New members: Get your first 7 days of ITTutorPro Premium for free! Join for free

CISM Training – Information Systems Manager

Course Description

17.18 Hours

48 Videos

The CISM training course is designed to provide on-the-job skills, as well as knowledge to pass the Certified Information System Manager (CISM) certification exam.
This is advanced-level cybersecurity training to complete once the PenTest+, CySA+, and various higher-level certifications in Cisco and Microsoft have been completed.
The course instructor is Roger St Hilaire, with 30+ years of experience and CISM, CGEIT, MOF, TOGAF & PSP-Rainmaker Foundation Certifications.
The course will cover the following list of main areas, spanning the four domains of the CISM practice and the related tasks. The ITU Online Training CISM Exam Preparation Course Outline:
  • Information Security Defined
  • Information Security Principles
  • Support the Business
  • Defend the Business
  • Promote Responsible Information Security Behavior

DOMAIN 1 – Information Security Governance

  • Section One: Designing a Strategy and Governance Framework
  • Section Two: Gaining Management Approval
  • Section Three: Implementing the Security Strategy

DOMAIN 2 – Information Security Risk Management

  • Section One: Risk Identification
  • Section Two: Risk Analysis and Treatment
  • Section Three: Risk Monitoring and Reporting

DOMAIN 3 – Information Security Program Development and Management

  • Section One: Alignment and Resource Management
  • Section Two: Standards Awareness and Training
  • Section Three: Building Security into Processes and Practices
  • Section Four: Security Monitoring and Reporting

DOMAIN 4 – Information Security Incident Management

  • Section One: Planning and Integration
  • Section Two: Readiness and Assessment
  • Section Three Identification and Response
  • Exam Techniques

ISACA Requirements for Certification:

  • To facilitate the student’s understanding of ISACA’s approach to information security, and its related concepts such as risk.
  • Develop an understanding of key practices in the governance, management of risk, program development, and incident management in the realm of information security.
  • Ensure that the student is appropriately prepared for successful completion of the Certified Information Security Manager exam given by ISACA on the first attempt.

Key Learning Topics In This Course

  • The understanding of requirements for the design and implementation of a Security Strategy and Governance Framework
  • The ability to leverage the Enterprise Risk Management Practice in the organization for identification, analysis, treatment, and monitoring of Security Risks.
  • To gain an understanding of the key tenets of developing and implementing a Security Program
  • The parameters for designing, structuring, and maintaining the performance of Information Security Incident Management teams.

Course Highlights

Closed Caption

Certificate

Dedicated Tutors

Share on:

Proudly Display Your Achievement

Upon completion of your training, you’ll receive a personalized certificate of completion to help validate to others your new skills.

Course Syllabus

Module 1: Introduction

  1. Instructor Introduction
  2. Course Introduction
  3. Exam Overview

Module 2: Information Security Governance

  1. Module Overview
  2. InfoSec Strategic Context Part 1
  3. InfoSec Strategic Context Part 2
  4. GRC Strategy and Assurance
  5. Roles and Responsibilities
  6. GMA Tasks Knowledge and Metrics
  7. IS Strategy Overview
  8. Strategy Implemenation
  9. Strategy Development Support
  10. Architecture and Controls
  11. Considerations and Action Plan
  12. InfoSec Prog Objectives and Wrap-Up

Module 3: Information Security Risk Management

  1. Module Overview
  2. Risk Identification Task and Knowledge
  3. Risk Management Strategy
  4. Additional Considerations
  5. Risk Analysis and Treatment Tasks & Knowledge
  6. Leveraging Frameworks
  7. Assessment Tools and Analysis
  8. Risk Scenario Development
  9. Additional Risk Factors
  10. Asset Classification and Risk Management
  11. Risk Monitoring and Communication
  12. Information Risk Management Summary

Module 4: InfoSec Prog Development and Management

  1. Module Overview
  2. Alignment and Resource Management – Task and Knowledge
  3. Key Relationships
  4. Standards Awareness and Training – Tasks and Knowledge
  5. Awareness and Training
  6. Building Security into Process and Practices – Tasks and Knowledge
  7. Additional Technology Infrastructure Concerns
  8. Security monitoring and reporting Overview Tasks and Knowledge
  9. Metrics and Monitoring
  10. Summary

Module 5: Information Security Incident Management

  1. Module Overview
  2. Planning and Integration Overview Task and Knowledge
  3. Incident Response Concepts and Process
  4. Forensics and Recovery
  5. Readiness and Assessment – Overview Tasks and Knowledge
  6. Identification and Response Overview Tasks and Knowledge
  7. Incident Processes

Module 6: Exam Prep

  1. Case Study – Security On a Shoestring Budget
  2. Case Study – APT In Action
  3. Summary
  4. Exam Prep

From: $14.99 / month

Clear
it-2-logo.png

You Will Get Certification After Completetion This Course.

From: $14.99 / month

Clear

Frequently Asked Questions

Instructional methods, course requirements, and learning technologies can vary significantly from one online program to the next, but the vast bulk of them use a learning management system (LMS) to deliver lectures and materials, monitor student progress, assess comprehension, and accept student work. LMS providers design these platforms to accommodate a multitude of instructor needs and preferences.

Online education may seem relatively new, but years of research suggests it can be just as effective as traditional coursework, and often more so. According to a U.S. Department of Education analysis of more than 1,000 learning studies, online students tend to outperform classroom-based students across most disciplines and demographics. Another major review published the same year found that online students had the advantage 70 percent of the time, a gap authors projected would only widen as programs and technologies evolve.

All new learning innovations are met with some degree of scrutiny, but skepticism subsides as methods become more mainstream. Such is the case for online learning. Studies indicate employers who are familiar with online degrees tend to view them more favorably, and more employers are acquainted with them than ever before. The majority of colleges now offer online degrees, including most public, not-for-profit, and Ivy League universities. Online learning is also increasingly prevalent in the workplace as more companies invest in web-based employee training and development programs.

The concern that online students cheat more than traditional students is perhaps misplaced. When researchers at Marshall University conducted a study to measure the prevalence of cheating in online and classroom-based courses, they concluded, “Somewhat surprisingly, the results showed higher rates of academic dishonesty in live courses.” The authors suggest the social familiarity of students in a classroom setting may lessen their sense of moral obligation.

Choosing the right course takes time and careful research no matter how one intends to study. Learning styles, goals, and programs always vary, but students considering online courses must consider technical skills, ability to self-motivate, and other factors specific to the medium. Online course demos and trials can also be helpful.
Our platform is typically designed to be as user-friendly as possible: intuitive controls, clear instructions, and tutorials guide students through new tasks. However, students still need basic computer skills to access and navigate these programs. These skills include: using a keyboard and a mouse; running computer programs; using the Internet; sending and receiving email; using word processing programs; and using forums and other collaborative tools. Most online programs publish such requirements on their websites. If not, an admissions adviser can help.

Description

The CISM training course is designed to provide on-the-job skills, as well as knowledge to pass the Certified Information System Manager (CISM) certification exam.
This is advanced-level cybersecurity training to complete once the PenTest+, CySA+, and various higher-level certifications in Cisco and Microsoft have been completed.
The course instructor is Roger St Hilaire, with 30+ years of experience and CISM, CGEIT, MOF, TOGAF & PSP-Rainmaker Foundation Certifications.
The course will cover the following list of main areas, spanning the four domains of the CISM practice and the related tasks. The ITU Online Training CISM Exam Preparation Course Outline:
  • Information Security Defined
  • Information Security Principles
  • Support the Business
  • Defend the Business
  • Promote Responsible Information Security Behavior

DOMAIN 1 – Information Security Governance

  • Section One: Designing a Strategy and Governance Framework
  • Section Two: Gaining Management Approval
  • Section Three: Implementing the Security Strategy

DOMAIN 2 – Information Security Risk Management

  • Section One: Risk Identification
  • Section Two: Risk Analysis and Treatment
  • Section Three: Risk Monitoring and Reporting

DOMAIN 3 – Information Security Program Development and Management

  • Section One: Alignment and Resource Management
  • Section Two: Standards Awareness and Training
  • Section Three: Building Security into Processes and Practices
  • Section Four: Security Monitoring and Reporting

DOMAIN 4 – Information Security Incident Management

  • Section One: Planning and Integration
  • Section Two: Readiness and Assessment
  • Section Three Identification and Response
  • Exam Techniques

ISACA Requirements for Certification:

  • To facilitate the student’s understanding of ISACA’s approach to information security, and its related concepts such as risk.
  • Develop an understanding of key practices in the governance, management of risk, program development, and incident management in the realm of information security.
  • Ensure that the student is appropriately prepared for successful completion of the Certified Information Security Manager exam given by ISACA on the first attempt.

Key Learning Topics In This Course

  • The understanding of requirements for the design and implementation of a Security Strategy and Governance Framework
  • The ability to leverage the Enterprise Risk Management Practice in the organization for identification, analysis, treatment, and monitoring of Security Risks.
  • To gain an understanding of the key tenets of developing and implementing a Security Program
  • The parameters for designing, structuring, and maintaining the performance of Information Security Incident Management teams.

Reviews

There are no reviews yet.

Be the first to review “CISM Training – Information Systems Manager”

Your email address will not be published. Required fields are marked *

preloader