CISM 2013: Information Security Program Development and Management (Part 4) New Horizons Jordan
Price: TBA
  • Duration: 2 Hours

Course details

Information security programs typically have numerous operational responsibilities and provide a variety of security services. While programs vary from organization to organization, there are operations and services that are typically found in all well conceived security programs. This course examines the activities and responsibilities of an information security manager related to operations and services within an organization. The course will examine different organizational units such as IT, HR, and Legal that are affected by security programs, and how their needs are integrated into the program. This course also examines how audits and compliance enforcement are performed. Finally, this course examines how technology - both legacy and new technologies such as cloud computing - are managed in modern security programs. This course prepares you for the Certified Information Security Manager (CISM) exam.

  • match information organizational roles to their corresponding responsibilities
  • determine the responsibilities of individuals within an organization related to standard security program components
  • sequence the steps of a security review, given a scenario
  • identify key points regarding audits that an information security manager should remember during program implementation
  • identify preventive measures that minimize security risk
  • identify the responsibilities of an information security manager with relation to compliance monitoring and enforcement
  • recognize the results of commonly used risk analysis methods
  • recognize the responsibilities of an information security manager related to monitoring and compliance
  • identify activities that allow an information security manager to integrate a security program within an organization
  • recognize strategies for managing risk of outsourcing when using third-party service providers
  • recognize examples of cloud computing models
  • recognize the responsibilities of an information security manager related to process integration and outsourcing
Updated on 08 November, 2015

About New Horizons Jordan

As changes in technology have accelerated, it’s become even more essential for people to master technology to be productive, invaluable employees who optimize, program and invent solutions—and even grow companies of their own. For 30 years, New Horizons has provided more than 30 million students with industry-leading technical training that delivers the most relevant and intuitive computer ctheirses and certifications. they’re now the world’s largest independent IT training company, and they continue to lead:
  • 300 computer training centers in 70 countries (and counting)
  • Largest Guaranteed-to-Run ctheirse schedule in the world
  • Ranked in the top 5% of the industry for training quality and customer satisfaction
  • Official training partner for technology leaders such as Microsoft, Cisco, CompTIA and VMware
  • Microsoft’s largest training provider, delivering more than 40% of all authorized Microsoft training worldwide
  • World’s largest Cisco-authorized training partner
See all New Horizons Jordan courses
Are you from New Horizons Jordan ? Claim your course!
Courses you can instantly connect with... Do an online course on CISM starting now. See all courses

Is this the right course for you?

Rate this page

Didn't find what you were looking for ?

or