Data Security Training
Our Data security workshops and courses help your organisation to protect digital data from the malicious actions of unauthorized users, such as a cyberattack or a data breach.
Please select the course that you’re interested in
Please select the course that you are interested in
CISM Boot Camp (4 days)
Course Overview
- Information Security Governance
- Information Risk Management
- Information Security Program Development and Management
- Information Security Incident Management
- Practice Tests & Quizzes
- Practice Examination
Audience:
The CISM Review Course is an intensive, four-day review program to prepare individuals who are planning to sit for the Certified Information Security Manager (CISM) exam.
The course focuses on the key points covered in the CISM Review Manual 15th Edition and includes class lectures, group discussions/activities, exam practice and answer debrief.
This training course equips professionals with the knowledge and skills for proficiency in information security management. It also helps in passing the certification examination successfully.
Prerequisite:
Basic understanding of IT security or IT security management is useful.
Duration:
This is a four-day CISM Boot Camp. The course starts at 09:30 and runs until 16:30.
Alternate timings can be arranged upon request. The course can be held on a date that suits you.
Location:
Our CISM Boot Camp will be delivered Online Remotely using online training platforms. It can also be run at our training venue near Liverpool Street (London) or any preferred location in the UK or Europe.
CISM Boot Camp Outline
DOMAIN 1: INFORMATION SECURITY GOVERNANCEInformation Security Governance Overview Effective Information Security Governance Roles and Responsibilities Risk Management Roles and Responsibilities Governance of Third-party Relationships Information Security Governance Metrics Information Security Strategy Overview Information Security Strategy Objectives Determining the Current State of Security Information Security Strategy Development Strategy Resources Strategy Constraints Action Plan to Implement Strategy Information Security Program Objectives DOMAIN 2: INFORMATION RISK MANAGEMENTRisk Management Overview Risk Management Strategy Effective Information Risk Management Information Risk Management Concepts Implementing Risk Management Risk Assessment and Analysis Methodologies Risk Assessment Information Asset Classification Operational Risk Management Third-party Service Providers Risk Management Integration With Life Cycle Processes Security Control Baselines Risk Monitoring and Communication | DOMAIN 3: INFORMATION SECURITY PROGRAM DEVELOPMENT AND MANAGEMENTInformation Security Program Management Overview Information Security Program Objectives Information Security Program Concepts Scope and Charter of an Information Security Program The Information Security Management Framework Information Security Framework Components Defining an Information Security Program Road Map Information Security Infrastructure and Architecture Architecture Implementation Security Program Management and Administrative Activities Security Program Services and Operational Activities Controls and Counter-measures Security Program Metrics and Monitoring Common Information Security Program Challenges DOMAIN 4: INFORMATION SECURITY INCIDENT MANAGEMENTIncident Management Overview Incident Response Procedures Incident Management Organization Incident Management Resources Incident Management Objectives Incident Management Metrics and Indicators Defining Incident Management Procedures Current State of Incident Response Capability Developing an Incident Response Plan Business Continuity and Disaster Recovery Procedures Testing Incident Response and Business Continuity/Disaster Recovery Plans Executing Response and Recovery Plans Post-incident Activities and Investigation PRACTICE TESTS & QUIZZESPRACTICE EXAMINATION |
One to One
(which includes a tailor-made training programme for the individual where they can mix and match the topics from various levels to get the most cost-effective training
Group for up to 8 learners
What Our Clients Say
Extras
This is a sample of some of the Short training videos. Please note that you can get access to many more, once you have done a course with us and are registered as one of our delegates.