Eccentrix - Katalog obuka - Informaciona bezbednost - Certified Information Security Manager (CISM) (CS8529)

Certified Information Security Manager (CISM) (CS8529)

CISM (Certified Information Security Manager) kurs obučava profesionalce za upravljanje, razvoj i nadzor enterprise-level programa informacione bezbednosti, uz osiguravanje usklađenosti sa poslovnim ciljevima. Pokriva četiri ključna domena: upravljanje informacionom bezbednošću, upravljanje rizicima, razvoj i upravljanje bezbednosnim programima, i odgovor na incidente. Ova sertifikacija je idealna za IT menadžere, konsultante i menadžere za usklađenost koji žele da prodube svoje veštine u upravljanju bezbednošću.

Povezane obuke

Ekskluzivnosti

  • Video materijali: 365 dana neograničenog pristupa edukativnom sadržaju
  • Nastavni materijali: Dostupni u digitalnom formatu, sa mogućnošću preuzimanja i pristupa tokom i nakon završetka programa
  • Potvrda o završenom kursu: Polaznici dobijaju prestižni digitalni bedž i zvanični sertifikat o stručnom usavršavanju
  • Garantovana organizacija obuke: Maksimalan period čekanja od 4 do 6 nedelja nakon registracije učesnika, sa garantovanim datumom održavanja

Privatna obuka

Rezervišite ovu obuku isključivo za vašu organizaciju sa cenom prilagođenom broju učesnika. Naše cene za privatne obuke se formiraju u zavisnosti od veličine vaše grupe, uz minimalan broj polaznika potreban da se obuka održi.

  • Degresivno cenovni model u zavisnosti od broja učesnika
  • Obuka održana u okruženju namenjenom vašem timu
  • Fleksibilnost u planiranju prema vašoj dostupnosti
  • Pojačana interakcija među kolegama iz iste organizacije
  • Iste ekskluzivne pogodnosti kao naše otvorene obuke

Kako dobiti ponudu?

Koristite formular za ponudu navodeći broj učesnika. Brzo ćemo vam poslati kompletnu ponudu sa cenom, dostupnim datumima i detaljima svih pogodnosti uključenih u vašu privatnu obuku.

Plan obuke

  • Importance of Information Security Governance
  • Desired Outcomes of Good Information Security
  • Governance
  • Responsibility for Information Security Governance
  • Steps for Establishing Governance
  • Governance Framework
  • Top-Down and Bottom-Up Approaches
  • Key Aspects from the CISM Exam Perspective
  • A Note on the Practice Questions
  • Organizational Culture
  • Acceptable Usage Policy
  • Ethics Training
  • Legal, Regulatory, and Contractual Requirements
  • Key Aspects from the CISM Exam Perspective
  • Retention of Business Records
  • Electronic Discovery
  • Key Aspects from the CISM Exam Perspective
  • Organizational Structure
  • Board of Directors
  • Security Steering Committee
  • Reporting of Security Functions
  • Centralized vis-à-vis Decentralized Security Functioning
  • Information Security Roles and Responsibilities
  • RACI Chart
  • Board of Directors
  • Senior Management
  • Business Process Owners
  • Steering Committee
  • Chief Information Security Officer
  • Chief Operating Officer
  • Data Custodian
  • Communication Channel
  • Indicators of a Security Culture
  • Key Aspects from the CISM Exam Perspective
  • Maturity Model
  • Key Aspects from the CISM Exam Perspective
  • Governance of Third-Party Relationships
  • Information Security Governance Metrics
  • The Objective of Metrics
  • Technical Metrics vis-à-vis Governance-Level Metrics
  • Characteristics of Effective Metrics
  • Information Security Strategy and Plan
  • Information Security Policies
  • Key Aspects from the CISM Exam Perspective
  • Information Governance Frameworks and Standards
  • The Objective of Information Security Governance
  • Information Security/Cybersecurity Management Frameworks
  • The IT Balanced Scorecard
  • Information Security Programs
  • Key Aspects from the CISM Exam Perspective
  • Enterprise Information Security Architecture
  • Challenges in Designing the Security Architecture
  • Benefits of Security Architecture
  • Key Aspects from the CISM Exam Perspective
  • Awareness and Education
  • Increasing the Effectiveness of Security Training
  • Key Aspects from the CISM Exam Perspective
  • Governance, Risk Management, and Compliance
  • Key Aspects from the CISM Exam Perspective
  • Senior Management Commitment
  • Information Security Investment
  • Strategic Alignment
  • Key Aspects from the CISM Exam Perspective
  • Business Case and Feasibility Study
  • Understanding Risk
  • Key Aspects from the CISM Exam Perspective
  • Differentiating Risk Identification, Risk Analysis, and Risk
  • Evaluation
  • Risk Management
  • Risk Assessment
  • Risk Analysis
  • Risk Evaluation
  • Differentiating Risk Capacity, Risk Appetite, and Risk Tolerance
  • Key Aspects from the CISM Exam Perspective
  • Inherent Risk and Residual Risk
  • Inherent Risk
  • Residual Risk
  • Differentiating between Inherent Risk and Residual Risk
  • Key Aspects from the CISM Exam Perspective
  • Phases of Risk Management
  • Phases of Risk Management
  • The Outcome of a Risk Management Program
  • Key Aspects from the CISM Exam Perspective
  • Risk Awareness
  • Tailored Awareness Programs
  • Training Effectiveness
  • Awareness Training for Senior Management
  • Key Aspects from the CISM Exam Perspective
  • Risk Assessment
  • Phases of Risk Assessment
  • Key Aspects from the CISM Exam Perspective
  • Risk Identification
  • Risk Identification Process
  • Asset Identification
  • Asset Valuation
  • Aggregated and Cascading Risk
  • Key Aspects from the CISM Exam Perspective
  • Risk Analysis
  • Quantitative Risk Analysis
  • Qualitative Risk Analysis
  • Semi-Quantitative Risk Analysis
  • The Best Method for Risk Analysis
  • Annual Loss Expectancy
  • Value at Risk (VaR)
  • OCTAVE
  • Other Risk Analysis Methods
  • Key Aspects from the CISM Exam Perspective
  • Risk Evaluation
  • Risk Ranking
  • Risk Register
  • Emerging Risk and the Threat Landscape
  • Emerging Threats
  • Advanced Persistent Threats
  • Vulnerability and Control Deficiency
  • Key Aspects from the CISM Exam Perspective
  • Security Baselines
  • Risk Communication
  • Risk Treatment/Risk Response Options
  • Risk Mitigation
  • Risk Sharing/Transferring
  • Risk Avoidance
  • Risk Acceptance
  • Key Aspects from the CISM Exam Perspective
  • Risk Ownership and Accountability
  • Key Aspects from the CISM Exam Perspective
  • Risk Monitoring and Communication
  • Risk Reporting
  • Key Risk Indicators
  • Reporting Significant Changes in Risk
  • Key Aspects from the CISM Exam Perspective
  • Implementing Risk Management
  • Risk Management Process
  • Integrating Risk Management into Business Processes
  • Prioritization of Risk Response
  • Defining a Risk Management Framework
  • Defining the External and Internal Environment
  • Determining the Risk Management Context
  • Gap Analysis
  • Cost-Benefit Analysis
  • Other Kinds of Organizational Support
  • Key Aspects from the CISM Exam Perspective
  • Change Management
  • Objectives of Change Management
  • Approval from the System Owner
  • Regression Testing
  • Involvement of the Security Team
  • Preventive Controls
  • Key Aspects from the CISM Exam Perspective
  • Patch Management
  • Key Aspects from the CISM Exam Perspective
  • Operational Risk Management
  • Recovery Time Objective
  • Recovery Point Objective
  • Difference between RTO and RPO
  • Service Delivery Objective
  • Maximum Tolerable Outage
  • Allowable Interruption Window
  • Risk Management Integration with Life Cycle
  • System Development Life Cycle
  • Information Security Program Overview
  • Ideal Outcomes of an Information Security Program
  • The Starting Point of a Security Program
  • Information Security Charter
  • Support from Senior Management
  • Defense in Depth
  • Key Aspects from the CISM Exam Perspective
  • Information Security Program Resources
  • Information Asset Identification and Classification
  • Benefits of Classification
  • Understanding the Steps Involved in Classification
  • Success Factors for the Effective Classification of Assets
  • Criticality, Sensitivity, and Impact
  • Assessment
  • Business Dependency Assessment
  • Risk Analysis
  • Business Interruptions
  • Key Aspects from the CISM Exam Perspective
  • Information Asset Valuation
  • Determining the Criticality of Assets
  • Key Aspects from the CISM Exam Perspective
  • Industry Standards and Frameworks for Information
  • Security
  • Framework – Success Factors
  • Some Industry-Recognized Frameworks
  • Key Aspects from the CISM Exam Perspective
  • Information Security Policies, Procedures, and Guidelines
  • Reviewing and Updating Documents
  • Key Aspects from the CISM Exam Perspective
