UNIVERSITY OF DAR ES SALAAM COMPUTING CENTRE

Excellence, Innovation and Technological Foresight
  • Last Update: Apr 17, 2023
user

About This Course

Course Overview

In this course, students will establish processes to ensure that information security measures align with established business needs.

Who Should Attend

The intended audience for this course is information security and IT professionals, such as network administrators and engineers, IT managers, and IT auditors, and other individuals who want to learn more about information security, who are interested in learning in-depth information about information security management, who are looking for career advancement in IT security, or who are interested in earning the CISM certification.

Course Objectives

Establish and maintain a framework to provide assurance that information security strategies are aligned with business objectives and consistent with applicable laws and regulations. Identify and manage information security risks to achieve business objectives. Create a program to implement the information security strategy. Implement an information security program. Oversee and direct information security activities to execute the information security program. Plan, develop, and manage capabilities to detect, respond to, and recover from information security incidents.

Pre-Requisites     

To become a CISM certified professional, you need to fulfill the following criteria: A completed application must be submitted within 5 years from the date of initially passing the examination. All experience must be verified independently with employers. This experience must have been gained within the 10-year period preceding the application date for certification or within five years of passing the examination. Three (3) years of the five (5) years of work experience must be gained performing the role of an information security manager. In addition, this work experience must be broad and gained in three (3) of the four (4) CISM® domains.