• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

38 Certified Information Security Manager (CISM) courses delivered Live Online

🔥 Limited Time Offer 🔥

Get a 10% discount on your first order when you use this promo code at checkout: MAY24BAN3X

Certified Software Asset Manager (CSAM)

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for It is essential information for beginning IT Asset Managers and other IT professionals involved in asset management, resource budgeting, finance, software licensing, contract management and strategic planning. Overview During this course, students learn best practices in Software Asset Management Reducing Risk Increasing Accountability Uncovering Savings Gaining Control of the IT Environment The IAITAM Certified Software Asset Manager (CSAM) Course is a foundational education program that ensures students are able to manage software assets. Students also learn about the ever-changing variables throughout our industry. From software piracy and compliance issues to legislation and organizational challenges, it is necessary to evaluate both the internal and external influences that bring about change in how organizations manage their IT assets. A successful Software Asset Manager must look at the overall goals of the organization and determine where Software Asset Management will be a strategic influence in achieving those goals. This course also includes the exam for CSAM certification. COURSE OUTLINE * The Scope of Software * Strategic License Management * Software Harvesting * License Documentation * The Right to Audit * Proactive vs. Reactive SAM * Developing Goals * Savings Opportunities * ITAM Compliance * Audit Letter * Examples of License Data Documentation * Compliance Enforcement * Understanding the EULA * Due Diligence for Compliance * The Art of Negotiation * Ts & Cs Advice * ITAM Automation * Selecting a Discovery Tool * ITAM Repository * Hardware & Organizational Impacts ADDITIONAL COURSE DETAILS: Nexus Humans Certified Software Asset Manager (CSAM) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Software Asset Manager (CSAM) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Certified Software Asset Manager (CSAM)
Delivered on-request, onlineDelivered Online
Price on Enquiry

Certified Mobile Asset Management (CMAM)

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for those persons who will implement, manage and direct mobile asset Initiatives for their organizations. Overview The CMAM course prepares students to implement a foundation of best practice policies and processes whereby mobile assets are controlled. This should lead to savings opportunities, risk mitigation surrounding BYOD and financial responsibility. Students will be able to incorporate mobile asset management and BYOD into their environment, policies and procedures to mitigate risk, increase productivity of employees, and bring value from the mobile asset management program. The IAITAM Certified Mobile Asset Manager (CMAM) course prepares individuals and organizations responsible for the management of mobile devices. Proliferation of mobile devices within the enterprise, whether corporate-owned or BYOD-based, has brought a complexity to ITAM never before seen in IT environments. The course will prepare individuals with the knowledge to manage personnel, policies and processes, the key elements in organizational IT management. This course encompasses both organizational owned assets as well as BYOD (employee-owned). The CMAM course has the IAITAM Best Practice Library as its foundation and encompasses financial viability, risk mitigation, policy enforcement and lifecycle management of mobile assets. COURSE OUTLINE * Mobile Asset Management and ITAM * People & Mobile Assets * Bring Your Own Device (BYOD) * Tools * Repository Management Assessment * The 12 KPAs and Mobile Asset Management * Program Management & Mobility * Policy Management & Mobility * Communication & Education Management & Mobility * Education & Mobility * Acquisition Management & Mobility * Asset Identification Management & Mobility * Legislation & Compliance Management & Mobility * Software & Application Licensing * Disposal Management & Mobility * Documentation Management & Mobility * Financial Management & Mobility * Vendor Management & Mobility * Data Protection

Certified Mobile Asset Management (CMAM)
Delivered on-request, onlineDelivered Online
Price on Enquiry

EC-Council Certified CISO (C|CISO) w/exam

By Nexus Human

Duration 4.375 Days 26.25 CPD hours This course is intended for CCISOs are certified in the knowledge of and experience in the following CISO Domains:Governance (Policy, Legal & Compliance)IS Management Controls and Auditing Management (Projects, Technology & Operations)Management ? Projects and OperationsInformation Security Core CompetenciesStrategic Planning & Finance Overview Please refer to Overview. The Certified CISO (C|CISO) course has certified leading information security professionals around the world and is the first of its kind training and certification program aimed at producing top-level Information Security Leaders. The CCISO does not focus solely on technical knowledge but on the application of information security management principles from an executive management point of view. The program was developed by seasoned CISOs for current and aspiring CISOs. GOVERNANCE * Drivers that Influence Governance * Corporate Governance Activities * Information Security Governance Activities * Governance and Ethical Decision Making SECURITY RISK MANAGEMENT, CONTROLS, AND AUDIT MANAGEMENT * Risk Management * Audit Management * Risk Treatment * Risk Management Frameworks * Risk Communication and Organizational Reporting SECURITY PROGRAM MANAGEMENT AND OPERATIONS * Information Security Portfolio Management * Information Security Program Management * Information Security Project Management * Security Operations INFORMATION SECURITY CORE COMPETENCIES * Access Control * Physical Security * Network and Communications Security * Threat and Vulnerability Management * System and Application Security * Encryption Concepts and Technology STRATEGIC PLANNING, FINANCIAL MANAGEMENT, AND VENDOR MANAGEMENT * Strategic Planning * Financial Management * Vendor Risk Management ADDITIONAL COURSE DETAILS: Nexus Humans EC-Council Certified CISO (C|CISO) w/exam training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified CISO (C|CISO) w/exam course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified CISO (C|CISO) w/exam
Delivered on-request, onlineDelivered Online
Price on Enquiry

Cybersecurity Maturity Model Certification (CMMC): Certified Professional

By Nexus Human

Duration 4.375 Days 26.25 CPD hours This course is intended for This course provides a jump start on learning material that relates to the CMMC program, and to the planned Certified Professional (CP) certification in particular. It discusses the CMMC program, the current CMMC Model, and other CMMC materials as they exist today. The course may be of interest to individuals who wish to pursue the CMMC-CP certification when it is released. It may also be useful to stakeholders in organizations who will be involved in CMMC assessments, and who wish to gain a general understanding of the program and its requirements for their business planning purposes Overview In this course, you will examine the current CMMC model (Version 1.02), framework, context, and application within the DoD, as well as the expectations and requirements that will be imposed upon organizations that do business with the DoD. It will also help you to identify threats to cybersecurity and privacy within an IoT ecosystem and implement appropriate countermeasures. You will gain the skills to: · Identify risks within the defense supply chain and the established standards for managing them. · Describe how the CMMC model ensures compliance with federal acquisition regulations. · Identify responsibilities of the CMMC Certified Professional, including appropriate ethics and behavior. · Identify regulated information and establish the Certification and Assessment scope boundaries for evaluating the systems that protect that regulated information. · Evaluate OSC readiness and determine the objective evidence you intend to present to the assessor. · Use the NIST 800-171A and CMMC Assessment Guide to assess objective evidence for processes and practices. · Implement and evaluate practices required to meet CMMC maturity level 1. · Implement and evaluate processes and practices required to meet CMMC maturity level 2. · Implement and evaluate processes and practices required to meet CMMC maturity level 3. · Identify processes and practices required to meet CMMC maturity levels 4 and 5. · Work through the logistics of a CMMC assessment, including planning for and conducting the assessment, as well as any follow-up processes, such as remediation and adjudication. The Cybersecurity Maturity Model Certification (CMMC), managed by the CMMC Accreditation Body (CMMC-AB), is a program through which an organization's cybersecurity program is measured by their initial and ongoing compliance with applicable cybersecurity practices as well as their integration of corresponding policies and plans into their overall business operations. By Fiscal Year 2026, all organizations providing products or services to the United States Department of Defense (DoD) must obtain at least a Maturity Level 1 certification under this program. MANAGING RISK WITHIN THE DEFENSE SUPPLY CHAIN * Topic A: Identify Threats to the Defense Supply Chain * Topic B: Identify Regulatory Responses Against Threats * ENSURING COMPLIANCE THROUGH CMMC * Topic A: Identify Limitations of Self-Certification * Topic B: Identify Benefits of CMMC * Topic C: Describe the CMMC Model Architecture * PERFORMING THE GENERAL RESPONSIBILITIES OF A CMMC CP * Topic A: Identify Responsibilities of the CMMC CP * Topic B: Demonstrate Appropriate Ethics and Behavior * IDENTIFYING AND SCOPING REGULATED INFORMATION * Topic A: Identify Regulated Information * Topic B: Establish the Certification and Assessment Scope Boundaries * INITIATING THE ASSESSMENT PROCESS * Topic A: Evaluate Readiness * Topic B: Determine Objective Evidence * ASSESSING OBJECTIVE EVIDENCE * Topic A: Assess the Practices Using the CMMC Assessment Guides * Topic B: Assess the Processes Using the CMMC Assessment Guide Level 3 * IMPLEMENTING AND EVALUATING CMMC LEVEL 1 * TTopic A: Maturity Level 1 Domains and Practices * Topic B: Determine Scope Boundaries at Maturity Level 1 * Topic C: Perform a Maturity Level 1 Gap Analysis * Topic D: Perform a Maturity Level 1 Evidence Validation * IMPLEMENTING AND EVALUATING CMMC LEVELS 2 AND 3 * Topic A: Process Maturity Requirements for CMMC Levels 2 and 3 * Topic B: Maturity Level 2 Practices * Topic C: Maturity Level 3 Practices * IDENTIFYING CMMC LEVELS 4 AND 5 * Topic A: Maturity Level 4 Processes and Practices * Topic B: Maturity Level 5 Processes and Practices * WORKING THROUGH A CMMC ASSESSMENT * Topic A: Define the Assessment Logistics * Topic B: Resolve Assessment Related Issues * Appendix A: Additional Documentation the CP Should Study *

Cybersecurity Maturity Model Certification (CMMC): Certified Professional
Delivered on-request, onlineDelivered Online
Price on Enquiry

CMMC: Organizational Foundations v2.2

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course provides an immersive learning experience for business and technical professionals who need a thorough understanding of the CMMC program. It does this by taking the point of view of a CMMC Certified Professional. Students might consider taking this course to learn more about the overall CMMC program, how DoD contractors are assessed, and how to help their organizations prepare for a CMMC Assessment. Overview In this course, you will learn about the CMMC Model, framework, context, and application within the DoD, as well as the expectations and requirements imposed upon organizations that do business with the DoD. You will: Identify the threats to the Defense Supply Chain and the established regulations and standards for managing the risk. Identify the sensitive information that needs to be protected within the Defense Supply Chain and how to manage it. Describe how the CMMC Model ensures compliance with federal acquisitions regulations. Identify responsibilities of the Certified CMMC Professional, including appropriate ethical behavior. Establish the Certification and Assessment scope boundaries for evaluating the systems that protect regulated information. Prepare the OSC for an Assessment by evaluating readiness. Use the CMMC Assessment Guides to determine and assess the Evidence for practices. Implement and evaluate practices required to meet CMMC Level 1. Identify the practices required to meet CMMC Level 2. Work through the CMMC Assessment process. The Cybersecurity Maturity Model Certification (CMMC), managed by The Cyber AB (formerly known as the CMMC Accreditation Body or the CMMC-AB), is a program through which an organization's cybersecurity program maturity is measured by their initial and ongoing compliance with applicable cybersecurity practices, as well as their integration of corresponding policies and plans into their overall business operations. Once rule-making has concluded and CMMC 2.0 has been implemented, all organizations providing products or services to the United States Department of Defense (DoD) must comply with the requirements of their applicable CMMC Level. This course provides a complete review of the key elements of this important program. LESSON 1: MANAGING RISK WITHIN THE DEFENSE SUPPLY CHAIN * Topic A: Identify Threats to the Defense Supply Chain * Topic B: Identify Regulatory Responses against Threats LESSON 2: HANDLING SENSITIVE INFORMATION * Topic A: Identify Sensitive Information * Topic B: Manage the Sensitive Information LESSON 3: ENSURING COMPLIANCE THROUGH CMMC * Topic A: Describe the CMMC Model Architecture * Topic B: Define the CMMC Program and Its Ecosystem * Topic C: Define Self-Assessments LESSON 4: PERFORMING CCP RESPONSIBILITIES * Topic A: Identify Responsibilities of the CCP * Topic B: Demonstrate Appropriate Ethics and Behavior LESSON 5: SCOPING CERTIFICATION AND ASSESSMENT BOUNDARIES * Topic A: Use the CMMC Assessment Scope Documentation * Topic B: Get Oriented to the OSC Environment * Topic C: Determine How Sensitive Information Moves * Topic D: Identify Systems in Scope * Topic E: Limit Scope LESSON 6: PREPARING THE OSC * Topic A: Foster a Mature Cybersecurity Culture * Topic B: Evaluate Readiness LESSON 7: DETERMINING AND ASSESSING EVIDENCE * Topic A: Determine Evidence * Topic B: Assess the Practices Using the CMMC Assessment Guides LESSON 8: IMPLEMENTING AND EVALUATING LEVEL 1 * Topic A: Identify CMMC Level 1 Domains and Practices * Topic B: Perform a CMMC Level 1 Gap Analysis * Topic C: Assess CMMC Level 1 Practices LESSON 9: IDENTIFYING LEVEL 2 PRACTICES * Topic A: Identify CMMC Level 2 Practices LESSON 10: WORKING THROUGH AN ASSESSMENT * Topic A: Identify Assessment Roles and Responsibilities * Topic B: Plan and Prepare the Assessment * Topic C: Conduct the Assessment * Topic D: Report the Assessment Results * Topic E: Conduct the CMMC POA&M Close-Out Assessment

