Certified Information Security Manager Course

Unternehmensübergreifende Weiterbildung

An wen richtet sich die Weiterbildung?

  • CISM is not an entry-level certification. It is specifically developed for the information security professional who has acquired experience managing information security.
  • Individuals with three years or more of experience managing the information security function of an enterprise or performing such duties will find the CISM designation tailored to their knowledge and skills.

Erreichtes Niveau

Fortgeschritten

Dauer

3,00 Tag(e)

Horaire des cours 9h - 17h avec 1 h de pause déjeuner.

Sprache(n) der Dienstleistung

EN FR

Voraussetzungen

Submit verified evidence of a minimum of five years of information security work experience, with a minimum of three years of information security management work experience in three or more of the job practice analysis areas.

Ziele

NetCom's Certified Information Systems Manager (CISM) program will help you prepare for the CISM certification exam. The course will focus on the essential areas covered in the CISM exam.

Passing the exam and becoming a CISM ensures your success in your organization as by hiring or retaining the services of a CISM, an organization knows that it has invested in a professional who:

  • Has met the stringent requirements of a globally recognized credential
  • Demonstrates information security management knowledge and skill
  • Commits to ongoing professional development

The CISM certification program is developed specifically for experienced information security managers and those who have information security management responsibilities.

Inhalt

  • Security Governance (Day 1 - Maps to domains 1 & 2)
    • Introduction to Information Security Management
    • Process and project management systems
    • Risk Management
    • Human Resources
  • Access Control (Day 2 - Maps to Domains 3 & 4)
    • Understanding Operating Systems
    • Discretionary Access Control (DAC)
    • Mandatory Access Control (MAC)
    • Role-Based Access Control (RBAC)
    • Identity and Access Management
    • Intrusion Detection Systems (IDS)
    • Security Information and Event Management (SIEM)
  • Cryptology (Day 3 - Maps to Domains 3 & 4)
    • Introduction to Cryptography
    • Symmetric encryption
    • Asymmetric encryption
    • Hashing, Message Authentication and Digital Signatures
    • Cryto-systems (SSL, EMAIL, IPSec, SSH)
    • Key Management and Public Key Infrastructure (PKI)
    • Cryptanalysis
  • Inter-Network Technology (Day 4 - Maps to Domains 3 & 4)
    • Local Area Networks (LAN) technologies, Ethernet and WIFI, TCP/IP, Routing and Switching
    • Wide Area Network (WAN) technologies
    • Firewalls, DMZ designs and Bastion Hosts
    • Network risks
  • Business Continuity Management (Day 5 - Maps to Domain 5)
    • Natural, man made accidental and man made intentional threats
    • Business Impact Analysis
    • Criticality metrics; MTPD, RTO, RPO, MOR
    • Disaster Recovery Plans
    • Incident Response Management
    • Computer Forensics
    • Evidence issues; types of evidence, life cycle and chain of custody

Veranstaltungsart

Le repas est inclus dans le tarif.

Diese Weiterbildungen könnten Sie interessieren

EN
Tag
Blended-Learning
Informatik - Betriebssystem - Windows