4.33
(3 Ratings)
Wishlist Share
Share Course
Page Link
Share On Social Media
Categories: Information Security

About Course

Certified Information Security Manager® (CISM®) affirms your ability to assess risks, implement effective governance, and proactively respond to incidents. With a highlight on emerging technologies such as AI and blockchain, it guarantees your skillset meets evolving security threats and industry requirements. By addressing top-of-mind concerns like data breaches and ransomware attacks, crucial for IT professionals, this certification ensures you are staying ahead of the pace of change.

ISACA credentials are among the top 10 highest-paying in IT, and CISM is recognized as the preferred credential for IT managers.

  • Duration: 1-2 Months
  • Exam Voucher: Yes
  • Language: English
  • Level: Intermediate
  • 23 NASBA CPE Information Technology Credits

In this course, you will gain the knowledge and skills needed to successfully pass the certification exam

and become a CISM Certified Information Security Manager.

This course will cover four CISM domains:

  • Security governance
  • Risk management and compliance
  • Security program development and management
  • Security incident management

U.S. DoDM 8140.03 APPROVED BY DEPARTMENT OF DEFENSE

 

CISM Certified Information Security Manager Delivery Methods

  • In-Person
  • Online

 

CISM Certified Information Security Manager Course Information

In this course, you will:

  • Learn from ISACA official curriculum.
  • Receive an exam voucher from ISACA.
  • Prepare for and pass the Certified Information Security Manager (CISM) exam.
  • Develop an information security strategy and plan of action to implement the strategy.
  • Manage and monitor information security risks.
  • Build and maintain an information security plan.
  • Implement policies and procedures to respond to and recover from disruptive and destructive information security events.
  • Continue learning and face new challenges with after-course one-on-one instructor coaching.

Training Prerequisites

To succeed in this course and successfully pass the CISM exam, you should have at least five years of

information security experience in at least one of the following roles:

  • IT consultant, auditor, or manager
  • Security policy writer
  • Privacy officer
  • Information security officer
  • Network administrator
  • Security device administrator
  • Security engineers

 

Certification Information

The ISACA Exam Candidate Information Guide provides valuable information regarding exam day rules

and information, as well as exam dates and deadlines. You can find the most recent version at ISACA.org

CISM Certified Information Security Manager Course Outline

Module 1: Information Security Governance

In this module, you will learn how to:

  • Establish and maintain an information security strategy and align the strategy with corporate
  • governance
  • Identify internal and external influences to the organization
  • Define roles and responsibilities
  • Establish, monitor, evaluate, and report metrics

Module 2: Information Risk Management and Compliance

In this module, you will learn how to:

  • Establish a process for information asset classification and ownership
  • Identify legal, regulatory, organizational, and other applicable requirements
  • Ensure that risk assessments, vulnerability assessments, and threat analyses are conducted

periodically

  • Determine appropriate risk treatment options
  • Evaluate information security controls
  • Identify the gap between current and desired risk levels
  • Integrate information risk management into business and IT processes
  • Monitor existing risk
  • Report noncompliance and other changes in information risk

Module 3: Information Security Program Development and Management

In this module, you will learn how to:

  • Establish and maintain the information security program
  • Identify, acquire, manage, and define requirements for internal and external resources
  • Establish and maintain information security architectures
  • Establish, communicate, and maintain organizational information security standards, procedures, and guidelines
  • Establish and maintain a program for information security awareness and training
  • Integrate information security requirements into organizational processes, as well as into contracts and activities of third parties
  • Establish, monitor, and periodically report program management and operational metrics

Module 4: Information Security Incident Management

In this module, you will learn how to:

  • Establish and maintain an organizational definition and severity hierarchy for information security incidents
  • Establish and maintain an incident response plan
  • Develop and implement processes to ensure timely identification of information security incidents
  • Establish and maintain processes to investigate and document information security incidents
  • Establish and maintain incident escalation and notification processes
  • Organize, train, and equip teams to effectively respond to information security incidents
  • Test and review the incident response plan periodically
  • Establish and maintain communication plans and processes
  • Conduct post-incident reviews
  • Establish and maintain integration among the incident response plan, disaster recovery plan, and business continuity plan
Show More

What Will You Learn?

  • Learn from ISACA official curriculum.
  • Receive an exam voucher from ISACA.
  • Prepare for and pass the Certified Information Security Manager (CISM) exam.
  • Develop an information security strategy and plan of action to implement the strategy.
  • Manage and monitor information security risks.
  • Build and maintain an information security plan.
  • Implement policies and procedures to respond to and recover from disruptive and destructive information security events.
  • Continue learning and face new challenges with after-course one-on-one instructor coaching.

Course Content

Module 1: Information Security Governance
In this module, you will learn how to: • Establish and maintain an information security strategy and align the strategy with corporate • governance • Identify internal and external influences to the organization • Define roles and responsibilities • Establish, monitor, evaluate, and report metrics

  • Certified Information Security Manager, CISM, Course 01, Information Security Governance
    03:10:22

Module 2: Information Risk Management and Compliance
In this module, you will learn how to: • Establish a process for information asset classification and ownership • Identify legal, regulatory, organizational, and other applicable requirements • Ensure that risk assessments, vulnerability assessments, and threat analyses are conducted periodically • Determine appropriate risk treatment options • Evaluate information security controls • Identify the gap between current and desired risk levels • Integrate information risk management into business and IT processes

Module 3: Information Security Program Development and Management
In this module, you will learn how to: • Establish and maintain the information security program • Identify, acquire, manage, and define requirements for internal and external resources • Establish and maintain information security architectures • Establish, communicate, and maintain organizational information security standards, procedures, and guidelines • Establish and maintain a program for information security awareness and training • Integrate information security requirements into organizational processes, as well as into contracts and activities of third parties • Establish, monitor, and periodically report program management and operational metrics

Module 4: Information Security Incident Management
In this module, you will learn how to: • Establish and maintain an organizational definition and severity hierarchy for information security incidents • Establish and maintain an incident response plan • Develop and implement processes to ensure timely identification of information security incidents • Establish and maintain processes to investigate and document information security incidents • Establish and maintain incident escalation and notification processes • Organize, train, and equip teams to effectively respond to information security incidents • Test and review the incident response plan periodically • Establish and maintain communication plans and processes • Conduct post-incident reviews • Establish and maintain integration among the incident response plan, disaster recovery plan, and business continuity plan

Download Your Certificate of Completion

Add this certificate to your profiles to demonstrate your skills & increase your chances of getting noticed.

selected template

Student Ratings & Reviews

4.3
Total 3 Ratings
5
2 Ratings
4
0 Rating
3
1 Rating
2
0 Rating
1
0 Rating
3 years ago
Excellent course! Educators are knowledgeable and thoroughly enjoy the topic creating a fun laid-back learning atmosphere. Will take more courses
3 years ago
I truly enjoyed this class and really liked the student-professor interaction. ... The more I learn today, the less risky moves I will make in the future.
3 years ago
Excellent course! Educators are knowledgeable and thoroughly enjoy the topic creating a fun laid-back learning atmosphere. Will take more courses

Want to receive push notifications for all major on-site activities?