Search

Seminars

Certified Information Security Manager (CISM)



Introduction:


Delegates of the CISM training will have the skills and knowledge of the core competencies required of a world class information security professional whether planning to sit for the examination or not, the CISM training courses Delegates will have gained this in a structured learning environment. They will have gained the knowledge required for, and have thoroughly prepared for the certification examination in systematic way. Enhance your career with our Certified Information Security Manager (CISM) training course. With recent independent studies consistently ranking CISM as one of the highest paying and sought after IT certifications, it's a great course to help with your professional development. Plus it provides executive management with assurance that you have the required experience to provide effective security management and consulting services. This course is based on the ISACA framework, which has five domain areas that relate to the role of a CISM. You will learn about each of these domains in detail, giving you the knowledge and skills to develop and manage a resilient information security program. This course will prepare you with the knowledge and skills to complete the ISACA CISM multiple choice exam, which will get you Certified Information Security Manager status. The course will feature:

 

  • Information security governance
  • Risk management
  • Information security program management
  • Information security management
  • Response management

Course Objectives:


By the end of this course, delegates will be able to:

 

  • Understand how to establish and maintain the necessary frameworks that will ensure information security strategies are aligned with business objectives, and consistent with applicable laws and regulations
  • Confidently identify and manage information security risks to achieve business objectives
  • Be familiar with industry accepted terminology and practices used by information security professionals
  • Gain the necessary knowledge and skills for the ISACA CISM exam
  • Demonstrate your understanding of the relationship between an information security program and broader business goals and objectives
  • Distinguish yourself as having not only information security expertise, but also knowledge and experience in the development and management of an information security program
  • Puts you in an elite peer network
  • Identify critical issues and customize company-specific practices to support the governance of information and related technologies
  • Bring credibility to the enterprise for which they are employed
  • Take a comprehensive view of information systems security management and their relationship to organizational success
  • Demonstrate to enterprise customers their commitment to compliance, security and integrity; ultimately contributing to the attraction and retention of customers
  • Ensure that there is improved alignment between the organization's information security program and its broader goals and objectives
  • Provide the enterprise with a certification for Information security management that is recognized by multinational clients and enterprises, lending credibility to the enterprise

Who Should Attend?


IT Engineers, IT Professionals, IT Directors, Engineers, IT Project Managers, IT Auditors, IT Compliance Managers, IT Coordinators, IT Support Managers, IT Officers, IT Support Specialists, IT System Administration, Technical Support Professionals, Chief Information Officers, Chief Risk Officers, Information Assurance Officers, Program Managers, Network Systems Analysts, Government Program Managers, R&D Project Managers, Software and System Developers, Chief Security Officers, Security Specialists, Chief Information Security Officers, Directors of Security, Security Architects, Security Operation Center Managers, Security Consultants, Security Managers, Security Auditors, Security Directors, Systems Administrators, Incident Response Analysts, Business Owners, Security Analysts, Security Systems Engineer, Network Architect, Operations Managers, Risk Management Professionals, Network Administration Professionals, Application Developers, Application Support Analysts, Application Engineers, Associate Developers, Technology Officers, Information Officers, Help Desk Specialist, Help Desk Technician, Database Administrators, Network Architects, Network Engineers, Network System Administrators, System Analysts, System Architects, System Designers, Information Security Managers or those with management responsibilities, Information Security Staff and other information security assurance providers who require an in-depth understanding of information security management, CISOs, CIOs, CSOs, Privacy Officers, Risk Managers, Security Auditors and compliance Personnel, BCP / DR Personnel, Executive and Operational Managers responsible for assurance functions

Course Outline:


Information Security Governance

  • Developing information security strategy to align with business strategy and direction
  • Obtaining senior management commitment and support for information security across the entire enterprise
  • Defining information security governance roles and responsibilities
  • Establishing reporting and communication channels regarding information security governance activities

 

Risk Management

  • Developing a systematic, analytical, and continuous risk management process
  • Understanding and implementing risk identification, analysis, and mitigation activities
  • Defining and prioritizing risk mitigation strategies
  • Appropriately reporting changes in risk to the correct levels of management on a periodic and event-driven basis

 

Information Security Program Management

  • Creating and maintaining plans for implementing a carefully designed information security governance framework
  • Developing information security baselines from organizational needs, as well as international standards
  • Developing guidelines and procedures for integrating security risk management into business processes
  • Developing procedures and guidelines for the IT infrastructure that comply with senior-level information security policies
  • Ensuring security is effectively incorporated into the organizations established change management processes
  • Effectively integrating information security policies, guidelines, procedures, and accountability into the organization's culture

 

Legal Issues

  • Managing security risk from contracts; transfer risk with contracts
  • Understanding information security compliance issues resulting from Sarbanes-Oxley

 

Information Technology Deployment Risks

  • Properly aligning IT strategic planning with organizational strategic planning
  • Controlling risk within software development or acquisition projects

