Certified Information Security Manager Training Course (CISM)

by Synergie Training Claim Listing

“The CISM certification promotes international practices and provides executive management with assurance that those earning the designation have the required experience and knowledge to provide effective security management and consulting services.” (ISACA)

£1645

Contact the Institutes

Fill this form

Advertisement

Synergie Training Logo

img Duration

4 Days

Course Details

This four-day course provides intensive revision for the challenging CISM exam, moving you closer to achieving the known benefits of CISM certification such as higher earning potential and career advancement.

With a growing demand for people with Information Security (IS) Management skills. CISM has become a leading international IS certification designed for those who manage, design, oversee or assess an organisation’s information security.

“The CISM certification promotes international practices and provides executive management with assurance that those earning the designation have the required experience and knowledge to provide effective security management and consulting services.” (ISACA)

 

Course Objectives

  • Upon successful completion of this course, students will have:
  • • Gained knowledge of the core competencies required of a world class information security professional.
  • • Been thoroughly prepared for the CISM certification examination.

 

Target Audience:

  • • Risk managers
  • • Security professionals with front-line experience.
  • • Security auditors
  • • Information security staff
  • • Compliance personnel
  • • Information security managers
  • • CSOs, CISOs and CIOs
  • • Information security assurance providers

 

Course Content:

  • The training programme covers the four CISM job practice domains:
  • Domain 1 – Information Security Governance
  • Domain 2 – Information Risk Management and Compliance
  • Domain 3 – Information Security Program Development and Management
  • Domain 4 – Information Security Incident Management
  • Information Security Governance
  • Effective IS governance.
  • Scope and charter of IS governance.
  • IS Governance metrics.
  • Developing an IS strategy.
  • Strategy resources and constraints.
  • Information Risk Management and Compliance
  • Risk management strategy and management.
  • Implementing risk management.
  • Risk assessment and analysis methodologies.
  • Controls and counter measures.
  • RTO and RPO.
  • Security control baselines.
  • Information Security Program Development
  • IS manager.
  • IS program development objectives and road map.
  • IS program resources.
  • Implementing an IS program.
  • Physical and environmental controls.
  • IS program integration and metrics.
  • Information Security Program Management
  • IS management framework.
  • Measuring IS management performance.
  • Common IS management challenges.
  • IS management resources and considerations.
  • Implementing management of the IS program.
  • Incident Management and Response
  • Incident management concepts.
  • Incident management metrics and indicators.
  • Defining incident management procedures.
  • Incident response capability.
  • Developing an incident response plan.
  • Developing/testing response and recovery plans.
  • Documenting events.
  • Glasgow Branch

    272 Bath Street, Glasgow

Check out more CISM courses in UK

London IT Training Logo

CCSE (Check Point Certified Security Expert)

Check Point Certified Security Expert (CCSE)‘ training is globally recognized and well accepted as the Check Point is also known as one of the top-ranked providers for both software and hardware security products.

by London IT Training [Claim Listing ]
London IT Training (LIT) Logo

Check Point Certified Security Expert (CCSE Training)

Check Point Certified Security Expert (CCSE)‘ training is globally recognized and well accepted as the Check Point is also known as one of the top-ranked providers for both software and hardware security products.

by London IT Training (LIT)
Grey Wolf Cyber Security Logo

Certified Information Systems Security Professional

The Certified Information Systems Security Professional draws from a comprehensive, up-to-date, global common body of knowledge that ensures security leaders have a deep knowledge and understanding of new threats, technologies, regulations, standards and practices.

by Grey Wolf Cyber Security [Claim Listing ]
UCEN Manchester Logo

Cisco Network Security

Our Network Security qualification prepares you for tasks like these by developing the skills needed to design, implement and support security for network devices and ensure their integrity.

by UCEN Manchester [Claim Listing ]
Hacker Academy Logo

Network Forensics

Network forensics is a sub-branch of digital forensics relating to the monitoring and analysis of computer network traffic for the purposes of information gathering, legal evidence, or intrusion detection.

by Hacker Academy [Claim Listing ]

© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy