3 Day

Course Overview

This course is designed to help candidates prepare for sitting the ISACA CISM certification examination. By taking this course and obtaining CISM certification, your experience and skills in supporting the information security needs of your organization will be validated. Securing the organization’s information is a critical business objective in today’s business environment. The information that an organization depends on to be successful can be at risk from numerous sources. By effectively managing information security, you can address these risks and ensure the organization remains healthy and competitive in the marketplace.

Audience

The intended audience for this course is information security and IT professionals, particularly IT managers who are interested in earning the CISM certification. The course is also applicable to individuals who are interested in learning in-depth information about information security management or who are looking for career advancement in IT security.

Learning Objectives

Upon successful completion of this course, students will be able to:

  • Establish and maintain a framework to provide assurance that information security strategies are aligned with business objectives and consistent with applicable laws and regulations.
  • Identify and manage information security risks to achieve business objectives.
  • Create a program to implement the information security strategy.
  • Implement an information security program.
  • Oversee and direct information security activities to execute the information security program.
  • Plan, develop, and manage capabilities to detect, respond to, and recover from information security incidents.

Prerequisites

To ensure your success, you should have at least five years of professional experience in information security, as well as at least three years of experience in information security management. You are also required to prove this level of experience to ISACA to obtain certification. Major areas of information security management include:

  • Information security governance
  • Information risk management
  • Information security program development
  • Information security program management
  • Incident management and response

Course Outline

The Basics

  • Security Concepts
  • Governance, Goals, Strategies, Policies, Standards, and Procedures
  • Strategy
  • Risk Appetite, Tolerance, and Capacity
  • Analysis of Risk
  • Controlling Threats and Risk
  • Controls and Countermeasures
  • ALE, RTO, RPO, SDO, MTO, MTD, and AIW
  • BCP, DRP, and BIA
  • Business Continuity and Disaster Recovery
  • Testing Incident Response, Business Continuity Plans, and Disaster Recovery Plans
  • Roles, Responsibilities, RACI, and Skills
  • Due Diligence and Due Care
  • Security Principles
  • KGIs, KPIs, KRIs, and CSFs
  • Technologies
  • Standards and Frameworks
  • Culture
  • Metrics
  • Current State, Desired State, and the Gap in Between
  • Information Security Infrastructure and Architecture
  • Cloud Computing
  • Metrics Development
  • Business Model for Information Security (BMIS)

Four Domains

  • Information Security Governance – Overview
  • Information Security Governance - The Goal
  • Information Security Governance - The Strategy
  • Information Security Governance - Who Does What
  • Information Security Governance - Resources That Help
  • Information Security Governance - Constraints That Hurt
  • Information Security Governance - The Action Plan
  • Information Security Governance - Metrics and Monitoring
  • Information Security Governance -What Success Looks Like
  • Information Risk Management – Overview
  • Information Risk Management - The Goal
  • Information Risk Management - The Strategy
  • Information Risk Management - Who Does What
  • Information Risk Management - Resources That Help
  • Information Risk Management - Constraints That Hurt
  • Information Risk Management - The Action Plan
  • Information Risk Management - Metrics, Monitoring, and Reporting
  • Information Risk Management - What Success Looks Like
  • Information Security Program Development and Management – Overview
  • Information Security Program Development and Management - The Goal
  • Information Security Program Development and Management - The Strategy
  • Information Security Program Development and Management - Who Does What
  • Information Security Program Development and Management - Resources That Help
  • Information Security Program Development and Management - Constraints That Hurt
  • Information Security Program Development and Management - The Action Plan
  • Information Security Program Development and Management - Metrics and Monitoring
  • Information Security Program Development and Management - What Success Looks Like
  • Information Security Incident Management – Overview
  • Information Security Incident Management - The Goal
  • Information Security Incident Management - The Strategy
  • Information Security Incident Management - Who Does What
  • Information Security Incident Management - Resources That Help
  • Information Security Incident Management - Constraints That Hurt
  • Information Security Incident Management - The Action Plan
  • Information Security Incident Management - Metrics and Monitoring
  • Information Security Incident Management - What Success Looks Like

Certification

ISACA’s Certified Information Security Manager (CISM) certification indicates expertise in information security governance, program development and management, incident management and risk management. Take your career out of the technical realm to management!

More exam information