CCSSM: Certified CyberSecurity Systems Manager

Companies will lean on a Certified Cyber Security Manager, CCSM to create solutions for tomorrow’s problems, today. When it comes to identifying critical issues and providing effective IS management solutions. The knowledge and
course content provided in the Certified Cyber Security Manager, CCSM will not only cover ISACA®’s CISM exam but will provide a measurable certification that demonstrates proficiency in the IS Management Field. The Certified Information Systems Security Manager covers the skills and knowledge to assess threat analysis and risks, Risk & incident management, Security programs and CISO roles, IS security strategy and frameworks, Audit and Risk management creation of policies, compliance, and awareness, as well as DR and BCP development, deployment, and maintenance.

Days : 4
Price :




Upon Completion
Upon completion, Certified IS Security Manager students will have a strong foundation in Cyber Security & IS management standards with current best practices and will be prepared to competently take the CCSM exam.
Exam Information
The Certified Information Systems
Security Manager exam is taken online through Mile2’s Learning Management System and is accessible on your account. The exam will take approximately 2 hours and consist of 100 multiple choice questions.
A minimum grade of 70% is required for certification.
Detailed Outline:
Course Introduction
I. Module 1 – Introduction
A. Agenda
B. Daily Format
C. Domain Structure
D. Course Structure and Logistics
II. Module 2 – Architectural Concepts and Design Requirements
A. IS Governance Overview
B. IS Strategy
C. IS Programs, Architectures, and Frameworks
D. Committees and Responsibilities
E. Auditing and Evaluating Information Systems
F. Reporting and Compliance
G. Ethics
III. Module 3 – Information Risk Management
A. Roles and Responsibilities
B. What is Risk and Risk Management
C. Risk Assessment, Treatment
D. Risk Mitigation and Controls
E. Auditing
F. Human Resource Risk
G. Training and Awareness
IV. Module 4 – Information Security Program Development and Management
a. Information Security Strategy and Management
b. Security Program Development
c. Operations Security Technologies
d. Evaluating and Information Security System
V. Module 5 – Information Security Incident Management
a. Goals of Incident Management and Response
b. Developing Response and Recovery Plans
c. Plan of Action for Incident Management
d. Challenges in Incident Management
e. Post Event Reviews
f. Notification Requirements
g. Insurance
h. Testing Response and Recovery Plans
i. BCP and DRP Training