cropped-Artboard-1.png

Captiva Solutions, Cybersecurity Manager (ISACA CISM Preparation)

This 5-day course exposes students to key areas relevant to security management found in all size organizations today; and helps prepare students for the ISACA CISM certification exam. It will provide you with a detailed understanding of information security governance, program development, risk management, and incident management, making it your first step towards becoming a strategic asset to countless organizations. CISM certified individuals are highly sought after in the industry as this certification is reflective of the holder’s expertise in a number of academic, technical, and career-based subjects. Participants will gain the knowledge and tools to protect an organization’s assets and develop information security strategies that align with its goals and objectives.

$699.00

Description

This 5-day course exposes students to key areas relevant to security management found in all size organizations today; and helps prepare students for the ISACA CISM certification exam. It will provide you with a detailed understanding of information security governance, program development, risk management, and incident management, making it your first step towards becoming a strategic asset to countless organizations. CISM certified individuals are highly sought after in the industry as this certification is reflective of the holder’s expertise in a number of academic, technical, and career-based subjects. Participants will gain the knowledge and tools to protect an organization’s assets and develop information security strategies that align with its goals and objectives.

Nullam quis risus eget urna mollis ornare vel eu leo. Aenean lacinia bibendum nulla sed 

Level 1

An organization must demonstrate basic cyber hygiene practices, such as ensuring employees change passwords regularly to protect Federal Contract Information (FCI). FCI is “information, not intended for public release, that is provided by or generated for the Government under a contract to develop or deliver a product or service to the Government.”

Level 2

An organization must have an institutionalized management plan to implement good cyber hygiene practices to safeguard CUI, including all the NIST 800-171 r2 security requirements and processes

Level 3 – Expert.

An organization must have standardized and optimized processes in place and additional enhanced practices that detect and respond to changing tactics, techniques and procedures (TTPs) of advanced persistent threats (APTs).

An APT is an adversary that possesses sophisticated levels of cyber expertise and significant resources to conduct attacks from multiple vectors. Capabilities include having resources to monitor, scan, and process data forensics.