Certified Information Security Manager® (CISM)

This course is designed to help candidates prepare for sitting the ISACA CISM certification examination. By taking this course and obtaining CISM certification, your experience and skills in supporting the information security needs of your organization will be validated. Securing the organization’s information is a critical business objective in today’s business environment. The information that an organization depends on to be successful can be at risk from numerous sources. By effectively managing information security, you can address these risks and ensure the organization remains healthy and competitive in the marketplace.

This course may earn a Credly Badge.

Skip to Available Dates

Learning Objectives

Upon successful completion of this course, students will be able to:

  • establish and maintain a framework to provide assurance that information security strategies are aligned with business objectives and consistent with applicable laws and regulations.
  • identify and manage information security risks to achieve business objectives.
  • create a program to implement the information security strategy.
  • implement an information security program.
  • oversee and direct information security activities to execute the information security program.
  • plan, develop, and manage capabilities to detect, respond to, and recover from information security incidents.

     

    Course Details

    Course Outline

    1 - The Basics
  • Security Concepts
  • Governance, Goals, Strategies, Policies, Standards, and Procedures
  • Strategy
  • Risk Appetite, Tolerance, and Capacity
  • Analysis of Risk
  • Controlling Threats and Risk
  • Controls and Countermeasures
  • ALE, RTO, RPO, SDO, MTO, MTD, and AIW
  • BCP, DRP, and BIA
  • Business Continuity and Disaster Recovery
  • Testing Incident Response, Business Continuity Plans, and Disaster Recovery Plans
  • Roles, Responsibilities, RACI, and Skills
  • Due Diligence and Due Care
  • Security Principles
  • KGIs, KPIs, KRIs, and CSFs
  • Technologies
  • Standards and Frameworks
  • Culture
  • Metrics
  • Current State, Desired State, and the Gap in Between
  • Information Security Infrastructure and Architecture
  • Cloud Computing
  • Metrics Development
  • Business Model for Information Security (BMIS)
  • 2 - Four Domains
  • Information Security Governance — Overview
  • Information Security Governance — The Goal
  • Information Security Governance — The Strategy
  • Information Security Governance — Who Does What
  • Information Security Governance — Resources That Help
  • Information Security Governance — Constraints That Hurt
  • Information Security Governance — The Action Plan
  • Information Security Governance — Metrics and Monitoring
  • Information Security Governance —What Success Looks Like
  • Information Risk Management — Overview
  • Information Risk Management — The Goal
  • Information Risk Management — The Strategy
  • Information Risk Management — Who Does What
  • Information Risk Management — Resources That Help
  • Information Risk Management — Constraints That Hurt
  • Information Risk Management — The Action Plan
  • Information Risk Management — Metrics, Monitoring, and Reporting
  • Information Risk Management — What Success Looks Like
  • Information Security Program Development and Management — Overview
  • Information Security Program Development and Management — The Goal
  • Information Security Program Development and Management — The Strategy
  • Information Security Program Development and Management — Who Does What
  • Information Security Program Development and Management — Resources That Help
  • Information Security Program Development and Management — Constraints That Hurt
  • Information Security Program Development and Management — The Action Plan
  • Information Security Program Development and Management — Metrics and Monitoring
  • Information Security Program Development and Management — What Success Looks Like
  • Information Security Incident Management — Overview
  • Information Security Incident Management — The Goal
  • Information Security Incident Management — The Strategy
  • Information Security Incident Management — Who Does What
  • Information Security Incident Management — Resources That Help
  • Information Security Incident Management — Constraints That Hurt
  • Information Security Incident Management — The Action Plan
  • Information Security Incident Management — Metrics and Monitoring
  • Information Security Incident Management — What Success Looks Like
  • Actual course outline may vary depending on offering center. Contact your sales representative for more information.

    Who is it For?

    Target Audience

    The intended audience for this course is information security and IT professionals, particularly IT managers who are interested in earning the CISM certification. The course is also applicable to individuals who are interested in learning in-depth information about information security management or who are looking for career advancement in IT security.

    Other Prerequisites

    To ensure your success, you should have at least five years of professional experience in information security, as well as at least three years of experience in information security management. You are also required to prove this level of experience to ISACA in order to obtain certification. Major areas of information security management include:

    - Information security governance

    - Information risk management

    - Information security program development

    - Information security program management

    - Incident management and response

    Certified Information Security Manager® (CISM)

    $1,995
    Course Length : 3 Days
     

    1. Choose a Date | 2. Click Enroll Now

    Search All Dates

    Next 4 available dates:

    ... More Dates
    Need Help Picking the Right Course? Give us a call! (888) 825-6684