CMMC: Organizational Foundations v2.2
Delivered on-request, onlineDelivered Online
Price on Enquiry

CMMC for Business Professionals: A Practical Guide to Getting Ready for CMMC

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course provides an introductory overview of the CMMC program for organizational decision makers. Business and IT leaders and IT staff might consider taking this course to learn about the CMMC Model to get a sense of what's required for a successful assessment, and the various ways they can start preparing. Overview In this course, you will identify the key elements and potential impacts of the Cybersecurity Maturity Model Certification (CMMC) program. You will: Identify the crucial elements that are driving the CMMC initiative. Describe the architecture of the CMMC Model and the rationale behind it. Prepare your organization for a successful CMMC Assessment. Identify the roles and responsibilities in the CMMC ecosystem and describe the phases of an Assessment. The Cybersecurity Maturity Model Certification (CMMC), managed by The Cyber AB (formerly known as the CMMC Accreditation Body or the CMMC-AB), is a program through which an organization's cybersecurity program maturity is measured by their initial and ongoing compliance with applicable cybersecurity practices. This course provides a complete review of the key elements of this important program and will entitle you to a CMMC Trailblazer badge.Important: This curriculum product is not considered CMMC-AB Approved Training Material (CATM). This course is not intended as certification preparation and does not qualify students to sit for the CMMC CP certification exam. IDENTIFYING WHAT'S AT STAKE * Topic A: Identify the Threats and Regulatory Responses * Topic B: Identify Sensitive Information DESCRIBING CMMC * Topic A: Describe the CMMC Model Architecture * Topic B: Describe the CMMC Program GETTING READY FOR A CMMC ASSESSMENT * Topic A: Scope Your Environment * Topic B: Analyze the CMMC Assessment Guides * Topic C: Foster a Mature Cybersecurity Culture * Topic D: Identify Helpful Documents * Topic E: Evaluate Your Readiness INTERACTING WITH THE CMMC ECOSYSTEM * Topic A: Identify the CMMC Ecosystem * Topic B: Describe a CMMC Assessment

CMMC for Business Professionals: A Practical Guide to Getting Ready for CMMC
Delivered on-request, onlineDelivered Online
Price on Enquiry

Certified Asset Management Security Expert (CAMSE)

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for IT Asset Managers and other professionals involved in Asset Management, strategic planning, security programs and those affected or influenced by ITAM and security initiatives. The mission of IAITAM?s CAMSE course is to maximize the contribution of IT Asset Management professionals to the information security and physical security of the organization by bridging the gap between ITAM and IT security processes while incorporating security strategies throughout the ITAM policies, processes and procedures so that ITAM enhances the security program and improves the applicable governance. This course includes the comprehensive online examination necessary for achieving CAMSE Certification. COURSE OUTLINE * Scope of IT Security & ITAM * Threat Prevention vs. Threat Protection * Decentralized vs. Centralized Security * The IT Security Plan * ITAM?s Role in Risk Management * The 12 KPAs & Security * Program Management & Security * Communication & Education Management & Security * Policy Management & Security * Acquisition Management & Security * Asset Identification Management & Security * Disposal Management & Security * Project Management & Security * Documentation Management & Security * Financial Management & Security * Legislation Management & Security * Compliance Management & Security * Vendor Management & Security * Assessing Asset Risk Level * Program Issues by Asset Type * ITAM Program Assessment for Security

Certified Asset Management Security Expert (CAMSE)
Delivered on-request, onlineDelivered Online
Price on Enquiry