  • Defining an Information Security Program Roadmap
  • Gap Analysis
  • The Value of a Security Program
  • Integration of the Security Program with Other Departments
  • Key Aspects from the CISM Exam Perspective
  • Information Security Program Metrics
  • Objective of Metrics
  • Monitoring
  • Attributes of Effective Metrics
  • Information Security Objectives and Metrics
  • Useful Metrics for Management
  • Information Security Control Design and Selection
  • Countermeasures
  • General Controls and Application-Level Controls
  • Control Categories
  • Failure Modes – Fail Closed or Fail Open
  • Continuous Monitoring
  • Key Aspects from the CISM Exam Perspective
  • Security Baseline Controls
  • Developing a Security Baseline
  • Key Aspects from the CISM Exam Perspective
  • Information Security Awareness and Training
  • Key Aspects from the CISM Exam Perspective
  • Management of External Services and Relationships
  • Evaluation Criteria for Outsourcing
  • Steps for Outsourcing
  • Outsourcing – Risk Reduction Options
  • Provisions for Outsourcing Contracts
  • The Security Manager’s Role in Outsourcing
  • Service-Level Agreements
  • Right-to-Audit Clause
  • Impact of Privacy Laws on Outsourcing
  • Subcontracting/Fourth Party
  • Compliance Responsibility
  • Key Aspects from the CISM Exam Perspective
    Documentation
  • Information Security Program Objectives
  • Key Aspects from the CISM Exam Perspective
  • Security Budget
  • Key Aspects from the CISM Exam Perspective
  • Security Program Management and Administrative Activities
  • Information Security Team
  • Acceptable Usage Policy
  • Documentation
  • Project Management
  • Program Budgeting
  • Plan – Do – Check – Act
  • Security Operations
  • Key Aspects from the CISM Exam Perspective
  • Privacy Laws
  • Cloud Computing
  • Cloud Computing – Deployment Models
  • Types of Cloud Services
  • Cloud Computing – the Security Manager’s Role
  • Information Security Architecture
  • Key Aspects from the CISM Exam Perspective
  • Architecture Implementation
  • Key Aspects from the CISM Exam Perspective
  • Access Control
  • Mandatory Access Control
  • Discretionary Access Control
  • Role-Based Access Control
  • Degaussing (Demagnetizing)
  • Key Aspects from the CISM Exam Perspective
  • Virtual Private Networks
  • VPNs – Technical Aspects
  • Advantages of a VPN
  • VPN Security Risks
  • Virtual Desktop Environments
  • Key Aspects from the CISM Exam Perspective
  • Biometrics
  • Biometrics – Accuracy Measure
  • Biometric Sensitivity Tuning
  • Control over the Biometric Process
  • Types of Biometric Attacks
  • Factors of Authentication
  • Password Management
  • Key Aspects from the CISM Exam Perspective
  • Wireless Networks
  • Encryption
  • Enabling MAC Filtering
  • Disabling a Service Set Identifier
  • Disabling Dynamic Host Configuration Protocol
  • Common Attack Methods and Techniques for Wireless Networks
  • Key Aspects from the CISM Exam Perspective
  • Different Attack Methods for Information Security
  • Firewall Types and Implementations
  • Types of Firewalls
  • Types of Firewall Implementation
  • Placement of Firewalls
  • Source Routing
  • Firewall Types and Their Corresponding OSI Layers
  • Key Aspects from the CISM Exam Perspective
  • Intrusion Detection Systems and Intrusion Prevention Systems
  • Intrusion Detection Systems
  • Intrusion Prevention Systems
  • Difference between IDSs and IPSs
  • Honeypots and Honeynets
  • Key Aspects from the CISM Exam Perspective
  • Digital Signatures
  • Steps for Creating a Digital Signature
  • What is a Hash or a Message Digest?
  • Key Aspects from the CISM Exam Perspective
  • Public Key Infrastructure
  • PKI Terminology
  • Processes Involved in PKI
  • CA versus RA
  • Single Point of Failure
  • Functions of an RA
  • Key Aspects from the CISM Exam Perspective
  • Cryptography
  • Symmetric Encryption vis-à-vis Asymmetric Encryption
  • Encryption Keys
  • The Use of Keys for Different Objectives
  • Key Aspects from the CISM Exam Perspective
  • Penetration Testing
  • Aspects to be Covered within the Scope of Penetration Testing
  • Types of Penetration Tests
  • White Box Testing and Black Box Testing
  • Risks Associated with Penetration Testing
  • Incident Management and Incident Response Overview
  • The Relationship between Incident Management and Incident
    Response
  • The Objectives of Incident Management
  • Phases of the Incident Management Life Cycle
  • Incident Management, Business Continuity, and Disaster
    Recovery
  • Incident Management and the Service Delivery Objective
  • Maximum Tolerable Outage (MTO) and Allowable Interruption
    Window (AIW)
  • Key Aspects from the CISM Exam Perspective
  • Incident Management and Incident Response Plans
  • Elements of the IRP
  • Gap Analysis
  • Business Impact Analysis
  • Escalation Process
  • Help Desk/Service Desk Process for the Identification of
  • Incidents
  • Incident Management and Response Teams
  • Incident Notification Process
  • Challenges in Developing an Incident Management Plan
  • Key Aspects from the CISM Exam Perspective
  • Business Continuity and Disaster Recovery Procedures
  • Phases of Recovery Planning
  • Recovery Sites
  • Continuity of Network Services
  • Key Aspects from the CISM Exam Perspective
  • Insurance
  • Key Aspects from the CISM Exam Perspective
  • Incident Classification/Categorization
  • Help/Service Desk Processes for Identifying Security Incidents
  • Testing Incident Response, BCP, and DRP
  • Types of Tests
  • Effectiveness of Tests
  • Category of Tests
  • Recovery Test Metrics
  • Success Criteria for Tests
  • Incident Management Tools and Technologies
  • Incident Management Systems
  • Personnel
  • Audits
  • Outsourced Security Providers
  • Executing Response and Recovery Plans
  • Key Aspects from the CISM Exam Perspective
  • Incident Containment Methods
  • Incident Response Communications
  • Incident Eradication
  • Recovery
  • Post-Incident Activities and Investigations
  • Identifying the Root Cause and Taking Corrective Action
  • Documenting Events
  • Chain of Custody
  • Key Aspects from the CISM Exam Perspective
  • Incident Response Procedures
  • The Outcome of Incident Management
  • The Role of the Information Security Manager
  • Security Information and Event Management
  • Key Aspects from the CISM Exam Perspective
  • Incident Management Metrics and Indicators
  • Key Performance Indicators and Key Goal Indicators
  • Metrics for Incident Management
  • Reporting to Senior Management
  • The Current State of Incident Response Capabilities
  • History of Incidents
  • Threats and Vulnerabilities
  • Threats
  • Vulnerabilities

