CISM®, Certified Information Security Manager® + Oefen vragen (QAE) [CISM]
Startdata en plaatsen
computer Online: VIRTUAL TRAINING CENTER 16 dec. 2024 tot 19 dec. 2024Toon rooster event 16 december 2024, 09:00-17:00, VIRTUAL TRAINING CENTER, NL229245.1 event 17 december 2024, 09:00-17:00, VIRTUAL TRAINING CENTER, NL229245.2 event 18 december 2024, 09:00-17:00, VIRTUAL TRAINING CENTER, NL229245.3 event 19 december 2024, 09:00-17:00, VIRTUAL TRAINING CENTER, NL229245.4 |
computer Online: VIRTUAL TRAINING CENTER 7 jan. 2025 tot 10 jan. 2025Toon rooster event 7 januari 2025, 10:30-18:30, VIRTUAL TRAINING CENTER, NL235469.1 event 8 januari 2025, 10:30-18:30, VIRTUAL TRAINING CENTER, NL235469.2 event 9 januari 2025, 10:30-18:30, VIRTUAL TRAINING CENTER, NL235469.3 event 10 januari 2025, 10:30-18:30, VIRTUAL TRAINING CENTER, NL235469.4 |
placeNieuwegein (Iepenhoeve 5) 24 mrt. 2025 tot 27 mrt. 2025Toon rooster event 24 maart 2025, 09:00-17:00, Nieuwegein (Iepenhoeve 5), NL232894.1 event 25 maart 2025, 09:00-17:00, Nieuwegein (Iepenhoeve 5), NL232894.2 event 26 maart 2025, 09:00-17:00, Nieuwegein (Iepenhoeve 5), NL232894.3 event 27 maart 2025, 09:00-17:00, Nieuwegein (Iepenhoeve 5), NL232894.4 |
computer Online: VIRTUAL TRAINING CENTRE 24 mrt. 2025 tot 27 mrt. 2025Toon rooster event 24 maart 2025, 09:00-17:00, VIRTUAL TRAINING CENTRE, NL232894V.1 event 25 maart 2025, 09:00-17:00, VIRTUAL TRAINING CENTRE, NL232894V.2 event 26 maart 2025, 09:00-17:00, VIRTUAL TRAINING CENTRE, NL232894V.3 event 27 maart 2025, 09:00-17:00, VIRTUAL TRAINING CENTRE, NL232894V.4 |
computer Online: VIRTUAL TRAINING CENTER 2 jun. 2025 tot 5 jun. 2025Toon rooster event 2 juni 2025, 10:30-18:30, VIRTUAL TRAINING CENTER, NL235470.1 event 3 juni 2025, 10:30-18:30, VIRTUAL TRAINING CENTER, NL235470.2 event 4 juni 2025, 10:30-18:30, VIRTUAL TRAINING CENTER, NL235470.3 event 5 juni 2025, 10:30-18:30, VIRTUAL TRAINING CENTER, NL235470.4 |
computer Online: VIRTUAL TRAINING CENTER 18 aug. 2025 tot 21 aug. 2025Toon rooster event 18 augustus 2025, 09:00-17:00, VIRTUAL TRAINING CENTER, NL235468.1 event 19 augustus 2025, 09:00-17:00, VIRTUAL TRAINING CENTER, NL235468.2 event 20 augustus 2025, 09:00-17:00, VIRTUAL TRAINING CENTER, NL235468.3 event 21 augustus 2025, 09:00-17:00, VIRTUAL TRAINING CENTER, NL235468.4 |
computer Online: VIRTUAL TRAINING CENTER 3 nov. 2025 tot 6 nov. 2025Toon rooster event 3 november 2025, 10:30-18:30, VIRTUAL TRAINING CENTER, NL235471.1 event 4 november 2025, 10:30-18:30, VIRTUAL TRAINING CENTER, NL235471.2 event 5 november 2025, 10:30-18:30, VIRTUAL TRAINING CENTER, NL235471.3 event 6 november 2025, 10:30-18:30, VIRTUAL TRAINING CENTER, NL235471.4 |
Beschrijving
Ontdek de verschillende trainingsmogelijkheden bij Global Knowledge
Online of op locatie er is altijd een vorm die bij je past.
Kies op welke manier jij of je team graag een training wilt volgen. Global Knowledge bied je verschillende trainingsmogelijkheden. Je kunt kiezen uit o.a. klassikaal, Virtueel Klassikaal (online), e-Learning en maatwerk. Met onze Blended oplossing kun je de verschillende trainingsvormen combineren.
OVERVIEW
Met behulp van de Certified Information Security Manager (CISM) training behaal je de CISM-certificering. Deze certificering van ISACA is dé certificering voor ervaren information security managers, internationaal erkend. Scroll naar onderen om meer te leren over deze certificering.
The Certified Information Security Manager (CISM) training course will help you obtain the CISM certification. This ISACA certification is the leading certification for experienced information security managers, internationally recognised. Scroll down to learn more about this certification.
- Continuing Professional Education (CPE) : 31
- Oefenvragen (QAE = Questions, Answers and Explanations) : 12 month …
Veelgestelde vragen
"Wat is de doelgroep van deze opleiding?"
"Mag je zonder werkervaring wel deelnemen aan deze CISM opleiding?"
Ontdek de verschillende trainingsmogelijkheden bij Global Knowledge
Online of op locatie er is altijd een vorm die bij je past.
Kies op welke manier jij of je team graag een training wilt volgen. Global Knowledge bied je verschillende trainingsmogelijkheden. Je kunt kiezen uit o.a. klassikaal, Virtueel Klassikaal (online), e-Learning en maatwerk. Met onze Blended oplossing kun je de verschillende trainingsvormen combineren.
OVERVIEW
Met behulp van de Certified Information Security Manager (CISM) training behaal je de CISM-certificering. Deze certificering van ISACA is dé certificering voor ervaren information security managers, internationaal erkend. Scroll naar onderen om meer te leren over deze certificering.
The Certified Information Security Manager (CISM) training course will help you obtain the CISM certification. This ISACA certification is the leading certification for experienced information security managers, internationally recognised. Scroll down to learn more about this certification.
- Continuing Professional Education (CPE) : 31
- Oefenvragen (QAE = Questions, Answers and Explanations) : 12 month access
OBJECTIVES
Learning Objectives:
Module 1: Information Security Governance
- Describe the role of governance in creating value for the enterprise.
- Explain the importance of information security governance in the context of overall enterprise governance.
- Describe the influence of enterprise leadership, structure and culture on the effectiveness of an information security strategy.
- Identify the relevant legal, regulatory and contractual requirements that impact the enterprise.
- Describe the effects of the information security strategy on enterprise risk management.
- Evaluate the common frameworks and standards used to govern an information security strategy.
- Explain why metrics are critical in developing and evaluating the information security strategy.
- Information Risk Management and Compliance
- Information Security Program Development and Management
- Information Security Incident Management
Module 2: Information Security Risk Management
- Apply risk assessment strategies to reduce the impact of information security risk.
- Assess the types of threats faced by the enterprise.
- Explain how security control baselines affect vulnerability and control deficiency analysis.
- Differentiate between application of risk treatment types from an information security perspective.
- Describe the influence of risk and control ownership on the information security program.
- Outline the process of monitoring and reporting information security risk.
Module 3: Information Security Program Development and Management
- Outline the components and resources used to build an information security program.
- Distinguish between common IS standards and frameworks available to build an information security program.
- Explain how to align IS policies, procedures and guidelines with the needs of the enterprise.
- Describe the process of defining an IS program road map.
- Outline key IS program metrics used to track and report progress to senior management.
- Explain how to manage the IS program using controls.
- Create a strategy to enhance awareness and knowledge of the information security program.
- Describe the process of integrating the security program with IT operations and third-party providers.
- Communicate key IS program information to relevant stakeholders.
Module 4: Information Security Incident Management
- Distinguish between incident management and incident response
- Outline the requirements and procedures necessary to develop an incident response plan.
