Certified Information Security Manager Online Courses in South Africa
This 2KO Certified Information Security Manager (CISM) course provides students with the knowledge and skills that are needed for Security Manager (CISM) certification. 2KO International delivers consulting services, in the IT and Business space, as well as being a training provider for IT certification and user level courses. Training can be any blend of bespoke, classroom and online learning. from the comfort of home or work.
The Certified Information Security Manager certification course is designed for those individuals seeking to enhance their skills, and be recognized for their expertise in Information Security Management. The course promotes the best in security practices from around the world and identifies the individual's knowledge and expertise in this area. The course is intended for individuals seeking to demonstrate mastery of security management skills in a global environment and prepare them for roles in advanced security management. The material contained covers all four of the Domains and associated Task and Knowledge Statements to adequately prepare the individual for passing the CISM exam.
By the end of this training you will be able to:
Define and design security architecture for your IT operation.
Develop a working knowledge of the four domains prescribed by the ISACA Exam Candidate Information Guide.
Demonstrate a deep understanding of the relationship between information security programs and broader business goals and objectives.
Focus on IT compliance and the integrity of enterprise systems to establish a more secure enterprise IT framework.
Earn the requisite 16 CPEs required to take the CISM certification exam.
Acquire the relevant knowledge and skills required to pass the CISM certification exam.
As the case with the CISM certification exam, the candidates are required to have a minimum of five years of experience in information security management.
Experience in the fields of information security governance, risk management, compliance, and incident management is also preferable.
The ideal candidates for the course must be:
Experienced information security managers and officers
IT consultants and managers
IT security policy makers
Network security engineers
Candidates seeking CISM certification