Certified Information Security Manager (CISM)

Overview

The Certified Information Security Manager (CISM) certification is a globally recognized credential offered by ISACA (Information Systems Audit and Control Association). It validates the knowledge and expertise of professionals in the field of information security management and demonstrates an individual’s ability to design, implement, and manage an effective information security program within an organization.

The CISM exam covers a wide range of topics related to information security management, including information security governance, risk management, program development and management, and incident management. Participants learn about industry best practices, standards, and frameworks such as ISO 27001, COBIT, and NIST and how to apply them to ensure information assets’ confidentiality, integrity, and availability.

Individuals can enroll in training programs that cover the syllabus and provide practical exercises and case studies to prepare for the CISM exam. These programs focus on developing risk assessment and management skills, information security program development, and incident response planning.

By obtaining the CISM certification, professionals demonstrate their competence in information security management and their commitment to maintaining high standards in the field. This certification enhances career opportunities in information security management, as organizations value individuals with the knowledge and skills to protect critical information assets. The CISM certification also showcases a professional’s dedication to ongoing professional development and staying current with industry trends and emerging threats in information security.

Course Details

  • What You will Learn

    The course will cover the following list of main areas, spanning the four domains of the CISM practice and the related tasks. The CISM Exam Preparation Course Outline is as follows:

    • Information Security Defined
    • Information Security Principles
    • Support the Business
    • Defend the Business
    • Promote Responsible Information Security Behavior

    DOMAIN 1 – Information Security Governance

    • Section One: Designing a Strategy and Governance Framework
    • Section Two: Gaining Management Approval
    • Section Three: Implementing the Security Strategy

    DOMAIN 2 – Information Security Risk Management

    • Section One: Risk Identification
    • Section Two: Risk Analysis and Treatment
    • Section Three: Risk Monitoring and Reporting

    DOMAIN 3 – Information Security Program Development and Management

    • Section One: Alignment and Resource Management
    • Section Two: Standards Awareness and Training
    • Section Three: Building Security into Processes and Practices
    • Section Four: Security Monitoring and Reporting

    DOMAIN 4 – Information Security Incident Management

    • Section One: Planning and Integration
    • Section Two: Readiness and Assessment
    • Section Three Identification and Response
    • Exam Techniques
    • ISACA Requirements for Certification:
    • To facilitate the student’s understanding of ISACA’s approach to information security, and its related concepts such as risk.
    • Develop an understanding of key practices in the governance, management of risk, program development, and incident management in the realm of information security.
  • Get Started Now

    $250.00 Enroll
  • Curriculum Developed By: