Cism Certification Training

Simplilearn

How long?

  • online
  • on demand

Simplilearn

Disclaimer

Coursalytics is an independent platform to find, compare, and book executive courses. Coursalytics is not endorsed by, sponsored by, or otherwise affiliated with any business school or university.

Full disclaimer.

Because of COVID-19, many providers are cancelling or postponing in-person programs or providing online participation options.

We are happy to help you find a suitable online alternative.

Who should attend

CISM certification is a globally recognized professional requirement in the IT Security domain. This certification is best suited for security consultants and managers, IT directors and managers, security auditors and architects, security system engineers, CISOs, information security managers, IT consultants, and risk officers.

Pre-requisites

To become a CISM certified professional or to opt for this CISM training course, you need to fulfill some criteria, including - A completed application submitted within five years from the date of initially passing the examination (you must ensure that all experience is independently verified by employers).

About the course

CISM (Certified Information Security Manager) is a key certification for information security professionals who manage, design, oversee, and assess enterprise information security. This CISM certification course, closely aligned with ISACA's best practices, helps you learn about IT security systems.

Course Overview

You will acquire the requisite skills to design, deploy, and manage security architecture for your organization with this CISM certification training from Simplilearn. This course is aligned with ISACA best practices. Today, enterprises and government agencies increasingly expect their IT professionals to hold a CISM certification.

Key Features

  • 16 hours of high-quality e-learning content
  • 16 CPE’s offered

Skills Covered

  • Information Security Governance
  • Information Security Incident Management
  • Design security architecture
  • Knowledge of ISACA domains
  • Information security programs
  • Enterprise IT frameworks

Course Curriculum

Domain 01: Information Security Governance

Lesson 1: Information Security Governance Overview

Information Security Governance Overview Part 1

Information Security Governance Overview Part 2

Information Security Governance Overview Part 3

Information Security Governance Overview Part 4

Information Security Governance Overview Part 5

Importance of Information Security Governance Part 1

Importance of Information Security Governance Part 2

Outcomes of Information Security Governance Part 1

Outcomes of Information Security Governance Part 2

Outcomes of Information Security Governance Part 3

Outcomes of Information Security Governance Part 4

Outcomes of Information Security Governance Part 5

Outcomes of Information Security Governance Part 6

Lesson 2: Effective Information Security Governance

Business Goals and Objectives Part 1

Business Goals and Objectives Part 2

Roles and Responsibilities of Senior Management Part 1

Roles and Responsibilities of Senior Management Part 2

Domain Tasks Part 1

Domain Tasks Part 2

Business Model for Information Security Part 1

Business Model for Information Security Part 2

Business Model for Information Security Part 3

Business Model for Information Security Part 4

Dynamic Interconnections Part 1

Dynamic Interconnections Part 2

Dynamic Interconnections Part 3

Dynamic Interconnections Part 4

Lesson 3: Information Security Concepts and Technologies

Information Security Concepts and Technologies Part 1

Information Security Concepts and Technologies Part 2

Information Security Concepts and Technologies Part 3

Technologies Part 1

Technologies Part 2

Lesson 4: Information Security Manager

Responsibilities

Senior Management Commitment Part 1

Senior Management Commitment Part 2

Obtaining Senior Management Commitment Part 1

Obtaining Senior Management Commitment Part 2

Establishing Reporting and Communication Channels Part 1

Establishing Reporting and Communication Channels Part 2

Lesson 5: Scope and Charter of Information Security Governance

Assurance Process Integration and Convergence

Convergence

Governance and Third-Party Relationships

Lesson 6: Information Security Governance Metrics

Metrics

Effective Security Metrics Part 1

Effective Security Metrics Part 2

Effective Security Metrics Part 3

Effective Security Metrics Part 4

Security Implementation Metrics

Strategic Alignment Part 1

Strategic Alignment Part 2

Risk Management

Value Delivery

Resource Management Part 1

Resource Management Part 2

Performance Measurement

Assurance Process Integration/Convergence

Lesson 7: Information Security Strategy Overview

Another View of Strategy

Lesson 8: Creating Information Security Strategy

Information Security Strategy

Common Pitfalls Part 1

Common Pitfalls Part 2

Objectives of the Information Security Strategy

What is the Goal?

Defining Objectives

Business Linkages

Business Case Development Part 1

Business Case Development Part 2

Business Case Development Part 3

Business Case Objectives

The Desired State

COBIT

COBIT Controls

COBIT Framework

Capability Maturity Model

Balanced Scorecard

Architectural Approaches

ISO/IEC 27001 and 27002

Risk Objectives Part 1

Risk Objectives Part 2

Lesson 9: Determining Current State Of Security

Current Risk Part 1

Current Risk Part 2

BIA

Lesson 10: Information Security Strategy Development

The Roadmap

Elements of a Strategy

Strategy Resources and Constraints

Lesson 11: Strategy Resources

Policies and Standards

Definitions

Enterprise Information Security Architectures

Controls

Countermeasures

Technologies

Personnel

Organizational Structure

Employee Roles and Responsibilities

Skills

Audits

Compliance Enforcement

Threat Assessment

Vulnerability Assessment

Risk Assessment

Insurance

Business Impact Assessment

Outsourced Security Providers

Lesson 12: Strategy Constraints

Legal and Regulatory Requirements

Physical Constraints

The Security Strategy

Lesson 13: Action Plan to Implement Strategy

Gap Analysis Part 1

Gap Analysis Part 2

Gap Analysis Part 3

Policy Development Part 1

Policy Development Part 2

Standards Development

Training and Awareness

Action Plan Metrics

General Metric Considerations Part 1

General Metric Considerations Part 2

General Metric Considerations Part 3

General Metric Considerations Part 4

CMM4 Statements

Objectives for CMM4

Section Review

Knowledge Check

Training Options

SELF-PACED LEARNING

  • Lifetime access to high-quality self-paced e-learning content curated by industry experts
  • 24x7 learner assistance and support

Experts

Dean Pompilio

Mr.Pompilio has been an IT Professional since 1989. He has worn many hats along the way and holds over 20 IT certifications which include EC-Council CEI, CEH, CHFI, CISSP, CISA, CISM. His passion is to help IT professionals achieve their training goals and career growth. A+, CASP, Cloud+, Networ...

Cism Certification Training at Simplilearn

From  599 EUR$699

Something went wrong. We're trying to fix this error.

Thank you for your application

We will contact the provider to ensure that seats are available and, if there is an admissions process, that you satisfy any requirements or prerequisites.

We may ask you for additional information.

To finalize your enrollment we will be in touch shortly.

Disclaimer

Coursalytics is an independent platform to find, compare, and book executive courses. Coursalytics is not endorsed by, sponsored by, or otherwise affiliated with any business school or university.

Full disclaimer.