Join over 35,000 students, from 300 countries, who already obtained their computer training with us.
Duration: 5 Days
Learning Material : All included.
Registration Open Now!
In this course, students will establish processes to ensure that information security measures align with established business needs. The ISACA Certified Information Security Manager (CISM) is a signature certification created by the reputable ISACA
The uniquely management-focused CISM certification promotes international security practices and recognizes the individual who manages designs, and oversees and assesses an enterprise’s information security.
CISM is comprised of four domains: Information Security Governance, Risk Management and Compliance, Security Program Development and Management, and Information Security Incident Management.
The intended audience for this course is information security and IT professionals, such as network administrators and engineers, IT managers, and IT auditors, and other individuals who want to learn more about information security, who are interested in learning in-depth information about information security management, who are looking for career advancement in IT security, or who are interested in earning the CISM certification.
The ISACA Certified Information Security Manager (CISM) is a signature certification created by the reputable ISACA professional organization. Since its introduction in 2003, the CISM has evolved and is now ranked as one of the top five certifications in 2015 for information security professionals
The CISM is of great value to the designation holder. It relays the message to enterprises hiring information security managers or CISOs that the holder has knowledge of risk, governance, incident response and the information security program. This is evidenced by its worldwide acceptance.
Lesson 1: Information Security Governance
Lesson 2: Information Risk Management
Lesson 3: Information Security Program Development
Lesson 4: Information Security Program
Lesson 5: Incident Management and Response