Certified Information Security Manager Online Courses in Tanzania
This 2KO Certified Information Security Manager (CISM) course provides students with the knowledge and skills that are needed for Security Manager (CISM) certification. 2KO Africa offers IT consulting, technical IT services and top-of-the-range IT training on multiple platforms. Our best-of-breed computer courses are presented as instructor led classes or as online internet-based elearning. from the comfort of home or work.
The Certified Information Security Manager certification course is designed for those individuals seeking to enhance their skills, and be recognized for their expertise in Information Security Management. The course promotes the best in security practices from around the world and identifies the individual's knowledge and expertise in this area. The course is intended for individuals seeking to demonstrate mastery of security management skills in a global environment and prepare them for roles in advanced security management. The material contained covers all four of the Domains and associated Task and Knowledge Statements to adequately prepare the individual for passing the CISM exam.
By the end of this training you will be able to:
Define and design security architecture for your IT operation.
Develop a working knowledge of the four domains prescribed by the ISACA Exam Candidate Information Guide.
Demonstrate a deep understanding of the relationship between information security programs and broader business goals and objectives.
Focus on IT compliance and the integrity of enterprise systems to establish a more secure enterprise IT framework.
Earn the requisite 16 CPEs required to take the CISM certification exam.
Acquire the relevant knowledge and skills required to pass the CISM certification exam.
As the case with the CISM certification exam, the candidates are required to have a minimum of five years of experience in information security management.
Experience in the fields of information security governance, risk management, compliance, and incident management is also preferable.
The ideal candidates for the course must be:
Experienced information security managers and officers
IT consultants and managers
IT security policy makers
Network security engineers
Candidates seeking CISM certification
Details about this
Over 13 hours of learning
Includes video, presentations, workbooks, quizzes, flashcards & games
Receive a Certificate of Excellence on successful completion
Presented by highly qualified, industry leading experts
12 Months access (Unless indicated otherwise)