Existing User Login

New User? Create An Account

Request new password

We are iCollege

Established in 2003 under the parent company XpertSkills, iCollege is one of the most trusted marketplaces in E-Learning. Our dedication transcends mere content – we source learning products from only the best suppliers and vendors across the globe so you have the widest selection of educational courses designed to equip you for success.

Headquartered in stunning South Africa, our distributed company spans 3 continents with employees in the U.S., India, and of course, South Africa. Our customers call more than 120 countries home. We're proud to say iCollege is trusted by leading organizations in major tech hubs, including Silicon Valley, to train and equip employees to be the very best that they can be.

Whether partnering with Fortune 500 companies or being part of an individual's journey toward career growth, we are committed to the success of all who trust us as their source for education and training.

Contact Details:

Web: www.xpertskills.com
Skype: xpertskills
Mail: info@xpertskills.com

Physical Address:

Head Office - South Africa
16 Monte Carlo Crescent
Kyalami business Park
Johannesburg
South Africa 1684

You are here

ISACA Certified Information Security Manager (CISM) (2019)

EDUTAINMENT COURSE

ISACA Certified Information Security Manager (CISM) (2019)

Interactive and entertaining talk-show style format presented by industry leading experts.
Overview

Certified Information Security Manager (CISM) is a certification offered by ISACA,  a nonprofit,  independent association that advocates for professionals involved in information security,  assurance,  risk management,  and governance.  CISM is an advanced certification that provides validation for individuals who have demonstrated they possess the knowledge and experience required to develop and manage an enterprise information security program. The certification intended for information security managers,  aspiring managers or IT consultants who support information security program management

Objectives

By the end of this training you will be able to:

  • Define and design security architecture for your IT operation.
  • Develop a working knowledge of the four domains prescribed by the ISACA Exam Candidate Information Guide.
  • Demonstrate a deep understanding of the relationship between information security programs and broader business goals and objectives.
  • Focus on IT compliance and the integrity of enterprise systems to establish a more secure enterprise IT framework.
  • Earn the requisite 16 CPEs required to take the CISM certification exam.
  • Acquire the relevant knowledge and skills required to pass the CISM certification exam.
Prerequisites
  • As the case with the CISM certification exam,  the candidates are required to have a minimum of five years of experience in information security management.
  • Experience in the fields of information security governance,  risk management,  compliance,  and incident management is also preferable.
Target Audience

The ideal candidates for the course must be:

  • Experienced information security managers and officers
  • IT consultants and managers
  • IT auditors
  • IT security policy makers
  • Privacy officers
  • Network administrators
  • Network security engineers
  • Candidates seeking CISM certification
Instructor: ITProTV

ITProTV delivers the IT instruction that you need to advance or launch your IT career in a fun and creative way. With attractive studios and an interactive, talk-show style format, you'll watch more and learn more. From CompTIA, Cisco, and Microsoft to Security and Cloud Fundamentals, you can learn it all. Dive deep into one or master many with the friendly faces of IT training.

  1. INFORMATION SECURITY GOVERNANCE
1
Start
Overview
2
Start
Information Security Governance Structure
3
Start
Information Security Governance Structure Part 2
4
Start
Information Security Governance Structure Part 3
5
Start
Information Security Manager Role
6
Start
Information Security Manager Role Part 2
7
Start
IS Standards, Frameworks, And Best Practices
8
Start
IS Standards, Frameworks, Best Practices Pt. 2
9
Start
IS Standards, Frameworks, Best Practices Pt. 3
10
Start
Information Security Governance - Key Points
  1. INFORMATION RISK MANAGEMENT
11
Start
Risk Management Concepts
12
Start
Risk Management Concepts Part 2
13
Start
The Risk Management Lifecycle
14
Start
The Risk Management Lifecycle Part 2
15
Start
The Risk Management Lifecycle Part 3
16
Start
The Risk Management Lifecycle Part 4
17
Start
The Risk Management Lifecycle Part 5
18
Start
The Risk Management Lifecycle Part 6
19
Start
The Risk Management Lifecycle Part 7
20
Start
The Risk Management Lifecycle Part 8
21
Start
Operational Risk Mangement
22
Start
Operational Risk Management Part 2
23
Start
Information Risk Management - Key Points
  1. INFORMATION SECURITY PROGRAM DEVELOPMENT AND MANAGEMENT
24
Start
Information Security Programs
25
Start
Information Security Programs Part 2
26
Start
Information Security Programs Part 3
27
Start
Audits, Audits, Audits
28
Start
Audits, Audits, Audits Part 2
29
Start
Audits, Audits, Audits Part 3
30
Start
Security Program Operations
31
Start
Security Program Operations Part 2
32
Start
Security Program Operations Part 3
33
Start
Security Program Operations Part 4
34
Start
Security Program Operations Part 5
35
Start
Security Program Operations Part 6
36
Start
Security Program Operations Part 7
37
Start
Security Program Operations Part 8
38
Start
Security Program Operations Part 9
39
Start
Info. Security Program Dev. Mgmt - Key Points
  1. INFORMATION SECURITY INCIDENT MANAGEMENT
40
Start
Incident Management Overview
41
Start
Incident Response Procedure
42
Start
Incident Response Procedure Part 2
43
Start
Incident Responses Procedure Part 3
44
Start
BCP And DRP
45
Start
BCP And DRP Part 2
46
Start
BCP And DRP Part 3
47
Start
BCP And DRP Part 4
48
Start
BCP And DRP Part 5
49
Start
Information Security Incident Mgmt - Key Points
EDUTAINMENT COURSE
?Interactive and entertaining talk-show style format presented by industry leading experts.
USD 59
  • 12:45:00
    Hours of learning
  • Receive a Certificate of Excellence on successful completion
  • Presented by highly qualified, industry leading experts
  • 12 Months Access (Unless indicated otherwise)
  • 10-Day money-back guarantee
Back to Top