Certified Information Security Manager Course

Formation inter-entreprise

À qui s'adresse la formation?

  • CISM is not an entry-level certification. It is specifically developed for the information security professional who has acquired experience managing information security.
  • Individuals with three years or more of experience managing the information security function of an enterprise or performing such duties will find the CISM designation tailored to their knowledge and skills.

Niveau atteint

Avancé

Durée

3,00 jour(s)

Horaire des cours 9h - 17h avec 1 h de pause déjeuner.

Langues(s) de prestation

EN FR

Prochaine session

Prérequis

Submit verified evidence of a minimum of five years of information security work experience, with a minimum of three years of information security management work experience in three or more of the job practice analysis areas.

Objectifs

NetCom's Certified Information Systems Manager (CISM) program will help you prepare for the CISM certification exam. The course will focus on the essential areas covered in the CISM exam.

Passing the exam and becoming a CISM ensures your success in your organization as by hiring or retaining the services of a CISM, an organization knows that it has invested in a professional who:

  • Has met the stringent requirements of a globally recognized credential
  • Demonstrates information security management knowledge and skill
  • Commits to ongoing professional development

The CISM certification program is developed specifically for experienced information security managers and those who have information security management responsibilities.

Contenu

  • Security Governance (Day 1 - Maps to domains 1 & 2)
    • Introduction to Information Security Management
    • Process and project management systems
    • Risk Management
    • Human Resources
  • Access Control (Day 2 - Maps to Domains 3 & 4)
    • Understanding Operating Systems
    • Discretionary Access Control (DAC)
    • Mandatory Access Control (MAC)
    • Role-Based Access Control (RBAC)
    • Identity and Access Management
    • Intrusion Detection Systems (IDS)
    • Security Information and Event Management (SIEM)
  • Cryptology (Day 3 - Maps to Domains 3 & 4)
    • Introduction to Cryptography
    • Symmetric encryption
    • Asymmetric encryption
    • Hashing, Message Authentication and Digital Signatures
    • Cryto-systems (SSL, EMAIL, IPSec, SSH)
    • Key Management and Public Key Infrastructure (PKI)
    • Cryptanalysis
  • Inter-Network Technology (Day 4 - Maps to Domains 3 & 4)
    • Local Area Networks (LAN) technologies, Ethernet and WIFI, TCP/IP, Routing and Switching
    • Wide Area Network (WAN) technologies
    • Firewalls, DMZ designs and Bastion Hosts
    • Network risks
  • Business Continuity Management (Day 5 - Maps to Domain 5)
    • Natural, man made accidental and man made intentional threats
    • Business Impact Analysis
    • Criticality metrics; MTPD, RTO, RPO, MOR
    • Disaster Recovery Plans
    • Incident Response Management
    • Computer Forensics
    • Evidence issues; types of evidence, life cycle and chain of custody

Mode d'organisation

Le repas est inclus dans le tarif.

Ces formations pourraient vous intéresser

EN
Journée
Informatique et systèmes d'information - Gestion parc informatique - Matériel informatique
EN
Journée
Sur demande
Informatique et systèmes d'information - Informatisation - Conduite projet informatique - Méthode agile