The training prepares for CISM certification (Certified Information Security Manager), recognized internationally and issued by ISACA. This course will provide you with the knowledge and understanding of the principals needed to be an effective member of an information security team with security responsibilities. It also prepares individuals who are considering making security of the information security. information or any related function.
In particular, the objectives of the training are:
• Experience in information system security management (at least 5 years of experience or possible waivers for up to 2 years)
• Code : CISM
• Duration : 3 Days
• schedule : 8h30 - 17h30
• place : training center, Center Urbain Nord,Tunis
• Security professionals
• Information Security Officers
• Security Consultants
• Anyone seeking a full understanding of key IT risks and controls
• Course materials
• 40% demonstration
• 40% of theory
• 20% practical exercises
• Develop an information security strategy to align it with business and leadership strategy
• Obtaining senior management commitment and support for IT security throughout the enterprise
• Define roles and responsibilities in security governancede Information
• Establish information and communication channels for information security governance activities
• Develop a systematic and analytical approach, as well as the ongoing process of risk management
• Understand and implement risk identification and analysis.
• Define risk mitigation strategies
• Report appropriately on the evolution of risk management
• Create and maintain plans to implement a carefully crafted framework for information security governance
• Develop information security baselines for organizational needs, as well as international standards
• Develop information security baselines to organizational needs, Ensure that security is effectively integrated into established change management organizations processes
• Effectively integrate information security policies, procedures, guidelines and accountability into the organization's culture
• Manage contract security risks and risk transfer
• Understand the information security compliance requirements of the Sarbanes-Oxley Act
• Properly align IT planning with strategic planningorganizational
• How to position information security management within the organization
• Controls the risks to the security related to IT financing
• Manage the risk associated with social engineering, threats, physical infrastructure, malicious code and software vulnerabilities
• Integrate Information Security into Continuous Trade, Disaster Recovery and Incident Response
• Develop and implement processes to identify, detect and analyze events related to process security
Do not hesitate to contact our experts for any additional information, study and free calculation of an audit service.