CISM Certified Information Security Manager

Learn to secure information systems

ABOUT THE PROGRAM

Securing organisation’s confidential data is always an essential task to work upon. CISM Certified Information Security Manager is a 4-day course which is designed to provide in-depth knowledge regarding the secure information systems. Our certified trainers will help the delegates to design, manage and evaluate security programs by using real-world examples.

  • Learn to design, manage and evaluate the information security systems

  • Thorough understanding of IT systems

  • Gain status of Security Manager within the organisation to explore new opportunities

  • Key learning points and tutor support

  • Delivered by highly experienced and certified instructors

  • Get to know about the risk and challenges associated with the system

WHAT'S INCLUDED ?

Find out what's included in the training programme.

Includes

Courseware

Courseware will also be provided to the delegates so that they can revise the course after the training.

Includes

Tutor Support

A dedicated tutor will be at your disposal throughout the training to guide you through any issues.

Includes

Key Learning Points

Clear and concise objectives to guide delegates through the course.

Includes

Exam(s) included

Exams are provided, as part of the course. Obtaining certification is dependant on passing these exams

PREREQUISITES

Although there is no such prerequisite for this course, a basic understanding of information security can be beneficial.

TARGET AUDIENCE

CISM Certified Information Security Manager course is designed majorly for the professionals who are involved in directing information security programs.

The following may also get benefit from this course:

  • Information Security Managers
  • IT Consultants
  • Chief Information Officers
  • Security Managers
  • IT Senior Managers
  • Engineers
  • IT Programme Managers

WHAT WILL YOU LEARN?

After the successful completion of the course, the delegates will achieve the comprehensive knowledge regarding the following:

  • Cost analysis to decide on operation to migrate attacks
  • Improving the security of the system
  • Detailed understanding of copyrights
  • Principles and practices of risk management
  • Restrictions on importing and exporting of data
  • Privacy and tax laws
  • Effective assessment of information security systems

Enquire Program

Fill in the form below & we'd get back to you.

PROGRAM OVERVIEW

CISM Certified Information Security Manager course focuses on designing, developing and governance of operations involved in the information system. Holding this certification ensures that the delegates have achieved precise knowledge and understanding of information security management. During the training, the delegates will get to know about solutions of various emerging issues like incident management, information security programs and security practices.

Exam

After the training, the delegates will have to clear an exam in order to get certified. All the details regarding exam will be provided by our trainer at the end of the training. The exam will have the following exam pattern:

There will have to score 450 marks in order to gain certification. 200 questions in the exam. The questions will have multiple choices; the candidates have to choose the correct answer and proceed. The total duration of exam will be 4 hours for completing the exam. The exam will be of 800 marks and candidates.


PROGRAM CONTENT

Introduction to Information Security Governance: Information Security Governance concerns with the view of management regarding the security of the system. It includes the structure of the organisation, reports to Information Security Officer and guiding principles adopted for the security. The following topics will be covered in this module:

  • Define Asset Identification
  • Define Risk Assessment
  • Overview of Vulnerability Assessments
  • Overview of Asset Management

Introduction to Information Risk Management: Information Risk Management allows the delegates to go through several concepts that they need to review and understand. It includes the process of Information risk assessment, business impact, change management and its benefits. The candidates will learn about the threats and its assets. Also, the vulnerabilities associated with it. This section covers the following topics:

  • Define Asset Classification and Ownership
  • Process of Structured Information Risk Assessment
  • Assessments of Business Impact
  • Qualitative and Quantitative Risk Management
  • Define Change Management

Introduction to Information Security Program Development: Information Security Program Development and management include a review of the various programs and processes that should be opted for protection of information assets. This is a crucial part of every organisation as protecting the confidential data is a must for security. This section includes the following topics:

  • Define Information Security Strategy
  • Program Alignment of Other Assurance Functions
  • Development of Information Security Architectures
  • Security Awareness, Training, and Education
  • Communication and Maintenance of Standards, Procedures, and Other Documentation
  • Overview of Change Control
  • Overview of Lifecycle Activities
  • Describe various Security Metrics

Introduction to Information Security Program Management: Once a security program is developed, it is important to manage it. It includes successfully manage security program, baselines for planning and security purposes, infrastructure for the security program and much more.

