<p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-family:Tahoma,Geneva,sans-serif"><strong>Course Overview</strong></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:&quot;Bookman Old Style&quot;,serif">In this course, students will establish processes to ensure that information security measures<span style="color:#333333"> align with established business needs.</span></span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><strong><span style="font-family:Tahoma,Geneva,sans-serif">Who Should Attend</span></strong></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:&quot;Bookman Old Style&quot;,serif">The intended audience for this course is information security and IT professionals, such as network administrators and engineers, IT managers, and IT auditors, and other individuals who want to learn more about information security, who are interested in learning in-depth information about information security management, who are looking for career advancement in IT security, or who are interested in earning the CISM certification<span style="color:#333333">.</span></span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-family:Tahoma,Geneva,sans-serif"><strong>Course Objectives</strong></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:&quot;Bookman Old Style&quot;,serif">Establish and maintain a framework to provide assurance that information security strategies are aligned with business objectives and consistent with applicable laws and regulations. Identify and manage information security risks to achieve business objectives. Create a program to implement the information security strategy. Implement an information security program. Oversee and direct information security activities to execute the information security program. Plan, develop, and manage capabilities to detect, respond to, and recover from information security incidents.</span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-family:Tahoma,Geneva,sans-serif"><span style="font-size:11pt"><strong>Pre-Requisites&nbsp; &nbsp; &nbsp;</strong></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:&quot;Bookman Old Style&quot;,serif">To become a CISM certified professional, you need to fulfill the following criteria: A completed application must be submitted within 5 years from the date of initially passing the examination. All experience must be verified independently with employers. This experience must have been gained within the 10-year period preceding the application date for certification or within five years of passing the examination. Three (3) years of the five (5) years of work experience must be gained performing the role of an information security manager. In addition, this work experience must be broad and gained in three (3) of the four (4) CISM&reg; domains.</span></span></span></p>
Lorem Ipsn gravida nibh vel velit auctor aliquet. Aenean sollicitudin, lorem quis bibendum auci elit consequat ipsutis sem nibh id elit. Duis sed odio sit amet nibh vulputate cursus a sit amet mauris. Morbi accumsan ipsum velit.
Lorem ipsum dolor sit amet, consectetur dolorili adipiscing elit. Felis donec massa aliquam id.Lorem ipsum dolor sit amet, consectetur adipiscing elit.
Lorem ipsum dolor sit amet, consectetur dolorili adipiscing elit. Felis donec massa aliquam id.Lorem ipsum dolor sit amet, consectetur adipiscing elit.
Lorem Ipsn gravida nibh vel velit auctor aliquet. Aenean sollicitudin, lorem quis bibendum auci elit consequat ipsutis sem nibh id elit.
David blatant have it, standard A bit of how's your father my lady absolutely.
David blatant have it, standard A bit of how's your father my lady absolutely.
Lorem Ipsn gravida nibh vel velit auctor aliquet. Aenean sollicitudin, lorem quis bibendum auci elit consequat ipsutis sem nibh id elit. Duis sed odio sit amet nibh vulputate cursus a sit amet mauris. Morbi accumsan ipsum velit. Nam nec tellus a odio tincidunt auctor a ornare odio. Sed non mauris vitaes erat consequat auctor eu in elit.