Buy Now 200

Certified Information Security Management Practitioner (CISMP)

About Certification

GSDC's Certified Information Security Management Practitioner certification empowers you to handle the security management practices of an organization. The way all the technologies are working together to make an organization's workflow easy, it is also creating a goldmine for hackers and cybercriminals. Information Security Management Practitioners take care of vulnerabilities and potential information threats in order to stop it. Information Security typically involves preventing or at least reducing the probability of unauthorized/inappropriate access to data, or the unlawful use, disclosure, disruption, deletion, corruption, modification, inspection, recording or devaluation of information. It also involves actions intended to reduce the adverse impacts of such incidents. As a globally accredited qualification, Certified Information Security Management Practitioner provides a perfect starting point for those who want to get into Information Security management, or for those who want to progress within their present role.

Certification badge for Information Security Management Practitioner
 

Objectives

The objective of Certified Information Security Management Practitioner Certification is to share a deep understanding of:

  1. The benefits of Information Security Management
  2. The need for Information security management
  3. Information risk management
  4. Information Security organization and responsibilities, legal and regulatory obligations
  5. Policies, standards & procedures of delivering a balanced ISMS
  6. Security procedures of a balanced ISMS
  7. Information Security Governance, Policy reviews, security audits
  8. Security incident management
  9. Objectives and stages of incident management
  10. Information Security implementation
  11. Legal framework, Processing personal data, employment issues, computer misuse, intellectual property rights, Data Protection Act
  12. Security standards and procedures: ISO/IEC 27002 and ISO/IEC 15408
  13. Threats to, and vulnerabilities of, Information Systems

 

Target Audience

about-us

IT professionals

Professionals working in public sector

Business professionals who require a deeper understanding of information security as part of their wider business knowledge

 

Benefits

Few benefits of getting a Information Security Management Practitioner certification are:

Increasing demand for certified professionals in this field.

Organizational value

Flexibility in career choices.

Higher salary package.

Helps you to stay updated about the latest cybersecurity tools and trends.

Easy recognition of the designation anywhere across the world.

 

Pre-requisites

Certified Information Security Management Practitioner Certification demands no pre requisite as such.

 

Examination

Ensure that you have filled up the basic details.
This exam consists of 40 multiple-choice questions.
Candidates need to score a minimum of 65% of the total marks (i.e. 26 out of 40) to pass this examination.
The total duration of this examination is 90 minutes.
Candidate should Tick against only one correct answer in Multiple Choice Questions.
There is no negative marking system applicable to this examination.
In case the participant does not score passing % then they will be granted a 2nd attempt at no additional cost. Re-examination can be taken up to 30 days from the date of the 1st exam attempt.

 

Sample Certificate

 

Exam Syllabus

1. Introduction & Overview

  • Business interest of information security.
  • Customer perspective on governance.
  • Supplier's responsibilities in security assurance.
2. Information Security Governance
  • Challenges and opportunities of effectively governing an organization's information security requirements and resources.
  • Information security governance lays out the vision for the information security program.
  • Security governance, and the development of an effective information security strategy and policy.
  • how to improve information security accountability, regulatory compliance, and maturity
3. Risk Management
  • Principles of risk management.
  • Risk Control factors
  • Dealing with the remaining risks.
4.Developing a Security Strategy
  • How to develop an information security strategy
  • Factors affecting Information security strategy
  • Information security Management Responsibilities
5.Policies, Procedures, Standards & Guidelines
  • Introduction and Liability
  • Policy Basics
  • Policy Lifecycle
  • Best Practices and Guidelines

6.Information Security Technology

  • Introduction to information security technology
  • Trusted vs Untrusted technologies
  • VLANs
  • Information Encryptions
7.Incident Management
  • Overview of Information Security incident management
  • Incident management response lifecycle preparation
  • Intrusion detection technologies and systems
  • Security incident response
8. Business Continuity & Disaster Recovery
  • Introduction to business continuity planning and disaster recovery
  • Business continuity phases
  • Disaster recovery
  • Recovery strategies
9. Privacy & Data Protection Foundation
  • Privacy & Data Protection Fundamentals and Regulations
  • Organizing Data Protection
  • The practice of Data Protection


Download PDF

295 Turnpike Rd block 519, Westborough, MA 01581, USA
Hohenstieglen 6, 8152 Glattbrugg, Switzerland +41 41444851189
10 Anson Road #16-16 International Plaza, Singapore 079903