CISM - Certified Information Security Manager

Logo UK Learning College

Need more information? Get more details on the site of the provider.

Starting dates and places

There are no known starting dates for this product.

UK Learning College offers their products as a default in the following regions: Aberdeen, Armagh, Bangor, Bath, Belfast, Birmingham, Bournemouth, Bradford, Brighton, Bristol, Cambridge, Canterbury, Cardiff, Carlisle, Chelmsford, Chester, Chichester, Coventry, Derby, Dundee, Durham, Edinburgh, Ely, Exeter, Gillingham, Glasgow, Gloucester, Hereford, Inverness, Ipswich, Kingston, Lancaster, Leeds, Leicester, Lichfield, Lincoln, Lisburn, Liverpool, London, Londonderry, Manchester, N/A, Newcastle, Newport, Newry, Norwich, Nottingham, Oxford, Peterborough, Plymouth, Portsmouth, Preston, Reading, Ripon, Salford, Salisbury, Sheffield, Southampton, St Albans, St Davids, Stirling, Stoke-on-Trent, Sunderland, Surrey, Sussex, Swansea, Truro, Wakefield, Wells, Westminster, Winchester, Wolverhampton, Worcester, York

Description

COURSE OVERVIEW A distance learning course is the ideal way to gain a qualification in Certified Information Security Manager (CISM). Whether you're looking to go on to further education, improve your job prospects or expand your knowledge, distance learning Certified Information Security Manager (CISM) is a flexible and convenient course, which allows you to comprehensively prepare for an exam or career through home study. What's more, because the distance learning Certified Information Security Manager (CISM) course is a fully comprehensive course, no prior knowledge is required. The CISM certification program is developed specifically for experienced information security managers and thos…

Read the complete description

Frequently asked questions

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.

COURSE OVERVIEW A distance learning course is the ideal way to gain a qualification in Certified Information Security Manager (CISM). Whether you're looking to go on to further education, improve your job prospects or expand your knowledge, distance learning Certified Information Security Manager (CISM) is a flexible and convenient course, which allows you to comprehensively prepare for an exam or career through home study. What's more, because the distance learning Certified Information Security Manager (CISM) course is a fully comprehensive course, no prior knowledge is required. The CISM certification program is developed specifically for experienced information security managers and those who have information security management responsibilities. CISM is globally recognized as the leading credential for information security managers. Our CISM Certified Information Security Manager course provides the student with the knowledge and proficiency to prepare for the globally recognized CISM 2011 certification exam. The CISM certification combines the achievement of passing a comprehensive exam with recognition of work, management and educational experience, providing you with greater credibility in the marketplace. This course will immerse the student into the subject, with in-depth coverage of the information covering the five domains that make up the "Body of Knowledge" for the CISM 2011 exam and will provide the student the tools to build their technical skills to manage, design, oversee and assess an enterprise's information security. Instructor: Kenneth Mayer - CCSI, MCT, CCNT, CCNP, CCDA Ken Mayer is a Microsoft Certified Trainer as well as a Certified Ethical Hacker Trainer and Security consultant. He started his career in computer technology in 1980s. He has offered a wide variety of IT training and high level consulting projects for Fortune 500 companies across the United States and Western Europe. He has achieved the Certified Cisco Systems Instructor certification. The CCSI certification involved a two-day lab and observation event held on Cisco's Paris, France Facility. This gave Ken the accreditation to be able to deliver Cisco Authorized Courses as a CCSI. He has taught the full line of Cisco CCNA, CCDA, CCNP, CCDP and CCIP course curriculums, including Cisco's security appliances such as PIX and IDS.

Course Key Topics The Certified Information Security Manager (CISM) course is divided into following comprehensive modules Domain 01 - Information Security Governance Lesson 1: Information Security Governance Overview Lesson 2: Effective Information Security Governance Lesson 3: Information Security Concepts and Technologies Lesson 4: Information Security Manager Lesson 5: Scope and Charter of Information Security Governance Lesson 6: Information Security Governance Metrics Lesson 7: Information Security Strategy Overview Lesson 8: Creating Information Security Strategy Lesson 9: Determining Current State Of Security Lesson 10: Information Security Strategy Development Lesson 11: Strategy Resources Lesson 12: Strategy Constraints Lesson 13: Action Plan to Implement Strategy Domain 02 - Information Risk Management Lesson 1: Risk Management Overview Lesson 2: Good Information Security Risk Management Lesson 3: Information Security Risk Management Concepts Lesson 4: Implementing Risk Management Lesson 5: Risk Assessment Lesson 6: Controls Countermeasures Lesson 7: Recovery Time Objectives Lesson 8: Risk Monitoring and Communication Domain 03 - Information Security Program Development Lesson 1: Development of Information Security Program Lesson 2: Information Security Program Development Concepts Lesson 3: Scope and Charter of Information Security Program Development Lesson 4: Information Security Program Resources Lesson 5: Implementing an Information Security Program Lesson 6: Information Infrastructure and Architecture Lesson 7: Information Security Program Domain 04 - Information Security Program Management Lesson 1: Information Security Management Overview Lesson 2: Organizational Roles and Responsibilities Lesson 3: The Framework for Information Security Management Lesson 4: Measuring Performance Lesson 5: Challenges Facing Information Security Lesson 6: Resources Lesson 7: Other Management Considerations Domain 05 - Incident Management and Response Lesson 1: Responding to the Incident Overview Lesson 2: Incident Management Concepts Lesson 3: The Incident Response Manager Lesson 4: What Are Good Incident Management Procedures Lesson 5: Resources for Incident Management Lesson 6: Testing Response and Recovery Plans Lesson 7: Executing the Plan (see full course syllabus below for more information)

Course Enrolment Fees Our aim is to provide you with the best deal available, therefore the enrolment fee for the Certified Information Security Manager (CISM) course is £623.75, though for a limited time we are offering you the opportunity to pay only £499 which is a 20% discount if you enrol online and pay in full. Delivery Charges: Free Delivery for UK Mainland Students Additional £25 for students in Europe Additional £40 for Students in Rest of the world

