Certified Information Security Manager (CISM) adalah sertifikasi global yang berfokus pada tata kelola keamanan informasi, manajemen risiko, serta pengembangan dan pengelolaan program keamanan informasi. Sertifikasi ini sangat relevan bagi para profesional yang ingin meningkatkan keterampilan dalam strategi keamanan informasi, manajemen risiko, dan tata kelola organisasi. Permintaan profesional dengan sertifikasi CISM meningkat secara signifikan, terutama dalam sektor keuangan dan teknologi (Brown, 2022).
Training CISM Exam Guide ini dirancang untuk membantu peserta memahami konsep inti dalam Enterprise Governance, Information Security Strategy, Risk Assessment, Program Management, dan Incident Management. Peserta akan mempelajari standar dan framework keamanan informasi yang digunakan dalam industri, strategi pengelolaan risiko, serta metodologi pengembangan program keamanan informasi (Mitchell, 2023). Selain itu, peserta juga akan memahami proses business continuity planning (BCP), disaster recovery planning (DRP), serta investigasi dan mitigasi insiden keamanan.
Pelatihan ini mengadopsi pendekatan berbasis studi kasus dan latihan soal ujian, sehingga peserta dapat memahami bagaimana menerapkan konsep keamanan informasi dalam lingkungan bisnis yang kompleks. Dengan pendekatan berbasis praktik, peserta akan mendapatkan wawasan mendalam mengenai strategi keamanan informasi serta persiapan yang efektif untuk menghadapi ujian sertifikasi CISM.
OBJECTIVES
1. Memahami prinsip dasar Enterprise Governance dalam keamanan informasi
2. Mengembangkan strategi keamanan informasi berbasis Information Governance Frameworks dan Standards
3. Melakukan Risk Assessment dan Analysis untuk mengidentifikasi ancaman dan kelemahan sistem
4. Mengimplementasikan dan mengelola Information Security Program yang efektif
5. Menyusun dan mengelola Business Continuity Plan (BCP) dan Disaster Recovery Plan (DRP)
6. Mengembangkan Incident Response Plan untuk menangani insiden keamanan informasi
7. Mempersiapkan diri secara optimal untuk menghadapi ujian sertifikasi CISM
AUDIENCE
1. IT Security Manager
2. Risk and Compliance Officer
3. Information Security Officer
4. IT Governance Professional
5. Cybersecurity Analyst
6. IT Auditor
PREREQUISITES
Tidak ada training khusus yang dipersyaratkan
CONTENT
1. Enterprise Governance
1.1 Introduction to Information Security Governance
1.2 Organizational Culture
1.3 Legal, Regulatory, and Contractual Requirements
1.4 Organizational Structure, Roles, and Responsibilities
2. Information Security Strategy
2.1 Information Security Strategy Development
2.2 Information Governance Frameworks and Standards
2.3 Strategic Planning
3. Information Security Risk Assessment
3.1 Emerging Risk and Threat Landscape
3.2 Vulnerability and Control Deficiency Analysis
3.3 Risk Assessment and Analysis
4. Information Security Risk Response
4.1 Risk Treatment / Risk Response Options
4.2 Risk and Control Ownership
4.3 Risk Monitoring and Reporting
5. Information Security Program Development
5.1 Information Security Program Resources
5.2 Information Asset Identification and Classification
5.3 Industry Standards and Frameworks for Information Security
5.4 Information Security Policies, Procedures, and Guidelines
5.5 Information Security Program Metrics
6. Information Security Program Management
6.1 Information Security Control Design and Selection
6.2 Information Security Control Implementation and Integrations
6.3 Information Security Control testing and Evaluation
6.4 Information Security Awareness and training
6.5 Management of External Services
6.6 Information Security Program Communications and Reporting
6.7 IT Service Management
6.8 Continuous Improvement
7. Incident Management Readiness
7.1 Incident Response Plan
7.2 Business Impact Analysis
7.3 Business Continuity Plan (BCP)
7.4 Disaster Recovery Plan (DRP)
7.5 Incident Classification/Categorization
7.6 Incident Management training, testing, and Evaluation
8. Incident Management Operations
8.1 Incident Management Tools and Techniques
8.2 Incident Investigation and Evaluation
8.3 Incident Containment Methods
8.4 Incident Response Communications
8.5 Incident Eradication, and Recovery
8.6 Post-incident Review Practices
Course Features
- Lectures 0
- Quizzes 0
- Duration 32 hours
- Skill level All levels
- Language English
- Students 0
- Certificate No
- Assessments Yes