Ihr Warenkorb
Keine Artikel in Ihrem Warenkorb
CISM Certified Information Security Manager CISM  2018 E-learning Kurse
Certified Information Security Manager CISM 2018 E-learning Kurse
€129,00 €359,00

Woanders günstiger?

Lass uns wissen!

+31367601019 [email protected]

Certified Information Security Manager CISM 2018 E-learning Kurse

Marke: CISM
|
Klicken um zu vergrößern
€129,00 €359,00 exkl. MwSt.
€149,64 €416,44 Inkl. MwSt.
  • Kaufen Sie 2 für je €351,82 und sparen Sie 2%
  • Kaufen Sie 3 für je €348,23 und sparen Sie 3%
  • Kaufen Sie 5 für je €333,87 und sparen Sie 7%
  • Kaufen Sie 10 für je €323,10 und sparen Sie 10%
  • Kaufen Sie 25 für je €305,15 und sparen Sie 15%
  • Kaufen Sie 50 für je €280,02 und sparen Sie 22%
  • Kaufen Sie 100 für je €251,30 und sparen Sie 30%
  • Kaufen Sie 200 für je €179,50 und sparen Sie 50%
Auf Lager
|
Bestellung vor 16.00 Uhr und heute starten.
Sie haben counting... stunden
  • 1 Jahr Zugang
  • Beginnen Sie noch heute
  • Teilnahmezertifikat
Informationen

Certified Information Security Manager CISM 2018 E-learning Kurse

Order this great E-Learning Ausbildung Certified Information Security Manager CISM 2018 online course  1 year 24/7 access to rich interactive videos, voice, practice assignments, progress monitoring through reports and tests per subject to test the knowledge directly. After the course you will receive a certificate of participation..

Kursinhalt

CISM: Information Security Governance Part 1

Information Security Strategy Techniques
Information Security Relationship to Key Factors
Available InfoSec Governance Frameworks
Fundamental Concepts of Governance
Standards, Frameworks, and Best Practices
Governance Planning, Design, and Implementation
Integrating into Corporate Governance
Contributing Factors for InfoSec Development
Developing Business Cases
Strategic Budgetary Planning and Reporting
Exercise: Describe InfoSec Governance

CISM: Information Security Governance Part 2

Impact of Internal and External Influences
Commitment from Senior Leadership and Stakeholders
Senior Leadership and Stakeholder Communication
Responsibilities of the InfoSec Manager
Structures, Lines of Authority, and Escalation
Security Responsibilities of Organizational Staff
Monitoring Performance of InfoSec Responsibilities
Establishing Reporting and Communication Channels
Working with Key Information Security Metrics
Exercise: Define InfoSec Governance

CISM: Information Risk Management Part 1

The Information Asset Classification Model
Assigning Ownership of Information Assets and Risk
Evaluating Impacts of Events on Information Assets
Monitoring Internal and External Risk Factors
Recognizing Information Asset Valuation Methods
Legal, Regulatory, and Organizational Requirements
Recognizing Information Security Threat Sources
Identifying Events Needing Risk Reassessment
Information Threats, Vulnerabilities, and Exposures
Exercise: Define Information Risk Management

CISM: Information Risk Management Part 2

Risk Assessment and Analysis Methodologies
Prioritizing Risk Scenarios and Treatment
Realizing Risk Reporting Requirements
Risk Treatment and Response Methodologies
Comparing Control Baselines and Standards
Analyzing Information Security Controls and Methods
Information Security Gap Analysis Techniques
Risk Management for Business and IT Processes
Compliance Reporting Requirements and Processes
Performing Cost Benefit Analysis for Risk Assessment
Exercise: Define Information Risk Management

CISM: Information Security Program Development and Management Part 1

Aligning Security Programs with Business Functions
Acquiring and Managing Resource Requirements
Survey of Current and Emerging Security Technologies
Designing and Implementing Security Controls
Applying Information Security Controls and Resources
Security Standards, Procedures, and Guidelines
Regulations, Standards, Frameworks, and Practices
Implementing Information Security Standards
Exercise: Define Program Development and Control

CISM: Information Security Program Development and Management Part 2

Skills Training for Information Security Personne
Developing Security Awareness and Training Programs
Integrating Mandates into Organizational Processes
Contracts, Agreements and Third-party Management
Reviewing Third-party Contracts and Agreements
Implementing Operational Security Metrics
Testing the Effectiveness of Security Controls
Communicating Program Status to Key Stakeholders
Exercise: Describe Program Development & Management

CISM: Information Security Incident Management Part 1

Incident Management Concepts and Practices
Components of an Incident Response Plan
Map the BCP and DRP to the Incident Response Plan
Incident Classification and Categorization Methods
Defining Incident Containment Methods
Describing Notification and Escalation Processes
Roles and Responsibilities in Security Incidents
Incident Response Team Training, Tools and Equipment
Forensic Requirements for Handling Evidence
Exercise: Describe Security Incident Management

CISM: Information Security Incident Management Part 2

Incident Reporting Requirements and Procedures
Post-incident Review Practices and Investigations
Quantifying Damages, Costs and Business Impacts
Detecting, Logging, Analyzing and Documenting Events
Classifying Resources for Investigation of Incidents
Identifying Impact of Changes to the Environment
Techniques to Test the Incident Response Plan
Regulatory, Legal and Organization Requirements
KPIs and Metrics to Evaluate the Response Plan
Exercise: Define InfoSec s
Course Test

 

Haben Sie nicht gefunden, wonach Sie suchen?
Lassen Sie uns helfen!
Eigenschaften
Produkt
Allgemeine Eigenschaften
Studiengebühr: 1 Stunden Dauer plus Übungen (variabel)
Sprache: Englisch
Online-Zugang: 1 Jahr
Teilnahmebescheinigung: Ja, nach 70% der erfolgreichen Einsätze
Fortschrittsüberwachung: Ja
Geeignet für Handys: Ja
Preisgekröntes E-Learning: Ja
Bewertungen
Durchschnitt von 0 Bewertungen
Kein Bewertungen
Lesen oder schreiben Sie einen Kommentar
Schreiben Sie eine Bewertung!




Wir benutzen Cookies nur für interne Zwecke um den Webshop zu verbessern. Ist das in Ordnung? Ja Nein Für weitere Informationen beachten Sie bitte unsere Datenschutzerklärung. »