Kurser

Kursusadministration

Brug for hjælp?

  • Gregersensvej 8
  • 2630 Taastrup
Google MapsApple MapsRejseplanen
  • Forskerparken Fyn, Forskerparken 10F
  • 5230 Odense M
Google MapsApple MapsRejseplanen
  • Teknologiparken Kongsvang Allé 29
  • 8000 Aarhus C
Google MapsApple MapsRejseplanen
  • NordsøcentretPostboks 104
  • 9850Hirtshals
Google MapsApple MapsRejseplanen
  • Gammel Ålbovej 1
  • 6092Sønder Stenderup
Google MapsApple MapsRejseplanen
Cism_onlinekursus
Nyt
365 dages online kursus

Online kursus: Certified Information Security Manager (CISM)

Dette kursus ser på rollen af informationssikkerhed og styring i en organisation. På kurset lærer du om rollen som information security manager, og de tilhørende centrale principper. Kurserne er på engelsk og foregår online, når det passer dig. Du har adgang til online kursuspakken i 365 dage.

online kurser

Understand the framework of information security strategies

Information Security Governance is a major part of the job role of an Information Security Manager. This course looks at the importance of information security governance in an organization and the need for senior management support for all policies and procedures that are put in place. The goal of information security governance is to establish and maintain a framework to provide assurance that information security strategies are aligned with the business objectives and consistent with applicable laws and regulations.

Video

 

Target audience

For experienced IT security professionals seeking to gain knowledge in managing, designing, and overseeing an enterprise's information security.

Benefits

  • Learn how to identify the tasks within the information security governance job practice area
  • Learn how to identify the tasks within the information risk management
  • Get the right abilities to recognize the outcomes of information security governance
  • Recognize the difference between corporate governance and information security governance
  • Understand how analysis, mitigation, and monitoring play an particularly important role in information risk management and compliance
  • Get the knowledge to distinguish between policies, standards, procedures, and guidelines
  • Describe the tasks within Information Security Program Development and Management job practice area

Collection content

Information Security Governance (Part 1)
At this course, you learn to recognize key concepts related to information security governance.
Information Security Governance (Part 2)
This course focus on how to identify the elements of the information security business model. You will learn how to sequence the steps in planning a risk management program.
Information Security Governance (Part 3)
At this course, you strengthen your competencies to identify categories of key goal indicators and match common risk assessment methodologies with corresponding descriptions.
Information Risk Management and Compliance (Part 1)
This course details the recognition of key concepts related to information security management. You will learn how to associate steps in the risk management process with specific outcomes of an effective risk management program.
Information Risk Management and Compliance (Part 2)
This course is intended to help learners understand how to identify categories of key goal indicators. You will learn how to match roles in risk management program development with their corresponding responsibilities.
Information Security Program Development and Management (Part 1)
You will learn how to define the purpose of the Information Security Program Development and Management domain. This course looks at the identification of the optimal reporting relationship between senior management and the information security manager.
Information Security Program Development and Management (Part 2)
At this course, you learn how to recognize the interconnections between the elements of the information security business model.
Information Security Program Development and Management (Part 3)
This course examines how to label examples of reports about information security according to their intended recipients within an organization.
Information Security Program Development and Management (Part 4)
At this course, you learn how to identify the goal of converging security-related functions.
Information Security Program Development and Management (Part 5)
The course looks at information security governance in order to establish and maintain a framework to provide assurance with information security strategies.
Information Security Incident Management (Part 1)
This course looks at the importance of information security governance in an organization, and how to recognize methods for recovering communication and computing systems.
Information Security Incident Management (Part 2)
Durind the course, you gain knowledge in managing, designing, and overseeing an enterprise's information security.

Tidsforbrug

Kursuspakken består af 12 kurser, hvor hvert kursus gennemsnitligt varer to timer. Hele kursuspakken kan således gennemføres på ca. 24 timer.

Form

Denne online kursuspakke består af flere forskellige kurser, som du ved tilmelding har adgang til i 365 dage. Hvert enkelt kursus er opdelt i flere kursusmoduler, som du via en oversigtsmenu kan tage i den rækkefølge, du ønsker. Modulerne indeholder lyd, billeder og tekst, der gennemgår kursusindholdet. Nogle moduler indeholder små videofilm med scenarier og cases. Ved hvert kursus har du mulighed for at teste din forståelse af indholdet med tests, som du kan tage både før, under og efter kurset. Du gennemfører kursusmodulerne via din computer eller tablet med lyd og adgang til Internettet. Du kan selv styre, hvornår du vil tage modulerne – og de kan sættes på pause undervejs.

Læs mere om vores online kurser og se svar på dine spørgsmål (FAQ)

Certificering

Kurset leder hen mod certificeringen Certified Information Security Manager (CISM). Eksamen bestilles og betales særskilt. Kontakt www.isaca.org for flere informationer. Vi henviser til certificeringsudbyderens hjemmeside for nærmere information om aktuelle betingelser for at opnå certificering. I forbindelse med nogle certificeringer skal du selv oprette dig på udbyderens hjemmeside for at få adgang til eksamen. Vær venligst opmærksom på, at der er overensstemmelse mellem den certificeringsversion, du har forberedt dig på og den version, du bestiller eksamen i. Læs mere om IT-certificering.


Søgte du et andet online kursus?

Vi tilbyder over 7.000 forskellige online kurser inden for mange forskellige områder. Kontakt os på tlf. 72203000 eller kurser@teknologisk.dk, så vi kan hjælpe med at imødekomme dit behov.

Se desuden listen over vores udvalgte online kurser.

Køb online kurser til flere

Er I en afdeling, en hel virksomhed eller blot flere personer, der ønsker adgang til online kurser, så kontakt os og få et tilbud på tlf. 72203000 eller kurser@teknologisk.dk

Andre kurser