- Identify techniques used to classify or categorize incidents.
- Outline the types of roles and responsibilities required for an effective incident management and response team
- Distinguish between the types of incident management tools and technologies available to an enterprise.
- Describe the processes and methods used to investigate, evaluate and contain an incident.
- Identify the types of communications and notifications used to inform key stakeholders of incidents and tests.
- Outline the processes and procedures used to eradicate and recover from incidents.
- Describe the requirements and benefits of documenting events.
- Explain the relationship between business impact, continuity and incident response.
- Describe the processes and outcomes related to disaster recovery.
- Explain the impact of metrics and testing when evaluating the incident response plan.
AUDIENCE
ISACA’s Certified Information Security Manager (CISM) certification is for those with technical expertise and experience in IS/IT security and control and wants to make the move from team player to manager. CISM can add credibility and confidence to your interactions with internal and external stakeholders, peers and regulators.
Experienced information security managers and those who have information security management responsibilities, including IT consultants, auditors, managers, security policy writers, privacy officers, information security officers, network administrators, security device administrators, and security engineers.
CERTIFICATION
Oefenvragen (QAE = Questions, Answers and Explanations) zijn online beschikbaar via een voucher. Het voucher is onderdeel van het cursusmateriaal. Hiermee kunt u tijdens de training oefenen en is tot 12 maanden na de training beschikbaar
Om officieel CISM gecertificeerd te worden dient u aan de onderstaande eisen te voldoen:
- slagen voor het officiële CISM-examen
- beschikken over ten minste 5 jaar relevante werkervaring in ten minste twee CISM-domeinen (of 4 jaar ervaring aangevuld met een HBO+ opleiding).
Het CISM examen is gefocusd op de vier domeinen die zijn gedefinieerd door ISACA. Het daadwerkelijke examen duurt 4 uur en bestaat uit 150 Engelstalige multiplechoicevragen. Voor meer informatie over de certificering kunt u gaan naar: https://www.isaca.org/credentialing/cism
Het examenvoucher voor het officiële CISM examen is vanaf januari 2023 niet meer inbegrepen in de cursusprijs. Dit examen kunt u als los product erbij bestellen.
NEXT STEP
- CISSP Certification Preparation
- CISA, Certified Information Systems Auditor
CONTENT
Domain 1: Information Security Governance
- Enterprise Governance Overview
- Organizational Culture, Structures, Roles and Responsibilities
- Legal, Regulatory and Contractual Requirements
- Information Security Strategy
- Information Governance Frameworks and Standards
- Strategic Planning
Domain 2: Information Risk Management
- Risk and Threat Landscape
- Vulnerability and Control Deficiency Analysis
- Risk Assessment, Evaluation and Analysis
- Information Risk Response
- Risk Monitoring, Reporting and Communication
Domain 3: Information Security Program Development & Management
- IS Program Development and Resources
- IS Standards and Frameworks
- Defining an IS Program Road Map
- IS Program Metrics
- IS Program Management
- IS Awareness and Training
- Integrating the Security Program with IT Operations
- Program Communications, Reporting and Performance Management
Domain 4: Information Security Incident Management
- Incident Management and Incident Response Overview
- Incident Management and Response Plans
- Incident Classification/Categorization
- Incident Management Operations, Tools and Technologies
- Incident Investigation, Evaluation, Containment and Communication
- Incident Eradication, Recovery and Review
- Business Impact and Continuity
- Disaster Recovery Planning
- Training, Testing and Evaluation
Blijf op de hoogte van nieuwe ervaringen
Deel je ervaring
Heb je ervaring met deze cursus? Deel je ervaring en help anderen kiezen. Als dank voor de moeite doneert Springest € 1,- aan Stichting Edukans.Hieronder vind je de veelgestelde vragen van andere bezoekers. Als je ook een vraag hebt, neem dan contact op met onze klantenservice.
"Wat is de doelgroep van deze opleiding?"
"Mag je zonder werkervaring wel deelnemen aan deze CISM opleiding?"