CISM Examination Preparation Course

by DataCouch Claim Listing

The Certificate Information Security Manager (CISM) by ISACA is designed to provide executive management with assurance that those earning the designation have the required knowledge and ability to provide effective information security management and consulting.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

DataCouch Logo

img Duration

3 Days

Course Details

The Certificate Information Security Manager (CISM) by ISACA is designed to provide executive management with assurance that those earning the designation have the required knowledge and ability to provide effective information security management and consulting.

While the central focus of the CISM certification is information security management, all those in the IT profession with security experience will certainly find value in the CISM.

This course covers the complete curriculum of CISM and aims to provide deep knowledge on all domains of CISM including information security governance, program development and management, incident management and risk management.

This course aims to provide sufficient knowledge to a candidate which eventually add credibility and confidence in candidate’s interactions with internal and external stakeholders, peers, and regulators.

The CISM brings credibility to the team and ensures alignment between the organization’s information security program and its broader goals and objectives. CISM can validate team’s commitment to compliance, security and integrity and increase customer retention.

 

Curriculum:

  • Information Security Governance
  • Enterprise Governance
  • Organizational Culture
  • Legal, Regulatory, and Contractual Requirements
  • Organizational Structures, Roles, and Responsibilities
  • Information Security Strategy
  • Information Security Strategy Development
  • Information Governance Frameworks and Standards
  • Strategic Planning (e.g., budgets, resources, business case)
  • Information Security Risk Management
  • Information Security Risk Assessment
  • Emerging Risk and Threat Landscape
  • Vulnerability and Control Deficiency Analysis
  • Risk Assessment and Analysis
  • Information Security Risk Response
  • Risk Treatment / Risk Response Options
  • Risk and Control Ownership
  • Risk Monitoring and Reporting
  • Information Security Program
  • Information Security Program Development
  • Information Security Program Resources (e.g., people, tools, technologies)
  • Information Asset Identification and Classification
  • Industry Standards and Frameworks for Information Security
  • Information Security Policies, Procedures, and Guidelines
  • Information Security Program Metrics
  • Information Security Program Management
  • Information Security Control Design and Selection
  • Information Security Control Implementation and Integrations
  • Information Security Control Testing and Evaluation
  • Information Security Awareness and Training/td>
  • Management of External Services (e.g., providers, suppliers, third parties, fourth parties)
  • Information Security Program Communications and Reporting
  • Incident Management
  • Incident Management Readiness
  • Incident Response Plan
  • Business Impact Analysis (BIA)
  • Business Continuity Plan (BCP)
  • Disaster Recovery Plan (DRP)
  • Incident Classification/Categorization
  • Incident Management Training, Testing, and Evaluation
  • Incident Management Operations
  • Incident Management Tools and Techniques
  • Incident Investigation and Evaluation
  • Incident Containment Methods
  • Incident Response Communications (e.g., reporting, notification, escalation)
  • Incident Eradication and Recovery
  • Post-incident Review Practices

 

Prerequisites

  • Understanding on IT Infrastructure, computer science fundamentals and networking terminologies.
  • Basic understanding on management part of IT infrastructure, information systems, IT teams etc. could be an advantage.
  • Familiarity with day-to-day information Security terminologies, however not mandatory because it will be covered in day 1 of training
  • Mohali Branch

    #7, LOWER GROUND, SBC EL COMMERCIO CITY CENTRE, Mohali

Check out more CISM courses in India

Netmax Technologies Logo

Cyber Security Training

Cybersecurity is a critical skill set in high demand across industries. Unlock new career opportunities and contribute to the digital safety of your community by enrolling in our Chandigarh-based cybersecurity training.

by Netmax Technologies [Claim Listing ]
Radical Technologies Logo

CISM

CISM, which stands for Certified Information Security Manager, is a globally recognized professional certification for individuals who specialize in information security management and governance. It is awarded by ISACA (Information Systems Audit and Control Association).

by Radical Technologies [Claim Listing ]
IONX (Institute Of Network Experts) Logo

Cyber Security Expert

Our Cyber Security Training enables you to build basic to advanced cybersecurity knowledge and gain skills on techniques to defend against cyber threats. By taking this course, you will become proficient in securing your critical systems and assets.

by IONX (Institute Of Network Experts) [Claim Listing ]
Falcon Cyber Tech Logo

Certified Information Systems Security Officer

The Certified Information Systems Security Officer (CISSO) course is designed to provide individuals with the necessary skills and knowledge to effectively implement and manage an organization’s information security program.

by Falcon Cyber Tech [Claim Listing ]
MTA India Logo

Cyber Security Training

Cyber Security course is offered by MTA India for all skill level. MTA India has one clear vision. To provide quality IT Training that can be used in making a successful IT career.

by MTA India [Claim Listing ]

© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy