Close

Search for a Glomacs Course by Keywords

Course Schedule
Classroom Sessions:
DateVenueFees
28 Apr - 02 May 2025 Dubai - UAE $5,950
01 - 05 Dec 2025 London - UK $5,950
Course Description

INTRODUCTION

This training course will help prepare you for the CISMP examination, a crucial step towards earning your certification. You’ll develop the skills and confidence needed to excel in the field of information security management. This training course is designed for IT professionals seeking to enhance their knowledge and skills in information security management.

 The CISMP certification is widely recognized in the industry and provides a solid foundation for those looking to advance their careers in information security. This Glomacs CISMP exam preparation training course is developed from the official exam syllabus and will be taught by an instructor who has successfully taken and passed the official British Computer Society’s (BCS) Certificate in Information Security Management Principles exam.

 This GLOMACS Certificate in Information Security Management Principles (CISMP) Exam Preparation training course will highlight:

  • Information security management principles
  • Risk assessment and management
  • Legal and regulatory compliance
  • Security architecture and models
  • Cryptography and secure communications
  • Business continuity and disaster recovery
  • Human aspects of security
  • Physical and environmental security

Objectives

This training course is developed to help you prepare for the British Computer Society’s (BCS) CISMP exam and follows the official exam syllabus.

At the end of this training course, you will learn to:

  • Understand the fundamental concepts and principles of information security management.
  • Identify and assess information security risks within an organizational context.
  • Demonstrate knowledge of legal, regulatory, and ethical issues related to information security.
  • Explain the importance of information security governance and how it fits into broader organizational governance.
  • Describe various technical controls and their role in protecting information assets.
  • Understand the principles of business continuity management and disaster recovery planning.
  • Explain the significance of human factors in information security and strategies for promoting security awareness.
  • Outline the key elements of information security policies and procedures.

Training Methodology

Training will be provided through a combination of lectures, discussions, practical exercises, and case studies, you'll develop the skills and confidence needed to excel in the field of information security management.

Organisational Impact

In today's digital landscape, where cyber threats are constantly evolving and data breaches can have devastating consequences, the role of information security professionals has become more crucial than ever. This training course addresses the growing need for skilled professionals who can effectively manage and protect your organization’s information assets.

The Organisation will have the following benefits.

  • Results in a more robust overall security strategy for the organization
  • Reduced risk of non-compliance and associated penalties
  • Demonstrates commitment to information security to clients and partners
  • Can lead to improved employee retention rates
  • Cost-Effective Security Management
  • Enhances the organization's resilience to cyber threats
  • Employees learn to align security with business objectives
  • Can improve overall business performance

Personal Impact

At the end of this training course, the participants will gain the following.

  • Knowledge of the concepts relating to information security management.
  • Understanding of current national legislation and regulations which impact upon information security management.
  • Awareness of current national and international standards, frameworks and organisations which facilitate the management of information security. 
  • Understanding of the current business and common technical environments in which information security management must operate.
  • Knowledge of the categorisation, operation and effectiveness of controls of different types and characteristics.
  • Specifically designed to prepare you for the BCS CISMP examination

WHO SHOULD ATTEND?

Whether you're new to information security or looking to formalize your existing knowledge, the BCS CISMP exam preparation training course provides a comprehensive foundation that will serve you throughout your career in this dynamic and critical domain.

The GLOMACS Certificate in Information Security Management Principles (CISMP) Exam Preparation training course is suitable to a wide range of professionals but will greatly benefit:

  • Those currently working in IT security roles looking to formalize their knowledge
  • Individuals seeking to advance their careers in information security management
  • IT managers who need a comprehensive understanding of security principles
  • Professionals responsible for ensuring regulatory compliance
  • Risk managers seeking to better understand information security risks
Course Outline

Day 1

Information security management principles

  • Definitions, meanings and use of concepts and terms across information security management
  • The need for, and the benefits of information security

 Information risk

  • The threats to and vulnerabilities of information systems
  • The processes for understanding and managing risk relating to information systems
  • The threats to and vulnerabilities of information systems
  • The processes for understanding and managing risk relating to information systems

Day 2

Information security framework

  • How risk management should be implemented in an organisation
  • General principles of law, legal jurisdiction and associated topics as they affect information security management
  • The importance and relevance of the information lifecycle
  • The stages of the information lifecycle.
  • Concepts of the design process lifecycle
  • Technical audit and review processes, effective change control and configuration management
  • The risks to security brought about by systems development and support

Day 3

Procedural/People Security Controls

  • The risks to information security involving people
  • User access controls that may be used to manage those risks
  • The importance of appropriate training

Day 4

Technical security controls

  • The technical controls that can be used to help ensure protection from malicious software
  • Issues relating to value-added services
  • Issues relating to organisations that utilise cloud computing
  • Issues relating to information systems

Disaster Recovery and Business continuity

  • The differences between and the need for business continuity and disaster recovery.

Day 5

Other security aspects

  • The principles and common practices, including any legal constraints and obligations, of investigations and forensics
  • The role of cryptography in protecting systems and assets, including awareness of the relevant standards and practices
Certificates
  • On successful completion of this training course, GLOMACS Certificate will be awarded to the delegates
  • Continuing Professional Education credits (CPE) : In accordance with the standards of the National Registry of CPE Sponsor, one CPE credit is granted per 50 minutes of attendance
Providers and Associations

Endorsed Education Provider

  • Quality Logo

GLOMACS is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website: www.NASBARegistry.org

In Association With

Oxford Management Centre

Oxford Management Centre

A GLOMACS - Oxford Management Centre collaboration aimed at providing the best training services and benefits to our valued clients.

Visit website

Options & Brochure
Related Categories

GLOMACS Training & Consultancy
Typically replies within an hour

Olivia
Hi there 👋
My name is Olivia. Please tell me how I can assist you..
1:40
×