Certified Information Security Manager

Certified Information Security Manager

Computational Thinking

Emerging Technologies

Strategy Development

Course Outline

Domain 1

Information Security Governance

  • Develop an information security strategy, aligned with business goals and directives.
  • Establish and maintain an information security governance framework.
  • Integrate information security governance into corporate governance.
  • Develop and maintain information security policies.
  • Develop business cases to support investments in information security.
  • Identify internal and external influences to the organization.
  • Gain ongoing commitment from senior leadership and other stakeholders.
  • Define, communicate and monitor information security responsibilities
  • Establish internal and external reporting and communication channels.

Domain 3

Information Security Program Development & Management

  • Develop a security program, aligned with information security strategy
  • Ensure alignment between the information security program and other business functions
  • Establish and maintain requirements for all resources to execute the IS program
  • Establish and maintain IS architectures to execute the IS program
  • Develop documentation that ensures compliance with policies
  • Develop a program for information security awareness and training
  • Integrate information security requirements into organizational processes
  • Integrate information security requirements into contracts and activities of third parties
  • Develop procedures (metrics) to evaluate the effectiveness and efficiency of the IS program
  • Compile reports to key stakeholders on overall effectiveness of the IS program and the underlying business processes in order to communicate security performance.

Domain 2

Information Risk Management

  • Establish and/or maintain a process for information asset classification to ensure that measures taken to protect assets are proportional to their business value.
  • Identify legal, regulatory, organizational and other applicable requirements to manage the risk of noncompliance to acceptable levels.
  • Ensure that risk assessments, vulnerability assessments and threat analyses are conducted consistently, and at appropriate times, to identify and assess risk to the organization’s information.
  • Identify, recommend or implement appropriate risk treatment/response options to manage risk to acceptable levels based on organizational risk appetite.
  • Determine whether information security controls are appropriate and effectively manage risk to an acceptable level.
  • Facilitate the integration of information risk management into business and IT processes to enable a consistent and comprehensive information risk management program across the organization.
  • Monitor for internal and external factors (e.g., threat landscape, cybersecurity, geopolitical, regulatory change) that may require a reassessment of risk to ensure that changes to existing or new risk scenarios are identified and managed appropriately.
  • Report noncompliance and other changes in information risk to facilitate the risk management decision-making process.
  • Ensure that information security risk is reported to senior management to support an understanding of the potential impact on the organizational goals and objectives.

Domain 4

 Information Security Incident Management

  • Define (types of) information security incidents
  • Establish an incident response plan
  • Develop processes for timely identification of information security incidents
  • Develop processes to investigate and document information security incidents
  • Develop incident escalation and communication processes
  • Establish teams that effectively respond to information security incidents
  • Test and review the incident response plan
  • Establish communication plans and processes
  • Determine the root cause of IS incidents
  • Align incident response plan with DRP and BCP.

Anticipating the Future of Teaching and Learning

Influencing higher education teaching and learning, now and in the future.

Fun Facts

Happy Clients

Completed Projects

Office Locations

Team Members

Up Coming Courses

Our Trademarked
Process & Workflow.

Training and Capacity Building is an integral part in
modern education. It strongly exists to expand their
knowledge and expertise.

All these years, we have been successfully imparting knowledge to our clients in a single trust to make them more independent, resourceful and capable to attempt any issues.

Project Research

Professional development

Resources

Up to date with current issues

Expertise

Global panel of leaders

Development

Adaptive learning 

Study With Us

 The importance of professional development should not be underestimated – it is a career-long obligation for practicing professionals.

[formidable id=2]

Certified in the Governance of Enterprise IT

Certified in the Governance of Enterprise IT

Computational Thinking

Emerging Technologies

Strategy Development

Course Outline

Domain 1

Framework for the Governance of Enterprise IT

  • Learning objectives
  • Domain Task and Knowledge Statements
  • IT Governance
  • Common IT Governance frameworks
  • Policies, Standards, Processes, Procedures, Guidelines
  • Determining business strategy
  • Elements of Enterprise Architecture
  • Implementing IT Controls
  • Communication
  • Enabling Change Leveraging IT Governance

Domain 3

Benefits Realization

  • Learning objectives
  • Domain Task and Knowledge Statements
  • Value
  • Value Governance
  • Investment Management
  • Portfolio Management
  • The Business Case

Domain 2

Strategic Management

  • Learning objectives
  • Domain Task and Knowledge Statements
  • Strategic Planning
  • Strategic Management
  • Enterprise Architecture
  • Evaluating IT Investment
  • PM techniques

Domain 4

Risk Optimization

  • Overview of Risk Management
  • Risk Management Frameworks, Standards, Guidelines
  • Risk Assessment
  • Risk Treatment
  • Assessment and Evaluation of the Risk Management Program

Domain 5

Resource Optimization

  • Resource Management
  • IT Strategy
  • Human Resource Management (HRM)
  • Leveraging technology
  • Measuring performance
  • Continuous improvement

Anticipating the Future of Teaching and Learning

Influencing higher education teaching and learning, now and in the future.

Fun Facts

Happy Clients

Completed Projects

Office Locations

Team Members

Up Coming Courses

Our Trademarked
Process & Workflow.

Training and Capacity Building is an integral part in
modern education. It strongly exists to expand their
knowledge and expertise.

