Apply for VISA to Morocco
Deadline May 22

Certified Training

PREMIER DESTINATION FOR CUTTING-EDGE TECHNOLOGY CERTIFIED TRAININGS AND WORKSHOPS.

Our trainings empower individuals, organizations, and communities with the latest technological advancements and in-demand digital skills. We offer a comprehensive range of certified trainings to ensure a transformative learning experience that bridges the digital divide and drives innovation throughout the region. Join us on this exciting journey of knowledge, growth, and empowerment in the rapidly evolving world of technology.

ENQUIRE NOW

For questions about Masterclass & Certified Training
contact +971-4-3086805 or email visitGITEXAfrica@dwtc.com

 
 

Certified Information Security Manager (CISM) Prep

Date

29 May - 30 May 2024

ANTICIPATED LEARNING DURATION:

16h

Room

Black Room

CERTIFICATION ACQUIRED

ISACA

 
 

BRIEF DESCRIPTION

Designed for IT professionals with technical expertise and experience in IS/IT security and control looking to transition from team player to manager. CISM can add credibility and confidence to interactions with internal and external stakeholders, peers, and regulators. This certification indicates expertise in information security governance, program development and management, incident management and risk management.

Content in this course is:

  • Aligned with the CISM job practice.
  • Adapted from the CISM Review Manual 16th Edition.
  • Reviewed by subject matter experts that hold the CISM certification.

This fast-paced and focused course features an enhanced facilitator guide, additional participant resources, knowledge check questions from the CISM Questions, Answers and Explanations (QAE) database along with optional scenario-based activities and enrichment materials (articles, podcasts and whitepapers) selected from the ISACA website to provide learners with an opportunity to go deeper into specific areas related to the course content.

Please note: This course is optimized for virtual delivery. Slide animations and transitions are kept to a minimum to ensure the best experience for instructors and participants.

 
 

LEARNING OBJECTIVES

After completing this course, participants should be able to:

  • Explain the relationship between executive leadership, enterprise governance and information security governance.
  • Outline the components used to build an information security strategy.
  • Explain how the risk assessment process influences the information security strategy.
  • Articulate the process and requirements used to develop an effective information risk response strategy.
  • Describe the components of an effective information security program.
  • Explain the process to build and maintain an enterprise information security program.
  • Outline techniques used to assess the enterprise’s ability and readiness to manage an information security incident.
  • Outline methods to measure and improve response and recovery capabilities.
 
 

AGENDA

Module 1

Information Security Governance
  • Enterprise Governance Overview
  • Organizational Culture, Structures, Roles and Responsibilities
  • Legal, Regulatory and Contractual Requirements
  • Information Security Strategy
  • Information Governance Frameworks and Standards
  • Strategic Planning

Module 2

Information Security Risk Management
  • Risk and Threat Landscape
  • Vulnerability and Control Deficiency Analysis
  • Risk Assessment, Evaluation and Analysis
  • Information Risk Response
  • Risk Monitoring, Reporting and Communication

Module 3

Information Security Program Development and Management
  • IS Program Development and Resources
  • Defining an IS Program Road Map
  • IS Program Metrics
  • IS Program Management
  • Integrating the Security Program with IT Operations
  • Program Communications, Reporting and Performance Management

Module 4

Information Security Incident Management
  • Incident Management and Incident Response Overview
  • Incident Management and Response Plans
  • Incident Management Operations, Tools and Technologies
  • Incident Investigation, Evaluation, Containment and Communication
  • Incident Eradication, Recovery and Review
  • Business Impact and Continuity
  • Disaster Recovery Planning
  • Testing and Evaluation
Optional Sample Exam
 
 

TRAINER

Katlego Masemola

Trainer & South Africa Secretary

Information Systems Audit and Control Association (ISACA)

ENQUIRE NOW

For questions about Masterclass & Certified Training
contact +971-4-3086805 or email visitGITEXAfrica@dwtc.com