CISM, Certified Information Security Manager CISM® Certification

The CISM (Certified Information Security Manager) course is designed for professionals who manage, design, and oversee an enterprise’s information security program. This course covers essential topics like information risk management, governance, incident management, and program development and management. Upon completion, participants will be well-equipped to handle the challenges of securing and protecting valuable information assets within their organizations.

The Course helps to prepare for the CISM Certification | Certified Information Security Manager | ISACA

Upon successful completion of this course, students will be able to:

  • Establish and maintain a framework to provide assurance that information security strategies are aligned with business objectives and consistent with applicable laws and regulations;
  • Identify and manage information security risks to achieve business objectives;
  • Create a program to implement the information security strategy;
  • Implement an information security program;
  • Oversee and direct information security activities to execute the information security program;
  • Plan, develop, and manage capabilities to detect, respond to, and recover from information security incidents.

Target audience:

The intended audience for this course is information security and IT professionals, such as network administrators and engineers, IT managers, and IT auditors, and other individuals who want to learn more about information security. Also those, who are interested in learning in-depth information about information security management, who are looking for career advancement in IT security, or who are interested in earning the CISM certification.

Prerequisites:

To ensure your success, the students taking this course should have professional experience in information security in at least one of the following areas:

  • Information security governance
  • Information risk management
  • Information security program development
  • Information security program management
  • Incident management and response

Technology needed for the course: A Windows operating system computer with permissions to install and configure applications.

Those who do not have the necessary computer can rent it by agreement with BCS Training. Please inform the training company in advance.

Course outline:

  • Information security governance
  • Information risk management
  • Information security program
  • Incident management

Study methods: You can participate in the study by joining the training through the online environment Teams. The volume of training is 40 hours incl. 20 hours of practical exercises or group work in the training environment.

Assessment method: The achievement of learning outcomes is assessed on the basis of feedback-based practical exercises or group works carried out during the training.

Completion of training: Each participant receives a certificate of attendance after the course, the official certificate is awarded only when the exam is taken and passed within one year after the course (exam registration must be done within 6 months after completing the course).

The price includes: Study materials and examination cost (must be registered 6 months after the course and passed 12 months after the course.

Õppekavarühm: 0612 Andmebaaside ja võrgu disain ning haldus.

Tähelepanu! Teie veebilehtiseja ei vasta kodulehe külastamiseks vajalikele nõuetele. Palun vahetage veebilehitsejat või seadet, millega te veebilehte sirvite.

Attention! Teie veebilehtiseja ei vasta kodulehe külastamiseks vajalikele nõuetele. Palun vahetage veebilehitsejat või seadet, millega te veebilehte sirvite.

Внимание! Teie veebilehtiseja ei vasta kodulehe külastamiseks vajalikele nõuetele. Palun vahetage veebilehitsejat või seadet, millega te veebilehte sirvite.