Narrated ‘Ali bin Abi Talib (RA): The Prophet (RA) stood up for a funeral (to show respect) and thereafter he sat down. (Dawud)

Browse Categories

Browse Categories

Certified Information Security Manager (CISM)

4.5/5

The CISM is a management-focused certification considered to promote international security practices and validates individuals’ skills to manage designs, oversee, and assess an enterprise’s information security. The CISM course helps candidates develop an Understanding of Risk management, information security governance, and drafting security policies and strategies to achieve the organizational goals. The 3 days course is made with a purpose of signifying technical expertise and experience in information security governance, information risk management, information security program development and management, and information security incident management. This course is specially designed for the experienced information security managers and those who have information security management responsibilities, including IT consultants, auditors, managers, security policy writers, privacy officers, information security officers, network administrators, security device administrators, and security engineers. This course will give you an opportunity to get the Certified Information Security Manager (CISM) certificate by the end and completion of the course. 

Training Options

Classroom Training

Online Instructor Led

Onsite Training

Course Information

Certified Information Security Manager (CISM) Training Outline

This CISM training course covers the following areas:

Introduction to Certified Information Security Manager (CISM)

  • Objectives and Expectations
  • What is Information Security?
  • The Goals of Information Security
  • Principles for Information Security Professionals

Domain 1 – Information Security Governance

  • Outline
  • Knowledge Statements
  • Introduction to Information Security Governance
  • Effective Information Security Governance
  • Governance and Third Party Relationships
  • Information Security Metrics
  • Information Security Governance Metrics
  • Information Security Strategy
  • Information Security Strategy Development
  • Strategy Resources and Constraints
  • Other Frameworks
  • Compliances
  • Action Plans to Implement Strategy
  • Governance of Enterprise IT

Domain 2 – Information Risk Management and Compliance

» Show More 👇

  • Information Risk Management
  • Task and Knowledge Statements
  • Risk Management Overview
  • Risk Assessment
  • Information Asset Classification
  • Assessment Management
  • Information Resource Valuation
  • Recovery Time Objectives
  • Security Control Baselines
  • Risk Monitoring
  • Training and Awareness
  • Information Risk Management Documentation

Domain 3 – Information Security Program Development and Management

  • Task and Knowledge Statements
  • Information Security Program Management Overview
  • Information Security Program Objectives
  • Information Security Program Concepts
  • Information Security Program Technology Resources
  • Information Security Program Development
  • Information Security Program Framework
  • Information Security Program Roadmap
  • Enterprise Information Security Architecture (EISA)
  • Security Program Management and Administration
  • Security Program Services and Operational Activities
  • Controls
  • Security Program Metrics and Monitoring
  • Measuring Operational Performance
  • Common Information Security Program Challenges

Domain 4 – Information Security Incident Management

  • Task and Knowledge Statements
  • Incident Management Overview
  • Incident Management Procedures
  • Incident Management Resources
  • Incident Management Objectives
  • Incident Management Metrics and Indicators
  • Defining Incident Management Procedures
  • Business Continuity and Disaster Recovery Procedures
  • Post Incident Activities and Investigation
  • ISACA Code of Professional Ethics
  • Laws and Regulations
  • Policy Versus Law Within an Organization
  • Ethics and the Internet IAB
  • Certified Information Security Manager
  • Certification requirements
  • CISM in the Workplace
  • The CISM Priorities
  • Understand How Questions Are Structured
  • Preparing for the Examination
  • Recommended Reading for the CISM Exam
  • Exam Favorites

» Show Less 👆

Who should attend this CISM Training Course?

This training course is designed for experienced Information Security Managers, and others involved in directing information security programs. This course would particularly benefit Information Security Managers, aspiring Information Security Managers, IT Consultants, and Chief Information Officers.

Prerequisites

There are no prerequisites for this CISM training course, however, candidates will thrive if they have some information security experience.

Q: What is CISM - Certified Information Security Manager?

A: The Certified Information Security Manager (CISM) certification is offered by ISACA. Mainly known as the Information Systems Audit and Control Association as known as ISACA. With more than 145,000 members worldwide, ISACA offers a host of related certifications and certificates.

Q: What are the tasks of a Certified Information Security Manager?

A: Certified Information Security Manager (CISM) is an advanced certification that shows that an individual possesses the knowledge and experience required to develop and manage an enterprise information security (infosec) program.

Q: Who is eligible to become CISM Certified and what makes CISM different then other courses?

A: CISM certification is a different kind of management-focused certification specially designed for the individual who manages, designs, oversees and assesses an enterprise’s information security. It validates your managerial, designing, overseeing skills and expertise brings out the best opportunities for anyone in the infosec with an interest in the managerial aspects of information security, in contrast to the technical aspects. 

Q: Can CISSPs and other security credential holders qualify for CISM?

A: Yes, CISSPs receive a two-year general information security experience waiver. Other security credential holders can be considered as professionals with knowledge and experience in information security management.

100% Business Fulfilment

Request more Information

    Corporate Training Options

    Classroom Training

    Customized to your Team’s needs

    Onsite Training

    Deliver at your Work Location

    Online Instructor Led

    Connect Online from Anywhere

    Why CounselTrain is the best option for Corporate Trainings?

    Customized Learning

    Business Fulfilment

    Industry Expert Trainers

    100% ROI

    What People say?

    Mohammed Aljbreen Operation Specialist, SAMA

    The Clarity of the Content was very good. The explanation of the trainer with in-depth knowledge in a proper flow really impressed me to give 5 star rating.

    Arindam Chakraborty Systems Specialist, King Abdullah University of Sciences & Technology

    The Instructor was really impressive. Clear cut explanation of every topic he covered with real time scenarios.

    Sher Afzal Khan Cloud Engineer, Cloud 9 Networks

    The Trainer and the Course Material, both are good. Good flow of explanation with simple examples. The complete training was focused on current industry challenges.

    Jawed Ahmad Siddiqui Sr. System Administrator, Saudi Ceramics

    The Trainer’s presentation was impressed me to continue the course till end. Never feel bore till the entire sessions. She studied our mindset and follows.

      Not sure,
      which course to choose?

      Our Clients across the Globe!

      Our Corporate Clients