Home Our Courses Short Courses

Programme Overview

Certified Information Systems Auditor
Course Synopsis

Information Systems Audit and Control Association (ISACA) provides three testing opportunities each year, so we developed this Certified Information Security Manager (CISM) exam prep course to help you get it right the first time. The course focuses on advanced risk management and specific compliance and security management operations.

Certification By

Who Should Attend?
Individuals who manage, design and oversee an enterprise’s information security program.
  • Security managers
  • Security directors
  • Security officers
  • Security consultants
  • Information Security Governance
    • Asset Identification
    • Risk Assessment
    • Vulnerability Assessments
    • Asset Management
  • Information Risk Management
    • Asset Classification and Ownership
    • Structured Information Risk Assessment Process
    • Business Impact Assessments
    • Change Management
  • Information Security Program Development
    • Information Security Strategy
    • Program Alignment of Other Assurance Functions
    • Development of Information Security Architectures
    • Security Awareness, Training, and Education
    • Communication and Maintenance of Standards, Procedures, and Other Documentation
    • Change Control
    • Lifecycle Activities
    • Security Metrics
  • Information Security Program Management
    • Security Program Management Overview
    • Planning
    • Security Baselines
    • Business Processes
    • Security Program Infrastructure
    • Lifecycle Methodologies
    • Security Impact on Users
    • Accountability
    • Security Metrics
    • Managing Resources
  • Incident Management and Response
    • Response Management Overview
    • Importance of Response Management
    • Performing a Business Impact Analysis
    • Developing Response and Recovery Plans
    • The Incident Response Process
    • Implementing Response and Recovery Plans
    • Response Documentation
    • Post-Event Reviews

Register Now

Training Style

This program is delivered using "blended learning". This involves classroom lecturing, highly intensive case study/role playing reviews, classroom interaction, lab activities and live demos.

Course Objectives
Course Objectives
In-depth coverage of the four domains required to pass the CISM exam:
  • Information Security Governance
  • Information Risk Management and Compliance
  • Information Security Program Development and Management
  • Information Security Incident Management
Duration & Venue

17-20 March 2020

International University of Malaya-Wales