CISM
- Home
- Cyber Security
- CISM
CISM - Certified Information Security Manager Training Course
Course Overview
- Course Code: CISM101
- 32 Hours
- Course Rating 4.6/5
Overview
Our CISM training methodology provides an in-depth coverage of contents across the Four CISM domains with a clear focus on building concepts and solving ISACA released CISM exam questions. The course is an intense training and hard-core exam preparation for ISACA’s Certified Information Security Manager (CISM®) Examination.
refer: ISACA
Certified Information Security Manager (CISM) certification indicates expertise in information security governance, program development and management, incident management and risk management.
CISM corporate training and certification oriented remote program aims to upskill you with Information Security Governance, Information Security, Incident Management, Design security architecture, Knowledge of ISACA domains, Information security programs, Enterprise IT framework
Currently due to Covid19 outbreak, the course is available remote and however it can also be accessed online via your nearby Prog360 centre based on local availability.
Course Prerequisites
To become a CISM certified professional or to opt for this CISM course, you need to fulfill some criteria, including - A completed application submitted within five years from the date of initially passing the examination (you must ensure that all experience is independently verified by employers). The experience must have been gained within the 10-year period preceding the application date for certification or within five years of passing the examination. Three of the five years of work experience must be gained in the role of an information security manager (it must be broad and gained in three of the four CISM domains)
Course Content
- Establish and maintain an information security strategy, and align the strategy with corporate governance
- Establish and maintain an information security governance framework
- Establish and maintain information security policies
- Develop a business case
- Identify internal and external influences to the organization
- Obtain management commitment
- Define roles and responsibilities
- Establish, monitor, evaluate, and report metrics
- Establish a process for information asset classification and ownership
- Identify legal, regulatory, organizational, and other applicable requirements
- Ensure that risk assessments, vulnerability assessments, and threat analyses are conducted periodically
- Determine appropriate risk treatment options
- Evaluate information security controls
- Identify the gap between current and desired risk levels
- Integrate information risk management into business and IT processes
- Monitor existing risk
- Report noncompliance and other changes in information risk
- Establish and maintain the information security program
- Ensure alignment between the information security program and other business functions
- Identify, acquire, manage, and define requirements for internal and external resources
- Establish and maintain information security architectures
- Establish, communicate, and maintain organizational information security standards, procedures, and guidelines
- Establish and maintain a program for information security awareness and training
- Integrate information security requirements into organizational processes
- Integrate information security requirements into contracts and activities of third parties
- Establish, monitor, and periodically report program management and operational metrics
- Establish and maintain an organizational definition of, and severity hierarchy for, information security incidents
- Establish and maintain an incident response plan
- Develop and implement processes to ensure the timely identification of information security incidents
- Establish and maintain processes to investigate and document information security incidents
- Establish and maintain incident escalation and notification processes
- Organize, train, and equip teams to effectively respond to information security incidents
- Test and review the incident response plan periodically
- Establish and maintain communication plans and processes
- Conduct post-incident reviews
- Establish and maintain integration among the incident response plan, disaster recovery plan, and business continuity plan
Information Security Governance
Information Risk Management and Compliance
Information Security Program Development and Management
Information Security Incident Management
CISM Certifications
CISM course delivery involves case studies, examples, discussions and exercises to enhance the learning experience.
At the end of the training the participants will be awarded Course Completion Certificates on CISM.
Post Course Evaluation
You may chose to enroll for a post course evaluation to analyse your knowledge metrics. The post course evaluation would cover the topics related to the training delivered over the period of the complete session, like:
- Information Security Governance
- Information Security, Incident Management
- Design security architecture
- Information security programs
- Enterprise IT framework
- Information Security Governance
- Information Risk Management and Compliance
- Information Security Program Development and Management
- Information Security Incident Management
CISM Corporate Training
Prog360 offers on-demand corporate learning and development solutions around CISM that can be delivered both onsite and remote (based on availability). With Prog360, you can train your employees with our 360 Approach which not only enhance professional skills but also improvise inter-personal development. Please feel free to inquire further. We are open to discuss your requirement to provide you more customized solution specific to your needs. We will evaluate the skillset, analyze the business requirement and post that provide customized training solutions as per your business needs. Our corporate team for CISM training is based across the globe hence you can reach us nearby your region as well. For general training inquiries you can contact us at training@prog360.com.
CISM Consultation
If you have already up-skilled your team and have started implementing CISM, but are still facing challenges, Prog360 can still help you. Our SMEs can get on a call with you to understand the situation and provide you a plan involving the next steps covering both audit and implementation based on your problem statement. Our corporate team for CISM consultation is based across the globe hence you can reach us nearby your region as well. For general consultation inquiries you can contact us at consult@prog360.com . For more nearby inquiries you can reach your nearby team.
South East Asia and Oceania
Oceania: Melbourne, Australia: 152 Elizabeth St,Melbourne,VIC,Melbourne,
Corporate Training: training.au@prog360.com
Consulting Services: consult.au@prog360.com
South East Asia: Singapore: 5, Temasek Boulevard, Singapore, Central Region, 03898, Singapore
Corporate Training: training.sg@prog360.com
Consulting Services: consult.sg@prog360.com
Contact Number :- +61 3 9015 4952
South Asia and Middle East
South Asia: Bengaluru, India: No. 78, Next to KR Puram Tin Factory, Old Madras Road, Bangalore – Mahadevapura, Bengaluru, Karnataka, 560016
Corporate Training: training.southasia@prog360.com
Consulting Services: consult.southasia@prog360.com
Middle East:- Dubai, UAE: The Offices 4, One Central Dubai World Trade Center, Dubai, Dubai, 00000, UAE
Corporate Training: training.ae@prog360.com
Consulting Services: consult.ae@prog360.com
Contact Number :- +91 9810 643 989
Other Courses in Cyber Security
For any Queries
- Reach us at queries@prog360.com
Testimonials & Reviews
Olivia Martinez
Aditi Singh
Saanvi Sharma
Jorge Castillo
Raj Patel
Our Training Categories
- Auto Engineering
- Banking
- Biotechnology
- Microsoft Office
- Digital Literacy
- Fintech
- Forensic Science
- Healthcare
- Game Development
- Graphic Design
- Soft Skills
- Project Management
- Leadership
- Presentation Skills
- Artificial Intelligence
- DevOps
- Corporate Compliance
- Embedded Programming
- Cyber Security
- Blockchain
- Cloud Computing
- Data Analysis
- Database Management
- Programming
- Software Engineering
- Supply Chain
- CRM