TRAINING ONLINE CERTIFIED INFORMATION SECURITY MANAGER
TRAINING WEBINAR MANAJER KEAMANAN INFORMASI
TRAINING INFORMATION SECURITY UNTUK PRAKERJA
Description : pelatihan manajer keamanan informasi online
The Certified Information Security Manager® (CISM®) certification
program is developed specifically for experienced information security
managers and those who have information security management
responsibilities. The CISM certification is for the individual who
manages, designs, oversees and/or assesses an enterprise’s information
security (IS). The CISM certification promotes international practices
and provides executive management with assurance that those earning
the designation have the required experience and knowledge to provide
effective security management and consulting services. Individuals
earning the CISM certification become part of an elite peer network,
attaining a one-of-a-kind credential. The CISM job practice also
defines a global job description for the information security manager
and a method to measure existing staff or compare prospective new
hires. The course contents are impregnated by standard course
recognized by CISA ( Certified Information Security Auditor)
Objectives : pelatihan information security online
The course has been designed to enhance the skill of participants in
the area of security management, especially in relation to their
day-to-day operation as related to information security management.
The training shall provide the participant with the following
capabilities:
1. Have thorough understanding on Common Body of Knowledge within the
scope of Information Security Management
2. Enhanced knowledge and skill in dealing with the operational
issues as related to information security within day-to-day
installation operation
3. Enhanced the skill in the design, implement, manage, and asses the
organization’s IT security system by applying the Common Body of
Knowledge in CISM
4. Prepare individual competency for the CISM professional exam
5. To enhance the skill of the participants in Information Secuity,
and escalate their management proficiency with broad managerial
perspective essential for their day-to-day IT security operation
and preparing the skill for IT security management procedural set
up.
Target Audience : pelatihan keamanan informasi online
* Chief Information Security Officer (CISO)
* Chief Information Officers (CIO)
* Chief Technology Officers (CTO)
* IS/IT Steering Committee
* Audit Committee
* IT Senior Manager
* Information Security Manager
* Senior Risk Manager
* Senior Audit Manager
* IT & Audit Staff
* IT Security Staff
* Risk Management Staff
* Academic students
Course Contents and Descriptions
* Information Security Governance
* Information Risk Management
* Information Security Program(me) Development
* Information Security Program (me) Management
* Information Security Management
* Incident and Response Management
* An information security steering group function
* Legal and regulatory issues associated with Internet businesses,
global transmissions and trans border data flows
* Common insurance policies and imposed conditions
* Information security process improvement
* Recovery time objectives (RTO) for information resources
* Cost benefit analysis techniques in assessing options for
mitigating risks threats and exposures to acceptable levels.
* Security metrics design, development and implementation.
* Information security management due diligence activities and
reviews of the infrastructure.
* Events affecting security baselines that may
* The requirements for collecting and presenting evidence; rules for
evidence, admissibility of evidence, quality and completeness of
evidence.
* External vulnerability reporting sources
* The key components of cost benefit analysis and enterprise
migration plans
* Privacy and tax laws and tariffs, data import/export restrictions,
restrictions on cryptography, warranties, patents, copyrights,
trade secrets, national security
* CISM information classification methods
* Life-cycle-based risk management principles and practices.
* Cost benefit analysis techniques in assessing options for
mitigating risks threats and exposures to acceptable levels.
* Security baselines and configuration management in the design and
management of required risk assessment
* Changes to information security requirements in security plans,
test plans and re-performance
* Disaster recovery testing for infrastructure and critical business
applications, business applications and the infrastructure
* Acquisition management methods and techniques
* Evaluation of vendor service level agreements, preparation of
contracts) CISM question and answer
Trainer : Bapak Arief Adinoto, S.E dan Tim
Jadwal pelatihan :
Batch 1 : 20 – 21 Januari 2026
Batch 2 : 10 – 11 Februari 2026
Batch 3 : 3 – 4 Maret 2026
Batch 4 : 14 – 15 April 2026
batch 5 : 19 – 20 Mei 2026
batch 6 : 24 – 25 Juni 2026
batch 7 : 8 – 9 Juli 2026
batch 8 : 19 – 20 Agustus 2026
batch 9 : 16 – 17 September 2026
batch 10 : 7 – 8 Oktober 2026
batch 11 : 18 – 19 November 2026
batch 12 : 9 – 10 Desember 2026
–
–
–