C)SLO-Certified Security Leadership Officer Mile 2

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for C - Level Managers IT Managers Cyber Security Personelle Engineers Information Systems Owners ISSO's CISSP Students ISO's Overview Upon completion, the Certified Security Leadership Officer candidate  be able to competently take the C)SLO exam.  You will be versed in implementing strong security controls and managing an organization with an industry acceptable security posture. Certified Security Leadership Officerÿ course is designed for mid and upper-level managers.ÿ If you are an engineer, this course will increase your knowledge in the leading information system security teams. Plus, the C)SLO will give you an essential understanding of current security issues, best practices, and technology. With this knowledge you will then be prepared to manage the security component of an information technology project. As a Security Leadership Officer, you will be the bridge between cybersecurity and business operations. COURSE OUTLINE * Security Management * Risk Management * Encryption * Information Security Access Control Concepts * Incident Handling and Evidence * Operations Security * Network Security ADDITIONAL COURSE DETAILS: Nexus Humans C)SLO-Certified Security Leadership Officer Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)SLO-Certified Security Leadership Officer Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

C)SLO-Certified Security Leadership Officer Mile 2
Delivered on-request, onlineDelivered Online
Price on Enquiry

Educators matching "Certified Information Security Manager (CISM)"

Show all 62
Net Security Training

net security training

3.7(6)

London

Net Security Training is an independent specialist Cyber Security training company whose total focus is the provision of specialised courses and appreticeships catering for Cyber Security and Information Assurance professionals. CyberSecurity, IT Security, Information Risk Management, Compliance and Governance training are the cornerstone of our course offerings. We have invested heavily in establishing our credentials by working with the very best certification and examination bodies. We are approved and/or endorsed by the leading players in the cyber security industry to deliver training to their exact standards. We have been pioneers in commissioning, developing and introducing high end material in to the market place for courses and apprenticeships Longest established Cyber Security Training specialist in the UK, since 2003 11000+ Trained Globally- including FTSE 250 Content developed by industry Professionals Classroom based small, highly interactive sessions – which encourages active learner participation The escalating complexity of Technology and Business needs will always result in companies being exposed to security threats, and most networks will be breached if faced with a sustained attack. The key to minimising the damage hackers do when they inevitably force their way on to corporate networks is to make sure your Cyber Security staff are knowledgeable enough to respond appropriately to minimise the harm Intruders can cause to the Organisation. Our History Net-Security Training is the first specialist Information Security training company in the United Kingdom. We have kept true to this niche market since our incorporation in 2003. In-fact we were the only independent training Partner that VeriSign ever approved in Europe. We have been pioneers in commissioning, developing and introducing high end course materials in to the market place. These include Penetration Testing, Securing Network Perimeter, Public Key Infrastructure, Firewalls, Virtual Private Networks, Computer Hacking, IT Security Principals, Security Awareness and many more. Our history is testament to why we have continued to stay ahead of the curve in our fast moving Industry.

IMF Academy

imf academy

Eindhoven

IMF Academy [https://www.imfacademy.com/] is part of International Management Forum (IMF), an independent publisher and training organisation focusing on business information for higher-educated managers and decision makers in large and middle-sized organisations. We are specialist in providing business information by means of distance learning courses (courses fully aimed at self-study, at will supported by online learning), master classes and hot topical (certifying) classroom training. During the past 25 years, we gained a solid reputation by providing to the point and valuable information about topics both critical and of current interest. Our customers derive from over 50 countries worldwide! The content of our courses is developed in close cooperation with acknowledged subject matter experts working at large international consultancy organisations or smaller, specialised consulting bureaus. Our trainers come from organisations such as: AIIM, Antwerp Management School, Atos Consulting, Capgemini, Centric, CGI Group, Conquaestor, Deloitte, Duthler Associates, Executive Mobility Group, G31000, IBM Business Consulting Services, Insite Security, Inter Access, KPMG, Microsoft, PwC, SABSA Institute, Sogeti, TIAS School for Business and Society, Transfer Pricing Associates (TPA), various universities and many, many other. IMF Academy is able to organize any (regular as well as customized) training as an incompany training or as personal coaching at your office or any other desired location. We know the (international) training market and always have the optimal solution for your specific training demand. Are you interested in any of our trainings? Visit our website: https://www.imfacademy.com/ [https://www.imfacademy.com/]