Questions;
Reference Materials and Glossary

2. Risk Management
Introduction:
Definition
Objective
Tasks
Overview

Topics:
Effective Information Security Risk Management
Integration into Life Cycle Processes
Implementing Risk Management
Risk Identification and Analysis Methods
Mitigation Strategies and Prioritisation
Reporting Changes to Management

Practice Questions; Review of Practice Questions;
Reference Materials and Glossary
3. Information Security Programme Management
Introduction:
Definition
Objective
Tasks
Overview

Topics:
Planning
Security Baselines
Business Processes
Infrastructure
Malicious Code (Malware)
Life Cycles
Impact on End Users
Accountability
Security Metrics
Managing Internal and External Resources

Practice Questions; Review of Practice Questions;
Reference Materials and Glossary
4. Information Security Management
Introduction:
Definition
Objective
Tasks
Overview

Topics:
Implementing Effective Information Security Management
Security Controls and Policies
Standards and Procedures
Trading Partners and Service Providers
Security Metrics and Monitoring
The Change Management Process
Vulnerability Assessments
Due Diligence
Resolution of Non-Compliance Issues
Culture, Behavior and Security Awareness

Practice Questions; Review of Practice Questions;
Reference Materials and Glossary
5. Response Management
Introduction:
Definition
Objective
Tasks
Overview

Topics:
Performing a Business Impact Analysis
Developing Response and Recovery Plans
Incident Response Processes
Executing Response and Recovery Plans
Documenting Events
Post Event Reviews

Practice Questions; Review of Practice Questions;
Reference Materials and Glossary

Who should attend

The CISM designation is for Information Security professionals who have 3-5 years of front-line experience with the security of information. This credential is geared towards Information Security managers and those who have information security management responsibilities.

Course dates