Skip to main Content

E-Learning: E-learning: CISM Online Review Course (CISM-EL)

  • Prijs: eur950,00
  • Code training: CISM-EL

eur950,00

(excl. BTW)

Schrijf je in Schrijf je in

Omschrijving

Top

This material covers the updated CISM Exam Content Outline and is intended to be used in preparation for the new CISM exam effective 1 June 2022. 

Prepare to obtain the Certified Information Security Manager® (CISM) certification and be recognized among the world’s most-qualified information security management professionals. The CISM Online Review Course provides online, on-demand instruction and is ideal for preparing you for the CISM certification exam.

The course covers all four of the CISM domains, and each section corresponds directly to the CISM Exam Content Outline. It uses proven instructional design techniques, incorporating video, interactive eLearning modules, downloadable job aids, case study activities and a practice exam. 

Learners will have access to the course for one year from date of purchase and will earn 20 CPE upon completion. This course has a seat time of approximately 16 hours and is accessed via the Learning Access tab of your MyISACA dashboard. 

Please note : The exam is not included with the course but can be purchased seperately.

Included Materials:

  • Video
  • Interactive Content
  • Downloadable handouts 
  • Practice exam

Doelstellingen

Top

At the completion of this course you will be able to:

  • Explain the relationship between executive leadership, enterprise governance and information security governance. 
  • Outline the components used to build an information security strategy. 
  • Explain how the risk assessment process influences the information security strategy. 
  • Articulate the process and requirements used to develop an effective information risk response strategy. 
  • Describe the components of an effective information security program. 
  • Explain the process to build and maintain an enterprise information security program. 
  • Outline techniques used to assess the enterprise’s ability and readiness to manage an information security incident. 
  • Outline methods to measure and improve response and recovery capabilities. 

Inhoud

Top

Introduction

  • Welcome video

Domain 1 – Information Security Governance 

  • Describe the role of governance in creating value for the enterprise. 
  • Explain the importance of information security governance in the context of overall enterprise governance. 
  • Describe the influence of enterprise leadership, structure and culture on the effectiveness of an information security strategy. 
  • Identify the relevant legal, regulatory and contractual requirements that impact the enterprise. 
  • Describe the effects of the information security strategy on enterprise risk management. 
  • Evaluate the common frameworks and standards used to govern an information security strategy. 
  • Explain why metrics are critical in developing and evaluating the information security strategy. 

Domain 2 – Information Security Risk Management

  • Apply risk assessment strategies to reduce the impact of information security risk. 
  • Assess the types of threats faced by the enterprise. 
  • Explain how security control baselines affect vulnerability and control deficiency analysis. 
  • Differentiate between application of risk treatment types from an information security perspective. 
  • Describe the influence of risk and control ownership on the information security program. 
  • Outline the process of monitoring and reporting information security risk. 

Domain 3 – Information Security Program 

  • Outline the components and resources used to build an information security program. 
  • Distinguish between common IS standards and frameworks available to build an information security program. 
  • Explain how to align IS policies, procedures and guidelines with the needs of the enterprise. 
  • Describe the process of defining an IS program road map. 
  • Outline key IS program metrics used to track and report progress to senior management. 
  • Explain how to manage the IS program using controls. 
  • Create a strategy to enhance awareness and knowledge of the information security program. 
  • Describe the process of integrating the security program with IT operations and third-party providers. 
  • Communicate key IS program information to relevant stakeholders. 

Domain 4 – Incident Management

  • Distinguish between incident management and incident response 
  • Outline the requirements and procedures necessary to develop an incident response plan. 
  • Identify techniques used to classify or categorize incidents. 
  • Outline the types of roles and responsibilities required for an effective incident management and response team 
  • Distinguish between the types of incident management tools and technologies available to an enterprise. 
  • Describe the processes and methods used to investigate, evaluate and contain an incident. 
  • Identify the types of communications and notifications used to inform key stakeholders of incidents and tests. 
  • Outline the processes and procedures used to eradicate and recover from incidents. 
  • Describe the requirements and benefits of documenting events. 
  • Explain the relationship between business impact, continuity and incident response. 
  • Describe the processes and outcomes related to disaster recovery. 
  • Explain the impact of metrics and testing when evaluating the incident response plan. 

CISM Practice Exam

  • 80 questions

Voorkennis

Top
None
Cookie Control toggle icon