Certified Information Security Manager (CISM)

Course Name

Certified Information Security Manager (CISM)

Contact Hours: 40 (an estimated time frame devoted to a course of study from start to finish that can vary from student to student)

Course Description

IT Security is without question one of the hottest and most lucrative areas of Information Technology today and the CISM is one of the most valued credentials in the marketplace. This course promotes international practices and provides management with assurance that those earning this designation have the necessary knowledge and experience to provide effective security management. This course trains students for a position in Risk Management, Security Auditor, Compliance Officer or an executive management position as a CSO, CTO or CIO.

The demand for skilled information security management professionals is on the rise, and the CISM certification is the globally accepted standard of achievement in this area. CISMs understand the business. They know how to manage and adapt technology to their enterprise and industry.

Please note: Course of study may be completed earlier than indicated and students retain access for one year from date of enrollment.

Outcome

CISM certification is for IT professionals looking to gain the following security analyst skills:

  • Identify the tasks within the information security governance job practice area
  • Recognize the outcomes of information security governance
  • Recognize the difference between corporate governance and information security governance
  • Match senior management roles with their corresponding responsibilities related to information security governance
  • Identify the elements of the information security business model
  • Recognize the interconnections between the elements of the information security business model
  • Recognize key concepts related to information security governance
  • Identify the optimal reporting relationship between senior management and the information security manager
  • Label examples of reports about information security according to their intended recipients within an organization
  • Identify the goal of converging security-related functions
  • Identify categories of key goal indicators
  • Recognize key concepts related to information security management

Assessment

Visual Demonstrations & Multimedia Presentations - Our courseware includes instructor-led demonstrations and visual presentations that allow students to develop their skills based on real world scenarios explained by the instructor. We always focus on real world scenarios and skill-set development.

Outline

Module 1: Information Security Governance
Module 2: Risk Management
Module 3: Information Security Program Development
Module 4: Information Security Program Implementation
Module 5: Information Security Program Management
Module 6: Incident Management and Response

To receive a complete and comprehensive course outline write to courseinfo@jeronline.com and include the complete course title.


Books

All training is delivered online; no additional purchase required.

Copyright © JER Online (JER Group Inc.)
In Partnership with Accredited Colleges and Universities
All Rights Reserved.