CISM Training in Lagos

Enroll in Certified Information Security Manager certification for expertise and experience in IT security and control.

Learn Audit and Risk management creation of policies, risk & incident management, IS/IT security strategy and frameworks

The Certified Information Security Manager (CISM) course helps the candidates to achieve the CISM certification. The certification is offered by the Information Systems Audit and Control Association (ISACA) to validate the expertise and knowledge of the candidates regarding the relationship between an information security program and the broader business targets. The certification also validates that the candidate has the hands-on knowledge of developing, managing and implementing an information security program foran organization.

What you'll learn

You will acquire the requisite skills to design, deploy, and manage security architecture for your organization with this CISM certification training from Makintouch Consulting. This course is aligned with ISACA best practices. Today, enterprises and government agencies increasingly expect their IT professionals to hold a CISM certification.

Requirements

  • As the case with the CISM certification exam, the candidates are required to have a minimum of five years of experience in information security management.
  • Experience in the fields of information security governance, risk management, compliance, and incident management is also preferable.

Course Outline

Information Security Governance

  • Security Strategy
  • Information Security Governance framework
  • Integrating security governance into corporate governance
  • Security Policies: standards, procedures, and guidelines
  • Business cases to support investments
  • Internal and external influences on information security strategy
  • Management and other stakeholder commitment
  • Roles and Responsibilities
  • Measuring the effectiveness of the information security strategy

Information Risk Management and Compliance

  • Information asset classification
  • Risk management, assessments, vulnerability assessments and threat analyses
  • Risk treatment options
  • Manage risk of noncompliance
  • Information security controls
  • Current and desired risk levels: Gap analysis
  • Monitoring risk

Information Security Program Development and Management

  • Alignment of IS program with information security strategy
  • Information security manager’s role and responsibilities in alignment
  • Information security frameworks
  • Information security architectures
  • Evaluating the effectiveness and efficiency of the IS program
  • Integrating the IS program with IT processes
  • Integrating the IS program into contracts and activities of third parties
  • Controls and countermeasures
  • Security Program Metrics and Monitoring

Information Security Incident Management

  • Organizational definition and severity hierarchy for security incidents
  • Incident response plan
  • Processes for timely identification
  • Testing and review
  • Investigating and documenting information security incidents
  • Integration of incident response plan, disaster recovery plan and business continuity plan

Program details

Duration

August 22nd - 26th

Venue

Hybrid: on-site or virtual

Become a Certified Information System Manager today

Kindly fill the form with your contact details and our training advisor will contact you quick to discuss about your Certified Information Systems Auditor training program.

We have trained individuals & delegates from companies you know.

and here's what some of them said about us.

The course tutor clearly had in depth knowledge and experience and made great effort to make sure that the course content was understood by everyone attending. I also really like the Labs and electronic student
Henry
Sterling Bank
The training has impacted knowledge on AWS DevOps methodologies in project management. The people-centered of the organizers is commendable. I would recommend the course to any of my colleagues.
Iyanu
CBN
×