CERTIFIED INFORMATION SECURITY MANAGER

CERTIFIED INFORMATION SECURITY MANAGER:

The ISACA governed Certified Information Security Manager (CISM) certification is the most sought-after certification in the Information Security arena. Established in 2002, the CISM is a management focused globally renowned credential for professionals who create, build and administer enterprise security programs. This certification is a professional certification sponsored by the reputed Information Systems Audit and Control Association (ISACA).

The CISM certification training is intended towards professionals working in managerial, consulting or related views in IT operations or compliance. Several CISM Certified Professionals today are functioning in the capacities of IT Directors, Audit Directors, CIOs, CISOs, CEOs, CFOs and other leadership positions showcasing a good demand as well as career advancement potential of the credential.

Modes of Training:

Classroom

Live Online Classes

Benefits of the CISM Certification:

    Identify critical issues and customize company-specific practices to support the governance of information and related technologies

    Get a comprehensive perspective of information systems security management and their relationship to organizational success

    Demonstrate to enterprise customers their commitment to compliance, security and integrity; ultimately leading to the attraction and retention of clients.

    See to it that there is improved alignment between the organization’s data security plan and its broader goals and aims.

    Provide the enterprise with a certification for Information security management that is recognized by multinational clients and enterprises, lending credibility to the enterprise.

Recognition and Credibility:

The CISM Certification is Globally recognized symbol of excellence in Information Security Professionals.

List of CISM Work Roles:

    CIOs, CISOs, CEOs, CFOs

    Information System Security Officer

    Information/Privacy Risk Consultant

    Information Security Manager

    Security Consultant

    Business Analyst

    Security Product Manager

    Security Designer

    System Administrators

    IS / IT Security Professionals

    IS / IT Managers

Upcoming CISM Course in Dubai

Training Type Start Date
Blended – Classroom + Online 05 April 2019 Join Online

Live Instructor-Led Online 07 April 2019 Join Online

CISM Course Structure:

The job practice domains and task and knowledge statements are as follows:

Area 1—Information Security Governance (24%)

    Explain the need for and the desired final results of an efficient data security strategy

    Produce an information security strategy aligned with organizational goals and aims

    Identify key functions and duties required to carry out an activity program

    Establish metrics to evaluate and monitor the operation of security administration

Area 2—Information Risk Management (30%)

    Explain the importance of risk management as a tool to match clientele demands and develop a security management program to support these demands

    Identify, rank, and respond to a risk in a way that is appropriate as defined by organizational directives

    Assess the appropriateness and effectiveness of data protection controls

    Account information security risk effectively

Area 3—Information Security Program Development and Management (27%)

    Align information security plan requirements with those of other business occasions

    Handle the data security program resources

    Design and implement data security controls

    Incorporate information security requirements into contracts, agreements and third-party management operations

Area 4—Information Security Incident Management (19%)

    Understand the concepts and practices of Incident Management

    Identify the elements of an Incident Response Plan and assess its effectiveness

    Understand the key concepts of Business Continuity Planning, or BCP and Disaster Recovery Planning, or DRP

    Be conversant with techniques commonly applied to test incident response capabilities

CISM EXAM:

To gain and maintain the Certified Information Security Manager designation, an individual hasto comply with the CPE policy requirements relating to achieving the requisite CPE hours over a year and three-year certification period, paying the annual CPE maintenance fees and submitting requisitedocumentsof CPE activitiesincase of an audit. Note: There is no penalty marking for wrong answers.

CISM Training Course Highlights

Online and Classroom Training
Learn from CISM Certified &Industry Experts and Prepare yourself for CISM certification.  
Best CISM Study Material
Hard Copy and Soft Copy of Study Notes  
Online CISM Courses Materials
Topic Wise study material in the form of Presentation, Case Studies, Practical Exercises and Quiz or Assignments with detailed answers and explanation.  
24×7 Online CISM Course Forum
Doubt solving forum to interact with faculty & fellow students.  
Assignments & Cases
Work on real time cases from different Domains. 
24×7 Online Access
24×7 Access to CISM Course Material (Unlocked Excel Models, Presentations, etc.)