Skip to main Content

Exam Vouchers: CISM exam voucher (CISM-EXAM) (CISM-EXAM)

  • Price: £615.00
  • Code: CISM-EXAM

£615.00

excl. VAT

Add to Cart Add to Cart

Description

Top

The ISACA CISM exam is designed for those who manage, design, oversee and assess an enterprise’s information security function.
CISM stands for Certified Information Security Manager; the certificate gives you international recognition as a security professional and increases your market value.

 

After ordering, you will receive an email from Global Knowledge within 2 business days with a voucher code and registration instructions. With this voucher you can book the CISM exam.

 

NB: This voucher can only be purchased if Candidate has previously purchased/attended the preparation course (ILT or E-Learning) at Global Knowledge: CISM  "CISM®, Certified Information Security Manager® + Practice Questions (QAE)"

Further Information

Top
  • Languages: English, Spanish, Chinese Simplified, Japanese, French, German
  • Duration: 4 hours (240 minutes),
  • Question: 150 multiple choice questions
  •  

    Objectives

    Top
     Supporting Tasks

    1. Identify internal and external influences to the organization that impact the information security strategy.

    2. Establish and/or maintain an information security strategy in alignment with organizational goals and objectives.

    3. Establish and/or maintain an information security governance framework.

    4. Integrate information security governance into corporate governance.

    5. Establish and maintain information security policies to guide the development of standards, procedures, and guidelines.

    6. Develop business cases to support investments in information security.

    7. Gain ongoing commitment from senior leadership and other stakeholders to support the successful implementation of the information security strategy.

    8. Define, communicate, and monitor information security responsibilities throughout the organization and lines of authority.

    9. Compile and present reports to key stakeholders on the activities, trends, and overall effectiveness of the information security program.

    10. Evaluate and report information security metrics to key stakeholders.

    11. Establish and/or maintain the information security program in alignment with the information security strategy.

    12. Align the information security program with the operational objectives of other business functions.

    13. Establish and maintain information security processes and resources to execute the information security program.

    14. Establish, communicate, and maintain organizational information security policies, standards, guidelines, procedures, and other documentation.

    15. Establish, promote, and maintain a program for information security awareness and training.

    16. Integrate information security requirements into organizational processes to maintain the organization’s security strategy.

    17. Integrate information security requirements into contracts and activities of external parties.

    18. Monitor external parties' adherence to established security requirements.

    19. Define and monitor management and operational metrics for the information security program.

    20. Establish and/or maintain a process for information asset identification and classification.

    21. Identify legal, regulatory, organizational, and other applicable compliance requirements.

    22. Participate in and/or oversee the risk identification, risk assessment, and risk treatment process.

    23. Participate in and/or oversee the vulnerability assessment and threat analysis process.

    24. Identify, recommend, or implement appropriate risk treatment and response options to manage risk to acceptable levels based on organizational risk appetite.

    25. Determine whether information security controls are appropriate and effectively manage risk to an acceptable level.

    26. Facilitate the integration of information risk management into business and IT processes.

    27. Monitor for internal and external factors that may require reassessment of risk.

    28. Report on information security risk, including noncompliance and changes in information risk, to key stakeholders to facilitate the risk management decision making process.

    29. Establish and maintain an incident response plan, in alignment with the business continuity plan and disaster recovery plan.

    30. Establish and maintain an information security incident classification and categorization process.

    31. Develop and implement processes to ensure the timely identification of information security incidents.

    32. Establish and maintain processes to investigate and document information security incidents in accordance with legal and regulatory requirements.

    33. Establish and maintain incident handling process, including containment, notification, escalation, eradication, and recovery.

    34. Organize, train, equip, and assign responsibilities to incident response teams.

    35. Establish and maintain incident communication plans and processes for internal and external parties.

    36. Evaluate incident management plans through testing and review, including table-top exercises, checklist review, and simulation testing at planned intervals.

    37. Conduct post-incident reviews to facilitate continuous improvement, including root-cause analysis, lessons learned, corrective actions, and reassessment of risk.

    Content

    Top

    Domain 1 – Information Security Governance (17%)

    • Enterprise Governance
      • Organisational Culture
      • Legal, Regulatory, and Contractual Requirements
      • Organisational Structures, Roles, and Responsibilities
    • Information Security Strategy
      • Information Security Strategy Development
      • Information Governance Frameworks and Standards

    Domain 2 – Information Security Risk Management (20%)

    • Information Security Risk Assessment
      • Emerging Risk and Threat Landscape
      • Vulnerability and Control Deficiency Analysis
      • Risk Assessment and Analysis
    • Information Security Risk Response
      • Risk Treatment / Risk Response Options
      • Risk and Control Ownership

    Domain 3 – Information Security Program (33%)

    • Information Security Program Development
      • Information Security Program Resources (e.g., people, tools, technologies)
      • Information Asset Identification and Classification
      • Industry Standards and Frameworks for Information Security
      • Information Security Policies, Procedures, and Guidelines
      • Information Security Program Metrics
    • Information Security Program Management
      • Information Security Control Design and Selection
      • Information Security Control Implementation and Integrations
      • Information Security Control Testing and Evaluation
      • Information Security Awareness and Training
      • Management of External Services (e.g., providers, suppliers, third parties, fourth parties)
      • Information Security Program Communications and Reporting

    Domain 4 Incident Management (30%)

    • Incident Management Readiness
      • Incident Response Plan
      • Business Impact Analysis (BIA)
      • Business Continuity Plan (BCP)
      • Disaster Recovery Plan (DRP)
      • Incident Classification/Categorisation
      • Incident Management Training, Testing, and Evaluation
    • Incident Management Operations
      • Incident Management Tools and Techniques
      • Incident Investigation and Evaluation
      • Incident Containment Methods
      • Incident Response Communications (e.g., reporting, notification, escalation)
      • Incident Eradication and Recovery
      • Post-incident Review Practices

    Pre-requisites

    Top
    • Five (5) or more years of experience in information security management.
    • Experience waivers are available for a maximum of two (2) years