Maxtrain.com - info@maxtrain.com - 513-322-8888 - 866-595-6863
Certified Information System Security Manager On-Demand
Description
Course Introduction:
Welcome to the Certified Information Systems Security Manager (CISSM) On-Demand course, offering the flexibility to learn at your own pace.
Whether you’re an IT Professional, Security Manager, or someone eager to expand their knowledge of information systems security management, this course is designed for you.
Course Objectives:
In the CISSM On-Demand course, you will:
- Prepare for and pass the Certified Information Systems Security Manager (CISSM) exam.
- Acquire knowledge of information systems security management principles.
- Learn to plan, create, and manage effective security policies and procedures.
- Gain a deep understanding of risk management and incident response.
- Develop expertise in security governance and compliance.
- Explore various aspects of information security, from risk assessment to security program development.
- Benefit from hands-on labs and real-world scenarios.
Course Highlights:
- Accredited by leading cybersecurity organizations.
- Approved by industry authorities.
- Self-paced learning with 1-year access.
- Accessible through our Learning Management System.
- Comprehensive package includes online course videos, an e-book, an e-Lab guide, exam prep, CISSM exam, and practical exercises.
- The CISSM exam comprises 100 multiple-choice questions and takes approximately 2 hours.
- A minimum passing grade of 70% is required for certification.
Course Outline:
Module 1: Introduction to Information Systems Security Management
- Understanding information systems security management.
- Key principles and concepts.
- Building a strong security foundation.
Module 2: Security Policies and Procedures
- Creating effective security policies.
- Developing security procedures.
- Enforcing security controls.
Module 3: Risk Management and Incident Response
- Identifying and assessing risks.
- Incident response planning and execution.
- Mitigating security incidents.
Module 4: Security Governance and Compliance
- Governance models and frameworks.
- Compliance requirements and audits.
- Ensuring security alignment with business goals.
Module 5: Information Security Assessment and Program Development
- Conducting security assessments.
- Developing and managing a security program.
- Measuring and improving security effectiveness.
Outline
Module 1 – Introduction
A. Agenda
B. Daily Format
C. Domain Structure
D. Course Structure and Logistics
Module 2 – Architectural Concepts and Design Requirements
A. IS Governance Overview
B. IS Strategy
C. IS Programs, Architectures, and Frameworks
D. Committees and Responsibilities
E. Auditing and Evaluating Information Systems
F. Reporting and Compliance
G. Ethics
Module 3 – Information Risk Management
A. Roles and Responsibilities
B. What is Risk and Risk Management
C. Risk Assessment, Treatment
D. Risk Mitigation and Controls
E. Auditing
F. Human Resource Risk
G. Training and Awareness
Module 4 – Information Security Program Development and Management
A. Information Security Strategy and Management
B. Security Program Development
C. Operations Security Technologies
D. Evaluating and Information Security System
Module 5 – Information Security Incident Management
A. Goals of Incident Management and Response
B. Developing Response and Recovery Plans
C. Plan of Action for Incident Management
D. Challenges in Incident Management
E. Post Event Reviews
F. Notification Requirements
G. Insurance
H. Testing Response and Recovery Plans
I. BCP and DRP Training
PreRequisites
- A minimum of 1 year in Information Systems
- Mile2’s C)SP
Audience
- Penetration Testers
- Microsoft Administrators
- Security Administrators
- Active Directory Administrators
- Anyone looking to learn more about security
$1095.00
|
|