In-Person Classroom
Classroom styled training by a certified expert
- Lifetime access with downloadable resources
- Get certificate on completion by our certified experts
- Get few Quizzes & Case studies to practice offline
- Application assistance and support by certified staff
$ 3149
Live Online Classroom
Start instantly and learn at your own schedule
- 100% online classes
- Flexible deadlines
- Earn a Certification upon completion by our globally recognized experts
- Avail study materials, videos, practice sets, quizzes to crack the examination with 100% results.
- Recorded lesson video for post-training learning
$ 3349
Online Self-Study
Online courses to build your skills and advance your career
- 24*7 career support
- Get Certified by our leading experts recognized globally
- Get noticed by the top hiring companies
- Exam passing tips and tricks to assist in the exam
- Industry case studies and capstone projects
$ 899
CISM Certification Training
This Certified Information Security Manager course validates your learning and experience required to create a robust data security program.
Course Overview
The CISM Certification Training Program at Skill Rise ensures that you grasp the core theory and principles of Information Security strategy development and management along with Information Security Governance, and clear the CISM exam in your first attempt. CISM Certification is largely acknowledged worldwide which can really make your profile visible to organizations all around the world.
Course Agenda
Introduction
Priorities for the CISM
Priorities for the CISM Part 2
Priorities for the CISM Review Questions
Corporate Governance
Evaluating the Security Environment
Information Security Program
Security Strategy
Roles and Responsibilities
Reporting and Compliance
Code of Ethics
Summary and Review
Risk Management Intro
Risk Identification
Information Security Program Basics
Administrative Controls
Asset Threats and Vulnerabilities
Risk Register
Frameworks
Information Security Architecture
Risk Scenarios
Risk Scenarios Continued
Risk Assessment Introduction
Examples of Risk Analysis Techniques
Risk Assessment
BCP and DRP
Creation of BCP and DRP
Risk Mitigation Reduction and Avoidance
Risk Mitigation Transference and Acceptance
Selecting a Mitigation Strategy
Types of Mitigating Controls
Risk and Control Monitoring and Reporting
KRI's
Tools for Risk Monitoring
Information Security Program and Development
Information Security Program Concepts
Information Security Program Requirements
Essential Elements of an Information Security Program
Security Frameworks
Purpose of Architecture
Information Security Frameworks
Security Operations Event Monitoring
Secure Engineering and Threat Modeling
Protecting the Network-Segmentation
Protecting the Network-Wireless Security
Protecting the Network-Services
Protecting the Network through Detection and Network Access Control
Data and Endpoint Security
Identity and Access Management
Third-Party Governance
Policies Procedures Standards and Guidelines
Certification and Accreditation
Domain 3 Wrap-up
BCP and DRP
Incident Management Processes
Roles and Responsibilities
Making the case for incident response
Developing the Incident Response Plan-Capability Assessment
Incident Response Planning Processes
Incident Detection Devices
BCP steps
BCP Intro
BCP Step 1
Business Impact Analysis Step 2
BCP Step 3
BCP Step 4
Analyze and Update a Company BCP/BIA/DRP/CIRP
BCP Roles and Responsibilities
BCP sub plans
Testing the Plan
ISACA - CISM - Certified Information Security Manager