Certified Information Security Manager Course

Betribsiwwergräifend Formatioun

U wie riicht sech d'Formatioun?

  • CISM is not an entry-level certification. It is specifically developed for the information security professional who has acquired experience managing information security.
  • Individuals with three years or more of experience managing the information security function of an enterprise or performing such duties will find the CISM designation tailored to their knowledge and skills.

Erreechten Niveau

Avancéiert

Dauer

3,00 Dag(Deeg)

Horaire des cours 9h - 17h avec 1 h de pause déjeuner.

Sprooch(e) vun der Déngschtleeschtung

EN FR

Nächst Sessioun

Virkenntnisser

Submit verified evidence of a minimum of five years of information security work experience, with a minimum of three years of information security management work experience in three or more of the job practice analysis areas.

Ziler

NetCom's Certified Information Systems Manager (CISM) program will help you prepare for the CISM certification exam. The course will focus on the essential areas covered in the CISM exam.

Passing the exam and becoming a CISM ensures your success in your organization as by hiring or retaining the services of a CISM, an organization knows that it has invested in a professional who:

  • Has met the stringent requirements of a globally recognized credential
  • Demonstrates information security management knowledge and skill
  • Commits to ongoing professional development

The CISM certification program is developed specifically for experienced information security managers and those who have information security management responsibilities.

Inhalt

  • Security Governance (Day 1 - Maps to domains 1 & 2)
    • Introduction to Information Security Management
    • Process and project management systems
    • Risk Management
    • Human Resources
  • Access Control (Day 2 - Maps to Domains 3 & 4)
    • Understanding Operating Systems
    • Discretionary Access Control (DAC)
    • Mandatory Access Control (MAC)
    • Role-Based Access Control (RBAC)
    • Identity and Access Management
    • Intrusion Detection Systems (IDS)
    • Security Information and Event Management (SIEM)
  • Cryptology (Day 3 - Maps to Domains 3 & 4)
    • Introduction to Cryptography
    • Symmetric encryption
    • Asymmetric encryption
    • Hashing, Message Authentication and Digital Signatures
    • Cryto-systems (SSL, EMAIL, IPSec, SSH)
    • Key Management and Public Key Infrastructure (PKI)
    • Cryptanalysis
  • Inter-Network Technology (Day 4 - Maps to Domains 3 & 4)
    • Local Area Networks (LAN) technologies, Ethernet and WIFI, TCP/IP, Routing and Switching
    • Wide Area Network (WAN) technologies
    • Firewalls, DMZ designs and Bastion Hosts
    • Network risks
  • Business Continuity Management (Day 5 - Maps to Domain 5)
    • Natural, man made accidental and man made intentional threats
    • Business Impact Analysis
    • Criticality metrics; MTPD, RTO, RPO, MOR
    • Disaster Recovery Plans
    • Incident Response Management
    • Computer Forensics
    • Evidence issues; types of evidence, life cycle and chain of custody

Organisatiounsmodus

Le repas est inclus dans le tarif.

Dës Formatioune kéinten Iech interesséieren