How is the course structured? The Certified Information Security Manager (CISM) course is divided intofollowing comprehensive modules Domain 01 - Information Security Governance Lesson 1: Information Security Governance Overview Information Security Governance Overview Importance of Information Security Governance Outcomes of Information Security Governance Lesson 2: Effective Information Security Governance Business Goals and Objectives Roles and Responsibilities of Senior Management Governance, Risk Management and Compliance Business Model for Information Security Dynamic Interconnections Lesson 3: Information Security Concepts and Technologies Information Security Concepts and Technologies Technologies Lesson 4: Information Security Manager Responsibilities Senior Management Commitment Obtaining Senior Management Commitment Establishing Reporting and Communication Channels Lesson 5: Scope and Charter of Information Security Governance Assurance Process Integration and Convergence Convergence Governance and Third-Party Relationships Lesson 6: Information Security Governance Metrics Metrics Effective Security Metrics Security Implementation Metrics Strategic Alignment Risk Management Value Delivery Resource Management Performance Measurement Assurance Process Integration/Convergence Lesson 7: Information Security Strategy Overview Another View of Strategy Lesson 8: Creating Information Security Strategy Information Security Strategy Common Pitfalls Objectives of the Information Security Strategy What is the Goal? Defining Objectives Business Linkages Business Case Development Business Case Objectives The Desired State COBIT COBIT Controls COBIT Framework Capability Maturity Model Balanced Scorecard Architectural Approaches ISO/IEC 27001 and 27002 Risk Objectives Lesson 9: Determining Current State Of Security Current Risk BIA Lesson 10: Information Security Strategy Development Elements of a Strategy The Roadmap Strategy Resources and Constraints Lesson 11: Strategy Resources Policies and Standards Definitions Enterprise Information Security Architectures Controls Countermeasures Technologies Personnel Organizational Structure Employee Roles and Responsibilities Skills Audits Compliance Enforcement Threat Assessment Vulnerability Assessment Risk Assessment Insurance Business Impact Assessment Outsourced Security Providers Lesson 12: Strategy Constraints Legal and Regulatory Requirements Physical Constraints The Security Strategy Lesson 13: Action Plan to Implement Strategy Gap Analysis Policy Development Standards Development Training and Awareness Action Plan Metrics General Metric Considerations CMM4 Statements Objectives for CMM4 Domain 01 Review Domain 02 - Information Risk Management Lesson 1: Risk Management Overview Types of Risk Analysis The Importance of Risk Management Risk Management Outcomes Risk Management Strategy Lesson 2: Good Information Security Risk Management Context and Purpose Scope and Charter Assets Other Risk Management Goals Roles and Responsibilities Lesson 3: Information Security Risk Management Concepts Technologies Lesson 4: Implementing Risk Management The Risk Management Framework The External Environment The Internal Environment The Risk Management Context Risk Analysis Lesson 5: Risk Assessment NIST Risk Assessment Methodology Aggregated or Cascading Risk Other Risk Assessment Approaches Identification of Risks Threats Vulnerabilities Risks Analysis of Relevant Risks Risk Analysis Semi-Quantitative Analysis Quantitative Analysis Example Evaluation of Risks Risk Treatment Options Impact Lesson 6: Controls Countermeasures Controls Residual Risk Information Resource Valuation Methods of Valuing Assets Information Asset Classification Determining Classification Impact Lesson 7: Recovery Time Objectives Recovery Point Objectives Service Delivery Objectives Third-Party Service Providers Working with Lifecycle Processes IT System Development Project Management Lesson 8: Risk Monitoring and Communication Risk Monitoring and Communication Other Communications Domain 02 Review Domain 03 - Information Security Program Development Lesson 1: Development of Information Security Program Importance of the Program Outcomes of Security Program Development Effective Information Security Program Development Cross Organizational Responsibilities Lesson 2: Information Security Program Development Concepts Technology Resources Information Security Manager Lesson 3: Scope and Charter of Information Security Program Development Assurance Function Integration Challenges in Developing Information Security Program Pitfalls Objectives of the Security Program Program Goals The Steps of the Security Program Defining the Roadmap Elements of the Roadmap Gap Analysis Lesson 4: Information Security Program Resources Resources Documentation Enterprise Architecture Controls as Strategy Implementation Resources Common Control Practices Countermeasures Technologies Personnel Security Awareness Awareness Topics Formal Audits Compliance Enforcement Project Risk Analysis Other Actions Other Organizational Support Program Budgeting Lesson 5: Implementing an Information Security Program Policy Compliance Standards Compliance Training and Education ISACA Control Objectives Third-party Service Providers Integration into Lifecycle Processes Monitoring and Communication Documentation The Plan of Action Lesson 6: Information Infrastructure and Architecture Managing Complexity Objectives of Information Security Architectures Physical and Environmental Controls Lesson 7: Information Security Program Information Security Program Deployment Metrics Metrics Strategic Alignment Risk Management Value Delivery Resource Management Assurance Process Integration Performance Measurement Security Baselines Domain 03 Review Domain 04 - Information Security Program Management Lesson 1: Information Security Management Overview Importance of Security Management Outcomes of Effective Security Management Risk Management Value Delivery Business Process Assurance Lesson 2: Organizational Roles and Responsibilities Information Security Manager Responsibilities Risk Management Responsibilities Technology Competencies Management and Administrative Responsibilities Board of Directors Executive Management Security Steering Committee Information Technology Unit Business Unit Manager Other Business Units Lesson 3: The Framework for Information Security Management Technical Components Operational Components of Security Management Components of Security The Administration Components of Security Other Components Lesson 4: Measuring Performance Measuring Risk and Loss Metrics for Organizational Objectives Determining Compliance Measuring Productivity Other Metrics Lesson 5: Challenges Facing Information Security What Is the State of Security Management The State of Information Security Management Lesson 6: Resources Control Best Practices Control Countermeasures Other Control Countermeasures Lesson 7: Other Management Considerations Implementation of the Security Program Management Management Metrics and Monitoring Other Security Monitoring Efforts The Lifecycle Process Other Aspects of Monitoring What Should Be Done About Noncompliance Issues Domain 04 Review Domain 05 - Incident Management and Response Lesson 1: Responding to the Incident Overview Responding to the Incident Overview Response and Management Incident Response Planning Importance of Incident Response Outcomes of the IRP Lesson 2: Incident Management Concepts Software Engineering Institute Definitions Technologies of Incident Response Incident Management Charter Lesson 3: The Incident Response Manager The Objectives of Incident Management Monitoring and Measuring Incident Management Alignment Integration Other Incident Management Considerations Lesson 4: What Are Good Incident Management Procedures The Difficulties of Creating an Incident Management Plan Lesson 5: Resources for Incident Management Human Resources Incident Response Team Organization IRT Roles and Responsibilities IRT Roles IRT Skills BIA IRT Capability Combining the BIA with the IRT Creating the Incident Response Plan Response and Recovery Plans Goals of Recovery Operations Choosing a Site Selection Implementing the Strategy Incident Management Response Teams Network Service High-availability Storage High-availability Risk Transference Other Response Recovery Plan Options Lesson 6: Testing Response and Recovery Plans Periodic Testing Analyzing Test Results Measuring the Test Results Lesson 7: Executing the Plan Updating the Plan Intrusion Detection Policies Who to Notify about an Incident Recovery Operations Other Recovery Operations Forensic Investigation Hacker / Penetration Methodology Demo - Vulnerability Scan Domain 05 Review Course Closure

Student Community We understand that studying from home may be a new experience for you. You could even be excused for feeling a little daunted since you will not be studying in a traditional "classroom environment". To help our students overcome these concerns we have developed a friendly online student community. The Student Community encourages a high level of interaction with your tutor and other like-minded students. All of our students receive access to the Student Community. You will be able to use the student community for the following: Access the student forum which allows you to share ideas and chat with other students. View your tutor's feedback on your marked assignments. View optional reading lists for your course (where available). Access free online games, for when you need a break from studying. View the study guide with plenty of useful hints and tips on how to get the most out of your course. Access free courses such as: Improving Learning Skills, Job Interview Skills, The Effective Learner, Goal Setting and Time Management, Ten Tips to Complete a Good Test Paper VISIT THE STUDENT COMMUNITY

Related Courses Below you will find a list of courses that previous students have taken to complement their course. We hope that this list will give you some idea of the types of progression courses we offer, or alternative course options that may be of interest to you. Microsoft Certified IT Professional (MCITP) - Enterprise Support - This certification prepares you for various job roles, which include: system administrators, network administrators, or technical support specialists. The test is appropriate for you if you have experience in resolving issues concerning network connectivity, desktop operating systems, security, and other issues related with desktop applications......Read More » Microsoft Certified IT Professional (MCITP) - Database Administrator - Database administrators install or configure Microsoft SQL Server and manage or maintain databases or multidimensional databases, user accounts, database availability, recovery, and reporting. They also design or implement security or server automation and monitor and troubleshoot SQL Server activity. Database administrators are typically employed by mid-size to large organizations.......Read More » Microsoft Certified IT Professional (MCITP) - Database Developer - Database developers design and implement relational database models (logical and physical) and database storage objects. They also program servers by using user-defined functions, triggers, stored procedures, Transact-SQL, or the CLR. They retrieve or modify data using SQL queries or tune and optimize queries. Database developers are typically employed by mid-sized to large-sized organizations......Read More »

20% Website Wide Discount All this Month 

There are no reviews yet.

Share your review

Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate £1.- to Stichting Edukans.

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.