TRAINING ONLINE CERTIFIED INFORMATION SECURITY MANAGER

Table of Contents

TRAINING ONLINE CERTIFIED INFORMATION SECURITY MANAGER

TRAINING WEBINAR MANAJER KEAMANAN INFORMASI

TRAINING INFORMATION SECURITY UNTUK PRAKERJA

Description : pelatihan manajer keamanan informasi online

The  Certified  Information  Security  Manager®  (CISM®) certification
program is developed specifically for experienced information security
managers   and   those   who   have  information  security  management
responsibilities.  The  CISM  certification  is for the individual who
manages, designs, oversees and/or assesses an enterprise’s information
security (IS). The CISM certification promotes international practices
and  provides  executive  management with assurance that those earning
the  designation have the required experience and knowledge to provide
effective  security  management  and  consulting services. Individuals
earning  the  CISM certification become part of an elite peer network,
attaining  a  one-of-a-kind  credential.  The  CISM  job practice also
defines  a global job description for the information security manager
and  a  method  to  measure  existing staff or compare prospective new
hires.   The  course  contents  are  impregnated  by  standard  course
recognized by CISA ( Certified Information Security  Auditor)

Objectives : pelatihan information security online

The  course  has been designed to enhance the skill of participants in
the  area  of  security  management,  especially  in relation to their
day-to-day  operation  as  related to information security management.
The  training  shall  provide  the  participant   with  the  following
capabilities:
  1. Have thorough understanding on Common Body of Knowledge within the
     scope of  Information Security Management
  2. Enhanced  knowledge  and  skill  in  dealing  with the operational
     issues  as  related  to  information  security  within  day-to-day
     installation operation
  3. Enhanced the skill in the design, implement, manage, and asses the
     organization’s   IT security system by applying the Common Body of
     Knowledge in CISM
  4. Prepare individual competency for the CISM professional exam
  5. To  enhance  the skill of the participants in Information Secuity,
     and  escalate their  management  proficiency with broad managerial
     perspective  essential for their day-to-day IT security  operation
     and preparing the skill for IT security management  procedural set
     up.

Target Audience : pelatihan keamanan informasi online

   * Chief Information Security Officer (CISO)
   * Chief Information Officers (CIO)
   * Chief Technology Officers (CTO)
   * IS/IT Steering Committee
   * Audit Committee
   * IT Senior Manager
   * Information Security Manager
   * Senior Risk Manager
   * Senior Audit Manager
   * IT & Audit Staff
   * IT Security Staff
   * Risk Management Staff
   * Academic students

Course Contents and Descriptions
   * Information Security Governance
   * Information Risk Management
   * Information Security Program(me) Development
   * Information Security Program (me) Management
   * Information Security Management
   * Incident and Response Management
   * An information security steering group function

  * Legal  and  regulatory issues associated with Internet businesses,
     global transmissions and trans border data flows
   * Common insurance policies and imposed conditions
   * Information security process improvement
   * Recovery time objectives (RTO) for information resources
   * Cost   benefit   analysis  techniques  in  assessing  options  for
     mitigating risks threats and exposures to acceptable levels.
   * Security metrics design, development and implementation.
   * Information  security  management  due  diligence  activities  and
     reviews of the infrastructure.
   * Events affecting security baselines that may
   * The requirements for collecting and presenting evidence; rules for
     evidence,  admissibility  of evidence, quality and completeness of
     evidence.
   * External vulnerability reporting sources
   * The  key  components  of  cost  benefit  analysis  and  enterprise
     migration plans
   * Privacy and tax laws and tariffs, data import/export restrictions,
     restrictions  on  cryptography,  warranties,  patents, copyrights,
     trade secrets, national security
   * CISM information classification methods
   * Life-cycle-based risk management principles and practices.
   * Cost   benefit   analysis  techniques  in  assessing  options  for
     mitigating risks threats and exposures to acceptable levels.
   * Security  baselines and configuration management in the design and
     management of required risk assessment
   * Changes  to  information  security requirements in security plans,
     test plans and re-performance
   * Disaster recovery testing for infrastructure and critical business
     applications, business applications and the infrastructure
   * Acquisition management methods and techniques
   * Evaluation  of  vendor  service  level  agreements, preparation of
     contracts) CISM question and answer

 

Trainer : Bapak Arief Adinoto, S.E dan Tim

Jadwal pelatihan :

Batch 1 : 20 – 21 Januari 2026

Batch 2 : 10 – 11 Februari 2026

Batch 3 : 3 – 4 Maret 2026

Batch 4 : 14 – 15 April 2026

batch 5 : 19 – 20 Mei 2026

batch 6 : 24 – 25 Juni 2026

batch 7 : 8 – 9 Juli 2026

batch 8 : 19 – 20 Agustus 2026

batch 9 : 16 – 17 September 2026

batch 10 : 7 – 8 Oktober 2026

batch 11 : 18 – 19 November 2026

batch 12 : 9 – 10 Desember 2026

Pelatihan Terbaru
Tanyakan pada kami ?

Kami di sini untuk membantu Anda! Jangan ragu untuk menanyakan apapun kepada kami. Klik di bawah untuk memulai obrolan.

Marketing

Sales Marketing - Melisa

Online

Sales Marketing - Melisa

Hai, tanyakan pada kami ? 00.00