Certified Information Security Manager (CISM) CLS Learn
السعر: 2,321 درهم

    تفاصيل الدورة

    Course Outline
    1 - Information Security Governance

    Develop an Information Security Strategy
    Align Information Security Strategy with Corporate Governance
    Identify Legal and Regulatory Requirements
    Justify Investment in Information Security
    Identify Drivers Affecting the Organization
    Obtain Senior Management Commitment to Information Security
    Define Roles and Responsibilities for Information Security
    Establish Reporting and Communication Channels
    2 - Information Risk Management
    Implement an Information Risk Assessment Process
    Determine Information Asset Classification and Ownership
    Conduct Ongoing Threat and Vulnerability Evaluations
    Conduct Periodic BIAs
    Identify and Evaluate Risk Mitigation Strategies
    Integrate Risk Management into Business Life Cycle Processes
    Report Changes in Information Risk
    3 - Information Security Program Development
    Develop Plans to Implement an Information Security Strategy
    Security Technologies and Controls
    Specify Information Security Program Activities
    Coordinate Information Security Programs with Business Assurance Functions
    Identify Resources Needed for Information Security Program Implementation
    Develop Information Security Architectures
    Develop Information Security Policies
    Develop Information Security Awareness, Training, and Education Programs
    Develop Supporting Documentation for Information Security Policies
    4 - Information Security Program Implementation
    Integrate Information Security Requirements into Organizational Processes
    Integrate Information Security Controls into Contracts
    Create Information Security Program Evaluation Metrics
    5 - Information Security Program Management
    Manage Information Security Program Resources
    Enforce Policy and Standards Compliance
    Enforce Contractual Information Security Controls
    Enforce Information Security During Systems Development
    Maintain Information Security Within an Organization
    Provide Information Security Advice and Guidance
    Provide Information Security Awareness and Training
    Analyze the Effectiveness of Information Security Controls
    Resolve Noncompliance Issues
    6 - Incident Management and Response
    Develop an Information Security Incident Response Plan
    Establish an Escalation Process
    Develop a Communication Process
    Integrate an IRP
    Develop IRTs
    Test an IRP
    Manage Responses to Information Security Incidents
    Perform an Information Security Incident Investigation
    Conduct Post-Incident Reviews تحديث بتاريخ 20 July, 2020

    المتطلبات

    Who Should Attend
    The intended audience for this course is information security and IT professionals, such as network administrators and engineers, IT managers, and IT auditors, and other individuals who want to learn more about information security, who are interested in learning in-depth information about information security management, who are looking for career advancement in IT security, or who are interested in earning the CISM certification.

    نبذة عن معهد CLS Learn

    Since 1995, CLS Learning solutions is leading the technology learning market in Egypt, the Middle East, and Africa. With our wide network of international partners, trainers, instructors, and technology leaders; we are able to deliver top notch training programs to our students and technology professionals.

    25 Years in the market. 

    We delivered over 4,200 courses to 63,500 professionals in our centers.

    We delivered 1,200 courses to 18,240 corporate employees on Site.

    عرض الجميع دورات CLS Learn
    دورات يمكنك الالتحاق بها على الفور... خذ دورة عبر الإنترنت على CISM ابتداءً من الآن. See all courses

    هل هذه الدورة التدريبية الاختيار المناسب لك؟

    قيِم هذه الصفحة

    لم تجد ما كنت تبحث عنه؟

    أو