16 hours of high-quality e-learning content
16 CPE’s offered
Test your skills with challenges after each lesson
Course completion certificate
✔ Classroom training is considered the most effective form of learning.
✔ Develops important personality and career building skills.
✔ Technology-Based Learning. Common methods of learning via technology include.
Corporate House Training
✔ Flexible pricing options
✔ Enterprise grade Learning Management System (LMS)
✔ Enterprise dashboards for individuals and teams
✔ 24×7 learner assistance and support
✔ A workshop is a great way for someone to learn about a particular subject.
✔ Workshop are usually longer often 1 to 2 days
✔ Seminars are usually 90 minutes to 3 hours
✔ A training workshop is a type of interactive training
✔ Online training is effective for training across multiple locations.
✔ 24×7 learner assistance and support.
✔ Amirit Techservices online course platform is one of the most well-known sources of education via the internet.
Certified Information Security Manager (CISM)
Lesson 2: Effective Information Security Governance
Lesson 3: Information Security Concepts and Technologies
Lesson 4: Information Security Manager
Lesson 5: Scope and Charter of Information Security Governance
Lesson 6: Information Security Governance Metrics
Lesson 7: Information Security Strategy Overview
Lesson 8: Creating an Information Security Strategy
Lesson 9: Determining Current State Of Security
Lesson 10: Information Security Strategy Development
Lesson 11: Strategy Resources
Lesson 12: Strategy Constraints
Lesson 13: Action Plan to Implement Strategy Knowledge Check
Lesson 2: Good Information Security Risk Management
Lesson 3: Information Security Risk Management Concepts
Lesson 4: Implementing Risk Management
Lesson 5: Risk Assessment
Lesson 6: Controls Countermeasures
Lesson 7: Recovery Time Objectives
Lesson 8: Risk Monitoring and Communication’
Lesson 2: Information Security Program Objectives
Lesson 3: Information Security Program Development Concepts
Lesson 4: Scope and Charter of Information Security Program Development
Lesson 5: Information Security Management Framework
Lesson 6: Information Security Framework Components
Lesson 7: Information Security Program Resources
Lesson 8: Implementing an Information Security Program
Lesson 9: Information Infrastructure and Architecture
Lesson 10: Information Security Program
Lesson 11: Security Program Services and Operational Activities Knowledge Check
Lesson 2: Incident Response Procedures
Lesson 3: Incident Management Organization
Lesson 4: Incident Management Resources
Lesson 5: Incident Management Objectives
Lesson 6: Incident Management Metrics and Indicators
Lesson 7: Current State of Incident Response Capability
Lesson 8: Developing an Incident Response Plan
Lesson 9: BCP/DRP
Lesson 10: Testing Response and Recovery Plans Knowledge
o Successful completion of the CISM examination
o Adherence to the ISACA Code of Professional Ethics
o Agree to comply with the Continuing Education Policy
o Five years of work experience in the field of information security, three of which must be as an information security manager. Work experience must be gained in three of the four CISM domains. All information must be verified independently by employers.
o Submit an application for CISM certification within five years from the date of initially passing the exam
• A completed application must be submitted within 5 years from the date of initially passing the examination.
• All experience must be verified independently with employers.
• This experience must have been gained within the 10-year period preceding the application date for certification or within five years of passing the examination.
• Three (3) years of the five (5) years of work experience must be gained performing the role of an information security manager
• In addition, this work experience must be broad and gained in three (3) of the four (4) CISM® domains