All these years, we have been successfully imparting knowledge to our clients in a single trust to make them more independent, resourceful and capable to attempt any issues.

Project Research

Professional development

Resources

Up to date with current issues

Expertise

Global panel of leaders

Development

Adaptive learning 

Study With Us

 The importance of professional development should not be underestimated – it is a career-long obligation for practicing professionals.

[formidable id=2]

Certified in Risk and Information Systems Control

Certified in Risk and Information Systems Control

Computational Thinking

Emerging Technologies

Strategy Development

Course Outline

Lesson 1

Introduction to the ISACA CRISC Exam

• Class Overview
• CRISC Domains
• Test Registration

Lesson 3

IT Risk Assessment

  • Risk Assessment vs. Risk Identification
  • Techniques for Risk Assessment
  • Risk Scenarios
  • Analyzing the Current State of Controls
  • Risk and Control Analysis
  • Risk Analysis Techniques
  • Incident Response
  • Business Risk
  • Risk Associated with Enterprise Architecture
  • Management of Data
  • Emerging Technologies and Threats
  • Industry Trends
  • Third Party Management
  • Project and Program Management
  • SDLC
  • Recovery and Business Continuity
  • Risk Assessment Reports
  • Ownership of Risk and Accountability
  • Communication of Report Results

Lesson 5

Risk and Control Monitoring and Reporting

  • Key Risk Indicators
  • Risk Management Life Cycle
  • Key Performance and Goal Indicators
  • Data Collection and Extracting Techniques
  • Changes in Risk Profile
  • Monitoring Controls
  • Control Assessment Types
  • Control Assessment Results
  • Risk Profile Changes

Lesson 2

Risk Identification

  • Good Practices for Risk Management
  • Components of Risk Management
  • Methods for Risk Identification
  • Risk Culture and Communication
  • The Businesses IT Risk Structure
  • Risk Principles and Concepts
  • Vulnerabilities and Threats
  • Assets
  • Threats
  • Vulnerabilities
  • Vulnerability Assessment
  • Pen Testing
  • Probability/Likelihood
  • IT Risk
  • IT Risk Scenarios
  • Ownership and Accountability
  • Other Risk Concepts
  • Risk Awareness

Lesson 4

Risk Response

  • Risk Response and Business Objectives Alignment
  • Response Options
  • Techniques for Analysis
  • New Controls and Related Vulnerabilities
  • A Risk Action Plan
  • Techniques for BPR
  • Design and Implementation of Controls
  • Control Monitoring
  • Inherent and Residual Risk
  • Control Objectives Practices and Metrics
  • Cryptography as a Control
  • Control Design and Implementation
  • Emerging Technologies and Controls
  • Ownership of Controls
  • Management Procedures and Documentation
  • Response and Action Plan

Lesson 6

Test Review

  • Key Risk Indicators
  • Test Review
  • Test Registration
  • Test Preparation
  • Certification Maintenance

Anticipating the Future of Teaching and Learning

Influencing higher education teaching and learning, now and in the future.

Fun Facts

Happy Clients

Completed Projects

Office Locations

Team Members

Up Coming Courses

Our Trademarked
Process & Workflow.

Training and Capacity Building is an integral part in
modern education. It strongly exists to expand their
knowledge and expertise.

All these years, we have been successfully imparting knowledge to our clients in a single trust to make them more independent, resourceful and capable to attempt any issues.

Project Research

Professional development

Resources

Up to date with current issues

Expertise

Global panel of leaders

Development

Adaptive learning 

Study With Us

 The importance of professional development should not be underestimated – it is a career-long obligation for practicing professionals.

[formidable id=2]

CISA – Certified Information Systems Auditor

CISA – Certified Information Systems Auditor

Computational Thinking

Emerging Technologies

Strategy Development

Course Outline

Lesson 1

Testing-Taking Tips and Study Techniques

• Preparation for the CISA Exam
• Submitting Required Paperwork
• Resources and Study Aids
• Passing the Exam, the First Time

Lesson 2

The Audit Process

  • Risk 
  • Audit
  • Standards & Guidelines

Lesson 3

IT Governance

  • Best Practices
  • Management Practices
  • Roles & Responsibilities

Lesson 5

System Infrastructure Control

  • Auditing Application Controls
  • Application System Development
  • Business Application Systems

Lesson 4

Lifecycle Management

  • Project Management
  • Business Application Development
  • Information Systems Maintenance Practices

Lesson 6

Information Systems Hardware and Architecture

  • Information Systems Operations
  • Information Systems Hardware
  • SDLC
  • Databases

Anticipating the Future of Teaching and Learning

Influencing higher education teaching and learning, now and in the future.

Fun Facts

Happy Clients

Completed Projects

Office Locations

Team Members

Up Coming Courses

Our Trademarked
Process & Workflow.

Training and Capacity Building is an integral part in
modern education. It strongly exists to expand their
knowledge and expertise.

All these years, we have been successfully imparting knowledge to our clients in a single trust to make them more independent, resourceful and capable to attempt any issues.

Project Research

Professional development

Resources

Up to date with current issues

Expertise

Global panel of leaders

Development

Adaptive learning 

Study With Us

 The importance of professional development should not be underestimated – it is a career-long obligation for practicing professionals.

[formidable id=2]