UNIVERSITY OF DAR ES SALAAM COMPUTING CENTRE

Excellence, Innovation and Technological Foresight
  • user Teacher Elon Gated
  • Last Update: July 24, 2022
  • Review: 4.5
user

About This Course

<p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-family:Tahoma,Geneva,sans-serif"><strong>Course Overview</strong></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Bookman Old Style",serif">In this course, students will establish processes to ensure that information security measures<span style="color:#333333"> align with established business needs.</span></span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><strong><span style="font-family:Tahoma,Geneva,sans-serif">Who Should Attend</span></strong></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Bookman Old Style",serif">The intended audience for this course is information security and IT professionals, such as network administrators and engineers, IT managers, and IT auditors, and other individuals who want to learn more about information security, who are interested in learning in-depth information about information security management, who are looking for career advancement in IT security, or who are interested in earning the CISM certification<span style="color:#333333">.</span></span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-family:Tahoma,Geneva,sans-serif"><strong>Course Objectives</strong></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Bookman Old Style",serif">Establish and maintain a framework to provide assurance that information security strategies are aligned with business objectives and consistent with applicable laws and regulations. Identify and manage information security risks to achieve business objectives. Create a program to implement the information security strategy. Implement an information security program. Oversee and direct information security activities to execute the information security program. Plan, develop, and manage capabilities to detect, respond to, and recover from information security incidents.</span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-family:Tahoma,Geneva,sans-serif"><span style="font-size:11pt"><strong>Pre-Requisites     </strong></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Bookman Old Style",serif">To become a CISM certified professional, you need to fulfill the following criteria: A completed application must be submitted within 5 years from the date of initially passing the examination. All experience must be verified independently with employers. This experience must have been gained within the 10-year period preceding the application date for certification or within five years of passing the examination. Three (3) years of the five (5) years of work experience must be gained performing the role of an information security manager. In addition, this work experience must be broad and gained in three (3) of the four (4) CISM® domains.</span></span></span></p>

  • Learning Objectives

  • Find a new position involving
    Data modeling.
  • Expanded responsibilities as part of
    an existing role.
  • Ready to begin working on real-world
    data modeling projects.
  • Other Instructors

  • user Eleanor Fant Instructor
  • user Lauren Stamps Teacher
  • user Jonquil Von Associate

Course Curriculum

Lorem Ipsn gravida nibh vel velit auctor aliquet. Aenean sollicitudin, lorem quis bibendum auci elit consequat ipsutis sem nibh id elit. Duis sed odio sit amet nibh vulputate cursus a sit amet mauris. Morbi accumsan ipsum velit.

  • Week 1
  • 0/4

Beginners level

Lorem ipsum dolor sit amet, consectetur dolorili adipiscing elit. Felis donec massa aliquam id.Lorem ipsum dolor sit amet, consectetur adipiscing elit.

2 Videos,1 Audio,1 Reading

  • Video: Greetings and Introductions 2 questions 12 minutes
  • Video: Introducing Elizabeth Gerber 26 minutes
  • Audio: Michael Chapman of IDEO on Interviewing 14 minutes
  • Reading: Slides 19 minutes
  • Week 2
  • 0/6

Diplomatic Language

Lorem ipsum dolor sit amet, consectetur dolorili adipiscing elit. Felis donec massa aliquam id.Lorem ipsum dolor sit amet, consectetur adipiscing elit.

1Videos,1 Audio,2 Reading

  • Reading: Collocations For Job Interview 12 minutes
  • Video: Connecting through Technology 26 minutes
  • Audio: Strategic Leadership 3 questions 8 minutes
  • Reading: Web Coding Basics 6 minutes

Reviews

Lorem Ipsn gravida nibh vel velit auctor aliquet. Aenean sollicitudin, lorem quis bibendum auci elit consequat ipsutis sem nibh id elit.

5
4 Ratings

Detailed Rating

5 stars

100%

4 stars

30%

3 stars

2 stars

1 stars

2 Comments

Write a Review

Ratings:

Members Info

Lorem Ipsn gravida nibh vel velit auctor aliquet. Aenean sollicitudin, lorem quis bibendum auci elit consequat ipsutis sem nibh id elit. Duis sed odio sit amet nibh vulputate cursus a sit amet mauris. Morbi accumsan ipsum velit. Nam nec tellus a odio tincidunt auctor a ornare odio. Sed non mauris vitaes erat consequat auctor eu in elit.

Total number of students in course: 24

  • user Douglas Lyphe Instructor
  • 04 Courses
  • 02 Reviews
  • 2.50 Rating
  • user Jason Response Teacher
  • 07 Courses
  • 8 Reviews
  • 3.50 Rating
  • user Eleanor Fant Associate
  • 02 Courses
  • 05 Reviews
  • 4.00 Rating
Chat Support Hello, may I help you?
UCC Logo
UCC
Digital Assistant
×
Chat started
Welcome
Please select one of the following options: