Certified Information Security Manager (CISM®) - preparation course
During the five-day CISM® (Certified Information Security Manager) Preparation Course, you will be trained to become a broadly skilled security management specialist.
There are currently many suppliers that prepare you for the CISM® exam. These courses focus primarily on training for the exam. In our experience, the CISM® exam should not be underestimated. Just training for exam questions and studying the theory is not enough to actually understand and apply the material. This CISM® course distinguishes itself - besides its focus on passing the exam - by its attention to understanding and being able to apply the material in practice.
After completing the course:
- You will have a thorough knowledge of the 4 CISM domains in order to apply them in practice.
- You will be fully prepared for the international CISM exam.
Schedule a training?
The CISM® course consists of five classroom course days in which theory is alternated with practical cases and practice questions. Each domain is discussed in detail, so that you have sufficient time to master the material. On the last day of the course you will be given an extensive CISM® exam that will be discussed afterwards. Attention is also given to the Dutch situation.
DEMANDER FORMATION EN ENTREPRISE |
Calendrier publique des formations | |||||
---|---|---|---|---|---|
date | durée | lang. | lieu | prix | Â |
06 mai | 5 | N | Woerden | 4125 EUR (exempte de TVA) | |
06 mai | 5 | N | web based | 4125 EUR (excl. TVA) | |
05 juin | 5 | N | Woerden | 4125 EUR (exempte de TVA) | |
05 juin | 5 | N | web based | 4125 EUR (excl. TVA) | |
03 sep | 5 | N | Woerden | 4125 EUR (exempte de TVA) | |
03 sep | 5 | N | web based | 4125 EUR (excl. TVA) | |
INFO SESSION ET INSCRIPTION |
Intended for
The CISM® Preparation Course is intended for students who are or will be tasked with implementing and safeguarding security management in the organization.
- Information security consultants
- Security managers involved at a tactical level in the organization
- Information security coordinators
- IT auditors
Background
Basic knowledge of information security is recommended. In addition, having basic knowledge of security & technology is desirable.
If you do not already have this, we recommend taking the IT Security Foundation course prior to this course. This has been specially developed so that you also obtain the correct technical knowledge. In addition, the IT Security Foundation course is specially designed to provide you with the necessary technical knowledge. It can also serve as a springboard for mastering the management side of CISM®.
This course is optional and is not part of the CISM® course.
Main topics
Module 1 - Information Security Governance
- Deals with organizing the design and governance of the information security function within the organization. This includes: setting information security goals (in measurable terms), determining roles and responsibilities, describing the current and desired situation, performing a gap analysis that leads to a strategy to achieve the desired situation, as well as translating this into an information security action plan; get to work!
Module 2 - Information Security Risk Management
- Provides insight into formulating a risk management strategy, associated roles and responsibilities, determining the risk management framework, performing risk gap analysis, assessment and treatment options of risks, integration with life cycle processes, working with baseline measures, as well as risk monitoring and communication.
Module 3 - Information Security Program
- Concerns the translation of the action plan created in Module 1 into an information security program: defining program objectives, scope of the program, performing gap analysis of the current and desired situation with regard to the development and management of an IS program, focusing on IS architectures, management tasks, operational aspects of program implementation, the importance of third parties, types of measures that can be implemented, as well as program metrics and monitoring to monitor the progress of program implementation.
Module 4 - Incident Management.
- And what if things unexpectedly go wrong, if an incident grows into a disaster? Incident response goals and procedures need to be developed, an incident response team that is knowledgeable and trained on the subject, also incident response plans, disaster recovery plans and procedures. Those plans should be extensively tested. Consideration has been given to fallback sites (hot, warm, cold, etc.) and desired recovery times have been determined so that the business can be operational again on time. And after a disaster, various post-incident activities take place, such as securing evidence and locating the root cause of the disaster.
Practice Exam
- On your last course day, you will take an extensive CISM practice exam, so that you can judge for yourself to what extent you are ready for the official ISACA CISM certification exam and to which domains you should pay more attention. After taking the practice exam, you will have the opportunity to discuss answers or potential issues with your trainer and the group.
Training method
You will receive the course materials at the start of the course.
The course material is in English and the language of instruction during the course is Dutch.
Certificate
The CISM exam is administered by ISACA and is not included in the training. This CISM exam is a theoretical exam that requires a lot of detailed knowledge. This means that after the course a lot of time needs to be spent in preparing for the exam.
Duration
5 days.
Course leader
Information Security Academy BV: an APMG Approved ISACA ATO.
INFO SESSION ET INSCRIPTION |