CISM - Exam preparation
- 
                                                    
Module 01: Information Security Governance
- Develop an Information Security Strategy
 - Align Information Security Strategy with Corporate Governance
 - Identify Legal and Regulatory Requirements
 - Justify Investment in Information Security
 - Identify Drivers Affecting the Organization
 - Obtain Senior Management Commitment to Information Security
 - Define Roles and Responsibilities for Information Security
 - Establish Reporting and Communication Channels
 
 - 
                                                    
Module 02:Information Risk Management
- Implement an Information Risk Assessment Process
 - Determine Information Asset Classification and Ownership
 - Conduct Ongoing Threat and Vulnerability Evaluations
 - Conduct Periodic BIAs
 - Identify and Evaluate Risk Mitigation Strategies
 - Integrate Risk Management into Business Life Cycle Processes
 - Report Changes in Information Risk
 
 - 
                                                    
Module 03: Information Security Program Development
- Develop Plans to Implement an Information Security Strategy
 - Security Technologies and Controls
 - Specify Information Security Program Activities
 - Coordinate Information Security Programs with Business Assurance Functions
 - Identify Resources Needed for Information Security Program Implementation
 - Develop Information Security Architectures
 - Develop Information Security Policies
 - Develop Information Security Awareness, Training, and Education Programs
 - Develop Supporting Documentation for Information Security Policies
 
 - 
                                                    
Module 04 :Information Security Program Implementation
 - 
                                                    
Module 05:Information Security Program Management
- Manage Information Security Program Resources
 - Enforce Policy and Standards Compliance
 - Enforce Contractual Information Security Controls
 - Enforce Information Security During Systems Development
 - Maintain Information Security Within an Organization
 - Provide Information Security Advice and Guidance
 - Provide Information Security Awareness and Training
 - Analyze the Effectiveness of Information Security Controls
 
 
            