Materijali za čitanje i slajdovi za prezentacije u učionici su na engleskom jeziku.

Preporučeno predznanje

Za pohađanje CISM obuke, preporučuje se prethodno profesionalno iskustvo u upravljanju bezbednošću informacija, posebno u oblastima kao što su upravljanje bezbednošću, upravljanje rizicima i odgovor na incidente. Generalno, nekoliko godina iskustva u ovim oblastima je korisno za razumevanje obrađenih koncepata.

Iako sertifikacija ne zahteva druge specifične kvalifikacije pre pohađanja obuke, osnovno znanje praksi u IT bezbednosti i poslovnom upravljanju je snažno preporučeno za maksimizovanje učenja.

Stručno usavršavanje i sertifikacija

Karakteristike ispita

  • Priprema za Certified Information Systems Manager sertifikaciju
  • Cena: 760 USD
  • Tipovi pitanja: Višestruki izbor
  • Trajanje: 4 sata
  • Broj pitanja: 150
  • Prolazna ocena: 450/800

Teme ispita

  • Upravljanje bezbednošću informacija – Razvoj i upravljanje okvirom upravljanja bezbednošću usklađenim sa poslovnim ciljevima.
  • Upravljanje rizicima povezanim sa bezbednošću informacija – Identifikacija i upravljanje bezbednosnim rizicima.
  • Razvoj i upravljanje programom bezbednosti informacija – Kreiranje i održavanje programa bezbednosti koji podržava preduzeće.
  • Upravljanje bezbednosnim incidentima – Planiranje i odgovor na bezbednosne incidente.

CISM obuka za sertifikaciju

Obuka Certified Information Security Manager (CISM) (CS8529) je dizajnirana za IT profesionalce i odgovorne za bezbednost koji žele da steknu naprednu ekspertizu u upravljanju programima bezbednosti informacija u preduzećima. Svetski priznata, ova ISACA sertifikacija potvrđuje vašu sposobnost dizajniranja, implementacije i upravljanja bezbednosnim inicijativama usklađenim sa organizacionim ciljevima. Ova obuka se fokusira na četiri ključna domena: upravljanje, upravljanje rizicima, razvoj programa i upravljanje incidentima.

Učesnici imaju koristi od praktičnih vežbi i studija stvarnih slučajeva za pripremu CISM sertifikacionog ispita. Ova akreditacija demonstrira vašu sposobnost vođenja i usklađivanja bezbednosnih strategija sa potrebama preduzeća.