 

IT Management Risks

  • How to position information security management within the organization
  • Controlling IT security risk relating to IT funding

 

IT Networks and Telecommunications Risks

  • Managing risk associated with social engineering, physical infrastructure threats, malicious code, and software vulnerabilities

 

Integrating Information Security into Business Continuity, Disaster Recovery, and Incident Response

  • Developing and implementing processes for identifying, detecting, and analyzing security-related events, procedures
  • Organizing, training, and properly equipping response teams

COURSE LOCATIONS

Code From To City Fee
IT52 03 Feb 2020 07 Feb 2020 Istanbul US$ 4500 Book
IT52 26 Apr 2020 30 Apr 2020 Alexandria US$ 3900 Book
IT52 08 Jun 2020 12 Jun 2020 London US$ 5000 Book
IT52 17 Aug 2020 21 Aug 2020 Madrid US$ 5500 Book
IT52 05 Oct 2020 09 Oct 2020 Kuala Lumpur US$ 4500 Book
IT52 27 Dec 2020 31 Dec 2020 Dubai US$ 4200 Book


DUBAI OFFICE

Ittihad Deira Building,
Al Ittihad Rd, Deira
Dubai,
UAE

info@petrogas-training.com

USA OFFICE

642 E14 Street,
10009-13 Manhattan,
New York (NY)
USA

info@petrogas-training.com

EGYPT OFFICE

52 General Kamal Hejab Street,
Suez Bridge,
Cairo,
Egypt

info@petrogas-training.com
 

COURSE CERTIFICATE

Certificate of Completion will be provided to the candidate(s) who successfully attend and complete the course. Training hours attendance percentage of 75% is required.


TRAINING HOURS

Standard course hours: 8:30 A.M. to 3:30 P.M. Informal discussions: 4:30 P.M. to 5:30 P.M.


TRAINING METHODOLOGY

We use a blend of interactive and hands-on methods, active participation, a variety of instructional techniques, dynamic presentations, individual and group exercises, in depth discussion, DVD’s, role-plays, case studies, examples. All of the information, competencies, knowledge and skills acquired within our training programs, are 100% transferrable to the participants’ workplace.


ASSESSMENT & EVALUATION

Pre-Test and Post-Test Assessment are applied on 5-day and 10-day programs. Also, post course evaluation and candidate’s evaluation are applied to add another level of quality measurement. Candidates’ feedback is highly appreciated to elevate the training service quality.


ORGANIZATIONAL IMPACT

A- Have staff trained in the latest training and development approaches

B- Support nationalization and talent management initiatives

C- Have properly trained and informed people who will be able to add value

D- Gain relevant technical knowledge, skills and competencies


PERSONAL IMPACT

A- Develop job related skills

B- Develop personal skills in subject matter

C- Have a record of your growth and learning results

D- Bring proof of your progress back to your organization

F- Become competent, effective and productive

G- Be more able to make sound decisions

H- Be more effective in day to day work by mastering job-related processes

I- Create and develop competency to perform job well


FREQUENT NOMINATIONS SCHEME

A- 10% discount after 05 candidates’ registration.

B- 15% discount after 10 candidates’ registration.    

C- 20% discount after 20 candidates’ registration.

D- 25% discount after 25 candidates’ registration.

E- 30% discount after 30 candidates’ registration

F- Higher discount rates will be offered based on work volume with different clients.  


SEVERAL NOMINATIONS ON THE SAME COURSE SCHEME

A- One extra free seat is offered on 4 candidates on the same course and dates.

B- Two extra free seats are offered on 6 candidates on the same course and dates.

C- Three extra free seats are offered on 8 candidates on the same course and dates.

D- Four extra free seats are offered on 10 candidates on the same course and dates.

E- Five extra free seats are offered on 12 candidates on the same course and dates.


REGISTRATION POLICY

Nominations to our public courses are to be processed by the client’s Training and/or HR departments. A refund will be issued back to the client in the event of course cancellation or seat unavailability. A confirmation will be issued to the relevant department official(s). 


CANCELLATION POLICY

If a confirmed registration is cancelled less than 5 working days prior to the course start date, a substitute participant may be nominated to attend the same course or a 20% cancellation charge is applied. In case of a no-show, a 100% fee will be charged.


PAYMENT POLICY

Payment is due upon receiving the course confirmation, invoice and/or proforma invoice. However; the fee due can be wire transferred to our bank account directly after course completion. Our bank details are illustrated on the confirmation, invoice and proforma invoice, as well. The above documents can be communicated electronically, i.e., in a soft copy or/and in hard copy based on customer’s request.


COPYRIGHT

© 2017. Material published by PETROGAS shown here is copyrighted. © 2017. All rights reserved. Any unauthorized copying, distribution, use, dissemination, downloading, storing in any medium, transmission, reproduction or reliance in whole or any part of this course outline is prohibited and will constitute an infringement of copyright.