Ideal Candidates for Certified Information Security Manager (CISM) Class
Experienced information security managers and those who have information security management responsibilities, including IT consultants, auditors, managers, security policy writers, privacy officers, information security officers, network administrators, security device administrators, and security engineers.
Certified Information Security Manager (CISM) Prerequisites
Five years of experience with audit, IT systems, and security of information systems; systems administration experience; familiarity with TCP/IP; and an understanding of UNIX, Linux, and Windows. This advanced course also requires intermediate-level knowledge of the security concepts covered in our Security+ Prep Course course.
What You'll Get in Certified Information Security Manager (CISM)
Expert Level Instruction
The CISM Review Manual 2012
The CISM Review Questions, Answers & Explanations Manual 2012
The CISM Review Questions, Answers & Explanations Manual 2012 supplement
Ultimate Knowledge Institute Award Winning CISM Student Workbook
Daily Homework Questions (Over 600 Questions)
Daily Quiz Questions (Over 600 Questions)
Handy Reference Charts and Tables
Flash Cards
Course Related Readings (Reinforcement)
Daily Exercises to Reinforce Memory Recall - Cognitive Core
What You'll Learn in Certified Information Security Manager (CISM)
1. Information Security Governance
2. Information Risk Management
3. Information Security Program Development
4. Information Security Program Management
5. Incident Management and Response
Certified Information Security Manager (CISM) Certification
The CISM exam is offered each year in June and December and consists of 200 multiple-choice questions. The CISM exam is focused on the five domains defined by ISACA.
Certified Information Security Manager (CISM) Outline
1. Testing-Taking Tips and Study Techniques
-
Preparation for the CISM exam
-
Submitting Required Paperwork
-
Resources and Study Aids
-
Passing the Exam the First Time
2. Information Security Governance
-
Asset Identification
-
Risk Assessment
-
Vulnerability Assessments
-
Asset Management
3. Information Risk Management
-
Asset Classification and Ownership
-
Structured Information Risk Assessment Process
-
Business Impact Assessments
-
Change Management
4. Information Security Program Development
-
Information Security Strategy
-
Program Alignment of Other Assurance Functions
-
Development of Information Security Architectures
-
Security Awareness, Training, and Education
-
Communication and Maintenance of Standards, Procedures, and Other
Documentation
-
Change Control
-
Lifecycle Activities
-
Security Metrics
5. Information Security Program Management
-
Security Program Management Overview
-
Planning
-
Security Baselines
-
Business Processes
-
Security Program Infrastructure
-
Lifecycle Methodologies
-
Security Impact on Users
-
Accountability
-
Security Metrics
-
Managing Resources
6. Incident Management and Response
-
Response Management Overview
-
Importance of Response Management
-
Performing a Business Impact Analysis
-
Developing Response and Recovery Plans
-
The Incident Response Process
-
Implementing Response and Recovery Plans
-
Response Documentation
-
Post-Event Reviews
7. Review and Q&A Session
-
Final Review and Test Prep
Testimonials
A. Erlich
RITSC, N6CI just wanted to say your presentation on Social Media Technology and Security was the finest I have ever attended.