  • Define Security Program Management
  • Define Planning and Security Baselines
  • Overview of Business Processes
  • Overview of Security Program Infrastructure
  • Describe Lifecycle Procedures
  • Impact of security on users
  • Define Accountability and Security Metrics
  • Overview of Resources Management

Introduction to Incident Management and Response: Incident Management and Response aims to handle the situation in a way that limits damage by reducing the cost and time for recovery. It includes a plan which defines a step-by-step process that should be followed in case of any incident. This section covers the following topics:

  • Define Response Management
  • Importance of Response Management
  • Analysis of Business Impact
  • Emerging Response and Recovery Plans
  • Define Incident Response Process
  • Executing Response and Recovery Plans
  • Define Response Documentation

CISM Certified Information Security Manager Enquiry

 

Enquire Now


----- OR -------

Reach us at 0121 368 7851 or info@msptraining.com for more information.

ABOUT Sunderland

Sunderland is a coastal city lies at the mouth of the Wear River, around 80 meters above sea level. It is located in the centre of the City of Sunderland metropolitan borough, local government district in England with a population of around 174,286 according to 2011 census. It is situated about 10 miles southeast of Newcastle and 240 miles north of London. The River Wear flows through the centre of the town and divides in a deeply incised valley. The town’s name is originated from sundered land meaning land kept aside for a special purpose or land sundered. The evidence of three settlements found historically in a county in North East England or County Durham on the site of present-day Sunderland.

The area of Sunderland Monkwearmouth is located on the north bank of the Wear River and settled in 674 during the foundation of Jarrow Abbey by the Benedict Biscop. Another settlement Bishopwearmouth founded in 930, lies at the southern side of the river. The town developed as a port over a period and became famous for trading salt and coal. The construction of ships started on the river in the 14th century. With the passage of time, the port of the town absorbed Monkwearmouth and Bishopwearmouth by the 19th century. The town became the major centre for the automotive industry and the service sector. It has been suggested that the person who is born or lives in the town, sometimes known as Mackem. The concept came into existence in the late 20th century and not used until 1980.

History

The early inhabitants of the town were the hunter-gatherers during Stone Age. The remains of the period were found during the excavations of St Peter’s Church in Monkwearmouth including the artefacts and microliths. The area of Hastings Hill became a primary place of burial and central point of activity in the Neolithic period, the final phase of the Stone Age. In the pre and post-Roman period, the area was occupied by the Brigantes around the Wear River. During the Anglo-Saxon era, the town became an important centre of knowledge and learning and library with approximately 300 volumes was also located in the town.  

The long trench, a tactic of warfare was found as one artefact of the English civil war. In the 17th century, the three original settlements (Monkwearmouth, Sunderland and Bishopwearmouth) were integrated and known as Sunderland-near-the-Sea. The factors behind the incorporation included the construction of ships on the banks of the river, salt panning and success of the port of Sunderland. The construction of Sunderland barracks was completed in 1794. These barracks included the 80-bed hospital, soldier’s quarters and housing for 1528 infantry troops. The second iron bridge of the world was built in the town in 1796.

The town was severally affected by the major Indian epidemic Cholera, broke out in the town in 1831. The disease spread in other parts of the country resulted in the death of more than 32000 people. The town again suffered from the worst disaster of the Victoria Hall in 1883 leading to the death of 183 children due to lack of enough way to pass during a variety show. This led to the invention of the concept of push bar emergency doors. The economy of the town shifted to chemical and motor manufacturing after the fall of heavy industries in the early 19th century. The electric tram system arrived in the town in 1900, later on, these were replaced by the buses in 1940.

The town saw remarkable expansion in the shipbuilding business during the First World War and became the prime target of a Zeppelin raid in 1916. Approx. 2500 citizens of the town served in the armed forces during the war period. The town also attacked by the German bombers during the Second World War leading to the destruction of 4000 homes and death of 267 people in the town. The coal mining and shipbuilding industry declined and ended by the late 20th century resulted in the unemployment of the local workforce.