Maxtrain.com - [email protected] - 513-322-8888 - 866-595-6863
Today, when it comes to identifying critical issues and providing effective IS management solutions, companies are leaning on IS managers to create solutions for tomorrow’s problems. The knowledge and course content provided in the Certified Information Systems Security Manager – C)ISSM will not only cover ISACA®’s CISM exam but will provide a measurable certification that demonstrates proficiency in the IS Management Field. The Certified Information Systems Security Manager 4 day class covers the skills and knowledge to assess threat analysis and risks, Risk & incident management, Security programs and CISO roles, IS security strategy and frameworks, Audit and Risk management creation of policies, compliance and awareness, as well as DR and BCP development, deployment and maintenance.
Upon completion, Certified IS Security Manager students will have a strong foundation in Cyber Security & IS management standards with current best practices and will be prepared to competently take the C)ISSM exam.
The Certified Information Systems Security Manager exam is taken online through Mile2’s Assessment and Certification System (“MACS”), which is accessible on your mile2.com account. The exam will take approximately 2 hours and consist of 100 multiple choice questions. A minimum grade of 70% is required for certification.
Mile2 is Accredited by the NSA-CNSS, Approved on Homelands Security NICCS Framework, and is on the FBI’s Tier 1-3 Certification Training Chart.
B. Daily Format
C. Domain Structure
D. Course Structure and Logistics
A. IS Governance Overview
B. IS Strategy
C. IS Programs, Architectures, and Frameworks
D. Committees and Responsibilities
E. Auditing and Evaluating Information Systems
F. Reporting and Compliance
A. Roles and Responsibilities
B. What is Risk and Risk Management
C. Risk Assessment, Treatment
D. Risk Mitigation and Controls
F. Human Resource Risk
G. Training and Awareness
A. Information Security Strategy and Management
B. Security Program Development
C. Operations Security Technologies
D. Evaluating and Information Security System
A. Goals of Incident Management and Response
B. Developing Response and Recovery Plans
C. Plan of Action for Incident Management
D. Challenges in Incident Management
E. Post Event Reviews
F. Notification Requirements
H. Testing Response and Recovery Plans
I. BCP and DRP Training