Zašto odabrati CISM obuku?

U današnjem digitalnom pejzažu, organizacije se suočavaju sa rastućim pretnjama koje zahtevaju kvalifikovane odgovorne za bezbednost. CISM sertifikacija potvrđuje vaše liderske kompetencije za upravljanje i optimizaciju programa bezbednosti informacija na nivou preduzeća, garantujući usklađenost i otpornost u suočavanju sa sajber rizicima.

Ova obuka vas opremava potrebnim veštinama za zauzimanje strateških uloga kao što su odgovorni za IT bezbednost, konsultant za upravljanje rizicima i odgovorni za usklađenost. CISM sertifikacija jača vaš profesionalni kredibilitet i karijerne perspektive u konkurentnoj oblasti bezbednosti informacija.

Veštine koje ćete steći tokom obuke

  1. Duboko razumevanje upravljanja bezbednošću informacija
    Ovladajte upravljanjem, upravljanjem rizicima i razvojem bezbednosnih programa usklađenih sa poslovnim ciljevima.

  2. Procena i ublažavanje rizika
    Naučite da efikasno procenjujete i upravljate rizicima povezanim sa bezbednošću informacija.

  3. Dizajniranje i upravljanje bezbednosnim programima
    Razvijte veštine za kreiranje robusnih bezbednosnih okvira prilagođenih potrebama organizacije.

  4. Upravljanje incidentima i odgovor na krize
    Steknite ekspertizu u upravljanju i oporavku nakon bezbednosnih incidenata.

  5. Usklađenost i poštovanje propisa
    Osigurajte da bezbednosne mere poštuju pravne, regulatorne i organizacione standarde.

  6. Priprema za CISM sertifikacioni ispit
    Opremite se znanjima i alatima potrebnim za uspešno polaganje CISM ispita sa pouzdanjem.

Interaktivna obuka koju vode sertifikovani instruktori

CISM obuku vode ISACA sertifikovani instruktori sa velikim iskustvom u upravljanju bezbednošću informacija na nivou preduzeća. Učesnici imaju koristi od interaktivnih sesija, praktičnih vežbi i analiza stvarnih izazova koji povezuju teoriju sa konkretnim primenama.

Kome je namenjena ova obuka?

Ova obuka je idealna za:

  • IT profesionalce odgovorne za upravljanje programima bezbednosti informacija
  • Bezbednosne konsultante specijalizovane za upravljanje rizicima na nivou preduzeća
  • IT menadžere odgovorne za usklađivanje bezbednosti sa poslovnim ciljevima
  • Pojedince koji se pripremaju za CISM sertifikacioni ispit

Unapredite svoju karijeru sa CISM sertifikacijom

Obuka Certified Information Security Manager (CISM) (CS8529) vas oprema veštinama potrebnim za efikasno vođenje i upravljanje programima bezbednosti informacija na nivou preduzeća. Prijavite se već danas da dobijete globalno priznatu sertifikaciju i unapredite svoju karijeru u upravljanju bezbednošću informacija.

Često postavljana pitanja - obuka za CISM sertifikaciju (FAQ)

Obuka uključuje upravljanje, upravljanje rizicima, razvoj bezbednosnih programa i odgovor na incidente.

Kandidati moraju imati pet godina profesionalnog iskustva u bezbednosti informacija, od čega tri godine u upravljačkim ulogama.

Sertifikacija potvrđuje napredne kompetencije u upravljanju bezbednošću informacija, poboljšavajući vaše karijerne mogućnosti.

Da, sadržaj kursa je potpuno usklađen sa ciljevima ISACA CISM ispita.

CISM sertifikacija je svetski priznata i cenjena od strane organizacija iz različitih sektora.

Podelite

Formular za prijavu na privatnu obuku

Poštovani,

Hvala vam na interesovanju za naše usluge. Evo važnih informacija koje ćemo dobiti popunjavanjem ovog formulara:

Ime obuke: Certified Information Security Manager (CISM) (CS8529)

Jezik: Engleski

Trajanje: 5 dana / 35 sati

Broj polaznika iz vaše kompanije *

Minimum broj polaznika: 6

Ime kompanije *
Vaše ime i prezime *
Broj telefona *
Poslovni email *
Molimo unesite poslovnu ili profesionalnu email adresu.
Kako ste čuli za nas? *
Komentari ili napomene
Opšti uslovi su dostupni na ovoj stranici.

Molimo popunite obavezna polja.

Naš veb-sajt koristi kolačiće kako bismo personalizovali vaše iskustvo pretraživanja. Klikom na „Prihvatam“, dajete saglasnost za korišćenje kolačića.