Certified Information Security Manager (CISM)

isaca

Course Details

Designed for experienced information security professionals, the CISM Course designation is a groundbreaking credential earned by nearly 21,400 professionals since it was established in 2002. The management-focused CISM is the globally accepted standard for individuals who develop, build and manage enterprise information security programs.  The CISM certification promotes international practices and provides executive management with assurance that those earning the designation have the required experience and knowledge to provide effective security management and consulting services. The demand for skilled information security management professionals is on the rise, get the certification that distinguishes you as having knowledge and experience in the development and management of an information security program.

This CISM course includes the following features:

  • Instructor-led demonstrations and visual presentations to develop your skills based on real-world scenarios.
  • Unlike a live class, you can fast-forward, repeat or rewind all your lectures. This gives you all the benefit of hands-on training with the flexibility of doing it around your schedule 24/7.
  • Flashcards and Education Games are also provided throughout the course.
  • Practice exams prepare you for your exams. These exams are on average 100 questions to ensure you are 100% prepared if you are taking a certification exam.
  • You can also interact and collaborate with other students through our forums, student contributions and announcement features.
Who should complete this CISM Course?
  • People who work in the following job roles:
  • Information Security Governance
  • Information Risk Management and Compliance
  • Information Security Program Development and Management
  • Information Security Incident Management.
Entry Requirements / Prerequisites
  • Learners intending take the exams should ensure they meet any specific entry requirements CMIT exams.
  • For technical requirements required to access CMIT eLearning click here>
  • For more details on the suitability of this course click here>
How CMIT eLearning Works…

Topics covered in this CISM Course

Information Security Governance and the chapters under this domain are:

  • Tasks and knowledge statements
  • Information security governance
  • Effective information security governance
  • Information Security concepts and technologies
  • Scope and charter of information security governance
  • Information Strategy overview
  • Information security strategy development

Information Risk Management and Compliance, and the chapters under this domain are:

  • Tasks and Knowledge Statements
  • Introduction to risk management
  • Information classification
  • Information asset valuation methodologies
  • Legal, regulatory and organizational compliance
  • Risk Assessment
  • Risk Response Techniques
  • Controls
  • Business Impact Analysis
  • Enterprise risk management methodologies
  • Risk Monitoring and communication

Information Security Program Development and Management, and the chapters under this domain are:

  • Tasks and Knowledge Statements
  • Information Security Program management overview
  • Information Security program objectives
  • Information Security program concepts
  • Scope and charter of an Information Security program
  • Information security management framework
  • Information security framework components
  • Defining an information security program road map
  • Information security infrastructure and architecture
  • Architecture implementation
  • Security program management and administrative activities
  • Security program services and operational activities
  • Controls and counter measures
  • Security program metrics and monitoring

Information Security Incident Management and the chapters under this domain are:

  • Tasks and Knowledge Statements
  • Incident management overview
  • Incident response procedures
  • Information Security Manager
  • Incident management resources
  • Incident management objectives
  • Incident management metrics and indicators
  • Defining incident management procedures
  • Current state of incident response capability
  • Developing an incident response plan
  • Business continuity and disaster recovery procedures
  • Testing incident response and business continuity/disaster recovery procedures
  • Executing response and recovery plans
Assessment
  • Following completion of the online assessment, you will receive a Certificate in Information Security from College of Management and IT (CMIT).
  • You may optionally take exams to receive certification. Exam fees are not included in the course price. Click here for exam information.
Technical Requirements
  • Broadband internet connection.
  • Browser – we recommend Chrome or Safari for Tablet or Apple Mac; and Firefox or Internet Explorer for PC hardware.
  • Operating System – PC (Windows 7 or later), Mac or Android.
Accreditation
Student Reviews of this Course
{{ reviewsOverall }} / 5 Users (0 votes)
Rating0
What students say... Leave your rating
Order by:

Be the first to leave a review.

Verified Student
{{{review.rating_comment | nl2br}}}

Show more
{{ pageNumber+1 }}
Leave your rating