Beranda » AAPM Certified » Training Information Security Manager CIISM™

Training Information Security Manager CIISM™

T Diposting oleh pada 27 April 2017
F Kategori ,
b Belum ada komentar
@ Dilihat 1145 kali

Training Certified Information Security Manager (CIISM™) AAFM

IT Project Management

Description

The Certified Information Security Manager (CIISM™) certification program is developed specifically for experienced information security managers and those who have information security management responsibilities. The CIISM certification is for the individual who manages, designs, oversees and/or assesses an enterprise’s information security (IS). The CIISM certification promotes international practices and provides executive management with assurance that those earning the designation have the required experience and knowledge to provide effective security management and consulting services. Individuals earning the CIISM certification become part of an elite peer network, attaining a one-of-a-kind credential. The CIISM job practice also defines a global job description for the information security manager and a method to measure existing staff or compare prospective new hires.  The course contents are impregnated by standard course recognized by GAFM ( Global Academy Of Project and Management )

Objectives

The course has been designed to enhance the skill of participants in the area of security management, especially in relation to their day-to-day operation as related to information security management. The training shall provide the participant  with the following capabilities:

  1. Have thorough understanding on Common Body of Knowledge within the scope of  Information Security Management
  2. Enhanced knowledge and skill in dealing with the operational issues as related to information security within day-to-day installation operation
  3. Enhanced the skill in the design, implement, manage, and asses the organization’s  IT security system by applying the Common Body of Knowledge in CIISM
  4. Prepare individual competency for the CIISM professional exam
  5. To enhance the skill of the participants in Information Secuity, and escalate their  management  proficiency with broad managerial perspective essential for their day-to-day IT security operation and preparing the skill for IT security management  procedural set up.

Target Audience

  • Chief Information Security Officer (CISO)
  • Chief Information Officers (CIO)
  • Chief Technology Officers (CTO)
  • IS/IT Steering Committee
  • Audit Committee
  • IT Senior Manager
  • Information Security Manager
  • Senior Risk Manager
  • Senior Audit Manager
  • IT & Audit Staff
  • IT Security Staff
  • Risk Management Staff
  • Academic students

Course Contents and Descriptions

  • Information Security Governance
  • Information Risk Management
  • Information Security Program(me) Development
  • Information Security Program (me) Management
  • Information Security Management
  • Incident and Response Management
  • An information security steering group function
  • Legal and regulatory issues associated with Internet businesses, global transmissions and trans border data flows
  • Common insurance policies and imposed conditions
  • Information security process improvement
  • Recovery time objectives (RTO) for information resources
  • Cost benefit analysis techniques in assessing options for mitigating risks threats and exposures to acceptable levels.
  • Security metrics design, development and implementation.
  • Information security management due diligence activities and reviews of the infrastructure.
  • Events affecting security baselines that may
  • The requirements for collecting and presenting evidence; rules for evidence, admissibility of evidence, quality and completeness of evidence.
  • External vulnerability reporting sources
  • The key components of cost benefit analysis and enterprise migration plans
  • Privacy and tax laws and tariffs, data import/export restrictions, restrictions on cryptography, warranties, patents, copyrights, trade secrets, national security
  • CISM information classification methods
  • Life-cycle-based risk management principles and practices.
  • Cost benefit analysis techniques in assessing options for mitigating risks threats and exposures to acceptable levels.
  • Security baselines and configuration management in the design and management of required risk assessment
  • Changes to information security requirements in security plans, test plans and re-performance
  • Disaster recovery testing for infrastructure and critical business applications, business applications and the infrastructure
  • Acquisition management methods and techniques
  • Evaluation of vendor service level agreements, preparation of contracts) CIISM question and answer

Durasi Training: 3 Hari

Tempat Training:

  • Hotel Amaris, Jakarta

Biaya Training: 

  • Biaya Training: Rp. 4,500,000,- (Empat Juta Lima Ratus Ribu Rupiah)
  • Biaya Sertifikasi AAPM: USD. 300,- (Tiga Ratus US Dollar)

Contact Information

SBKI Training Center

Hand Phone: 0812 9713 1551

Email: info@trainingsbki.com

 

Belum ada Komentar untuk Training Information Security Manager CIISM™

Silahkan tulis komentar Anda

Your email address will not be published. Required fields are marked *

*

a Artikel Terkait Training Information Security Manager CIISM™

Certified Human Resources Analyst (CHRA) AAPM TrainingSBKI.com

Training Human Resources Analyst CHRA

T 27 April 2017 F , A admin_sbki

Training Certified Human Resources Analyst (CHRA) Sertifikasi AAPM HR Project Management, Course Description: The course has been designed to educate and validate Human Resource (HR) Professionals around the globe, ensuring their ability to effectively demonstrate core knowledge areas of a... Selengkapnya

(AAPM) Training Information System Auditor CIISA

(AAPM) Training Information System Auditor CIISA

T 21 May 2017 F , A admin_sbki

Training Certified International Information System Auditor (CIISA) Sertifikasi AAPM Course: Certified International Information System Auditor/CIISA Descriptions: The credential of a professionals I.S auditor is valuable. This course delves into the unique challenges of managing an audit and the knowledge necessary to... Selengkapnya

Certified Risk and Information System Control (CRISC) AAPM TrainingSBKI.com

Risk and Information System Control CRISC

T 27 April 2017 F , , A admin_sbki

Training Certified Risk and Information System Control (CRISC) Sertifikasi AAPM IT Project Management Descriptions The Certified in Risk and Information Systems Control™ certification  is designed for IT professionals who have hands-on experience with risk identification, assessment, and evaluation; risk response; risk monitoring; IS control... Selengkapnya

+ SIDEBAR

Ada Pertanyaan? Silahkan hubungi Marketing kami untuk mendapatkan informasi lebih lengkap mengenai jasa/produk kami.

WhatsApp chat