In this course, you will gain the knowledge and skills needed to successfully pass the certification exam and become a CISM Certified Information Security Manager.
In this course, you will gain the knowledge and skills needed to successfully pass the certification exam and become a CISM Certified Information Security Manager.
This course will cover four CISM domains:
Security governance
Risk management and compliance
Security programme development and management
Security incident management
In addition to meeting ISACA’s certification requirements, passing the CISM Certification Exam meets U.S. DoD Directive 8140/8570.01 Management (IAM) Level-II, Management (IAM) Level-III and CSSP Manager requirements.
CISM Certified Information Security Manager Training Information
In this course, you will:
Learn from ISACA official curriculum.
Receive an exam voucher from ISACA.
Prepare for and pass the Certified Information Security Manager (CISM) exam.
Develop an information security strategy and plan of action to implement the strategy.
Manage and monitor information security risks.
Build and maintain an information security plan.
Implement policies and procedures to respond to and recover from disruptive and destructive information security events.
Continue learning and face new challenges with after-course one-on-one instructor coaching.
Training Prerequisites
To succeed in this course and successfully pass the CISM exam, you should have at least five years of information security experience in at least one of the following roles:
IT consultant, auditor, or manager
Security policy writer
Privacy officer
Information security officer
Network administrator
Security device administrator
Security engineers
Certification Information
The ISACA Exam Candidate Information Guide provides valuable information regarding exam day rules and information, as well as exam dates and deadlines. You can find the most recent version at ISACA.org
CISM Certified Information Security Manager Training Outline
Module 1: Information Security Governance
In this module, you will learn how to:
Establish and maintain an information security strategy and align the strategy with corporate governance
Identify internal and external influences to the organisation
Define roles and responsibilities
Establish, monitor, evaluate, and report metrics
Module 2: Information Risk Management and Compliance
In this module, you will learn how to:
Establish a process for information asset classification and ownership
Identify legal, regulatory, organisational, and other applicable requirements
Ensure that risk assessments, vulnerability assessments, and threat analyses are conducted periodically
Determine appropriate risk treatment options
Evaluate information security controls
Identify the gap between current and desired risk levels
Integrate information risk management into business and IT processes
Monitor existing risk
Report noncompliance and other changes in information risk
Module 3: Information Security Programme Development and Management
In this module, you will learn how to:
Establish and maintain the information security program
Identify, acquire, manage, and define requirements for internal and external resources
Establish and maintain information security architectures
Establish, communicate, and maintain organisational information security standards, procedures, and guidelines
Establish and maintain a programme for information security awareness and training
Integrate information security requirements into organisational processes, as well as into contracts and activities of third parties
Establish, monitor, and periodically report programme management and operational metrics
Module 4: Information Security Incident Management
In this module, you will learn how to:
Establish and maintain an organisational definition and severity hierarchy for information security incidents
Establish and maintain an incident response plan
Develop and implement processes to ensure timely identification of information security incidents
Establish and maintain processes to investigate and document information security incidents
Establish and maintain incident escalation and notification processes
Organise, train, and equip teams to effectively respond to information security incidents
Test and review the incident response plan periodically
Establish and maintain communication plans and processes
Conduct post-incident reviews
Establish and maintain integration among the incident response plan, disaster recovery plan, and business continuity plan
Learning Tree has helped more than 65,000 organisations and 2.5 million individuals worldwide develop the skills and earn the certifications necessary to support their careers and power organisational performance. Get started by exploring our enterprise solutions, services and capabilities.
Introduction to cyber security Understand terminology used in cyber security Understand legal and ethical aspects of cyber security
In this course, you’ll learn how to analyse, monitor, and protect an organisation’s infrastructure using threat-detection and threat-analysis tools.
The training can be linked directly to the success of the phishing campaign. We would provide some examples and discuss the tactics used by malicious actors along with the mitigation strategies that could be employed.
This 3-day accelerated training course will provide you with skills needed to ensure that your IT systems meet the business's needs - through leadership, and organisational structures and processes.
The 21st century cybersecurity industry is expanding rapidly and is a solid area to pursue a long-standing and rewarding career in Information Security. Hence, this cyber security skills training has been designed by our experts in the Cyber Security industry and is based broadly on the 8 domains o...
© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy