Overview/Description
Once there is an information security program framework in place, the next step for an information security manager is to catalog the resources on hand, and to assemble the resources that are still required in order to implement the information security program. This course examines the policies, controls, and metrics used to make the program function efficiently, and the analyses that will be used to monitor the program on an ongoing basis. This course also examines the technologies, skills, and outside support that the information security program will use. This course will show you how to evaluate the current state of the program and actions to take to properly manage information security. This course prepares you for the Certified Information Security Manager (CISM) exam.
Target Audience
Experienced IT security professionals seeking to pass the Certified Information Security Manager (CISM) exam, or otherwise gain knowledge in managing, designing, and overseeing an enterprise's information security.