Course Details
Course Outline
1 - The Basics
Security ConceptsGovernance, Goals, Strategies, Policies, Standards, and Procedures StrategyRisk Appetite, Tolerance, and CapacityAnalysis of RiskControlling Threats and RiskControls and CountermeasuresALE, RTO, RPO, SDO, MTO, MTD, and AIWBCP, DRP, and BIABusiness Continuity and Disaster RecoveryTesting Incident Response, Business Continuity Plans, and Disaster Recovery PlansRoles, Responsibilities, RACI, and SkillsDue Diligence and Due CareSecurity PrinciplesKGIs, KPIs, KRIs, and CSFsTechnologiesStandards and FrameworksCultureMetricsCurrent State, Desired State, and the Gap in BetweenInformation Security Infrastructure and ArchitectureCloud ComputingMetrics DevelopmentBusiness Model for Information Security (BMIS)
2 - Four Domains
Information Security Governance — Overview Information Security Governance — The Goal Information Security Governance — The Strategy Information Security Governance — Who Does WhatInformation Security Governance — Resources That HelpInformation Security Governance — Constraints That HurtInformation Security Governance — The Action PlanInformation Security Governance — Metrics and MonitoringInformation Security Governance —What Success Looks LikeInformation Risk Management — OverviewInformation Risk Management — The GoalInformation Risk Management — The StrategyInformation Risk Management — Who Does WhatInformation Risk Management — Resources That HelpInformation Risk Management — Constraints That HurtInformation Risk Management — The Action PlanInformation Risk Management — Metrics, Monitoring, and ReportingInformation Risk Management — What Success Looks LikeInformation Security Program Development and Management — OverviewInformation Security Program Development and Management — The GoalInformation Security Program Development and Management — The StrategyInformation Security Program Development and Management — Who Does WhatInformation Security Program Development and Management — Resources That HelpInformation Security Program Development and Management — Constraints That HurtInformation Security Program Development and Management — The Action PlanInformation Security Program Development and Management — Metrics and MonitoringInformation Security Program Development and Management — What Success Looks LikeInformation Security Incident Management — OverviewInformation Security Incident Management — The GoalInformation Security Incident Management — The StrategyInformation Security Incident Management — Who Does WhatInformation Security Incident Management — Resources That HelpInformation Security Incident Management — Constraints That HurtInformation Security Incident Management — The Action PlanInformation Security Incident Management — Metrics and MonitoringInformation Security Incident Management — What Success Looks Like
Actual course outline may vary depending on offering center. Contact your sales representative for more information.
Who is it For?
Target Audience
The intended audience for this course is information security and IT professionals, particularly IT managers who are interested in earning the CISM certification. The course is also applicable to individuals who are interested in learning in-depth information about information security management or who are looking for career advancement in IT security.
Other Prerequisites
To ensure your success, you should have at least five years of professional experience in information security, as well as at least three years of experience in information security management. You are also required to prove this level of experience to ISACA in order to obtain certification. Major areas of information security management include:
- Information security governance
- Information risk management
- Information security program development
- Information security program management
- Incident management and response