Certified Information Security Manager Training (CISM)

Print Friendly, PDF & Email
Introduction

CISM Certification Training or Certified Information Security Manager Training Course Hands-on (Online, Onsite and Classroom Live)

The CISM Certification Training or Certified Information Security Manager Training program is an intensive four-day review program to prepare individuals who are planning to sit for the Certified Information Security Manager (CISM) exam issued by ISACA.

CISM students will focus on the key exam topics covered in the CISM Review Manual 15th Edition and participate in class lectures, group discussions/activities, exam practice and answer debriefs. The Certified Information Security Manager Training (CISM) course is intended for individuals with familiarity with and experience in information security management.

This Certified Information Security Manager Training (CISM) course is packed with study tips and practical information, making it a great resource for the student who is planning to sit for the CISM certification exam. Aside from helping students prepare for the CISM exam, this CISM Certification Training course will directly help those aspiring to become managers or key figures in the information security industry. For instance, students who attend this course can expect to develop a core fundamental understanding of information security as a whole, along with the relationship between information security programs and broader business goals or objectives.

Duration: 4 days

Your Registration Includes:

  • 4 Days of CISM Training from an Authorized ISACA Instructor
  • ISACA approved CISM Training Student Guide
  • ISACA approved CISM Training Labs
  • ISACA approved CISM Practice Exams
  • 100% Satisfaction Guarantee
  • Exam Pass Guarantee

Resources:

  • CISM Certification Training Guide by Peter Gregory – Hardcover/Kindle – Amazon
  • CISM Certification Training Practice Exams by Peter Gregory. – Paperback/Kindle – Amazon
  • CISM Certification Training Guide All-in-one by Peter Gregory – Paperback/Kindle – Amazon
  • Certified Information Security Manager Training (CISM) Guide by Thomas R. Peltier – Paperback/thriftbooks.com
  • Certified Information Security Manager Training (CISM) by Thomas R. Peltier, Justin Peltier – Hardcover/Barnes & Noble
  • Certified Information Security Manager Training (CISM) Complete Guide by Thomas R. Peltier – Paperback/Vitalsource.com
  • Certified Information Security Manager Training by Author: Maning, William – Paperback/emanualonline.com
Related Courses
CISM Certification Training - Customize It:
  • We can adapt this Certified Information Security Manager Training course to your group’s background and work requirements at little to no added cost.
  • If you are familiar with some aspects of this CISM Certification Training or Certified Information Security Manager course, we can omit or shorten their discussion.
  • We can adjust the emphasis placed on the various topics or build the Certified Information Security Manager Training course around the mix of technologies of interest to you (including technologies other than those included in this outline).
  • If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Certified Information Security Manager Training course in manner understandable to lay audiences.
Certified Information Security Manager Training (CISM) - Audience / Target Group:

The intended audience for the Certified Information Security Manager Training program is intended for experienced information security managers and those with information security management responsibilities. Sample job titles might include:

  • Information Security Managers
  • Aspiring Information Security Managers
  • IS/IT Consultants
  • Chief Information Officers
Certified Information Security Manager Training (CISM) - Prerequisites:

The knowledge and skills that a learner must have before attending this CISM Certification Training course are:

  • Cybersecurity Specialization: Architecture and Policy
  • Cybersecurity Specialization: Governance, Risk, and Compliance
Certified Information Security Manager Training (CISM) - Objectives:

This official CISM training seminar has a total of six primary sections. All six sections will collectively help you prepare for the CISM certification exam while also enhance your overall competencies in information security management. The six primary sections you will cover are the following:

  • General Exam Information
  • CISM Domain 1: Information Security Governance
  • CISM Domain 2: Information Risk Management
  • CISM Domain 3: Information Security Program Development and Management
  • CISM Domain 4: Information Security Incident Management
  • Exam Practice / Preparation (Sample Exam)

Course Objectives – Participants in the CISM training program will be provided instruction designed to provide the following:

  • An understanding of the format and structure of the CISM certification exam.
  • A knowledge of the various topics and technical areas covered by the exam.
  • Practice with specific strategies, tips, and techniques for taking and passing the exam.
  • Opportunities to execute practice questions with debriefs of answers.
Certified Information Security Manager Training (CISM) - Course Content:

Domain 1: Information Security Governance

  • Develop an information security strategy, aligned with business goals and directives.
  • Establish and maintain an information security governance framework.
  • Integrate information security governance into corporate governance.
  • Develop and maintain information security policies.
  • Develop business cases to support investments in information security.
  • Identify internal and external influences to the organization.
  • Gain ongoing commitment from senior leadership and other stakeholders.
  • Define, communicate and monitor information security responsibilities
  • Establish internal and external reporting and communication channels.

Domain 2: Information Risk Management

  • Establish and/or maintain a process for information asset classification to ensure that measures taken to protect assets are proportional to their business value.
  • Identify legal, regulatory, organizational and other applicable requirements to manage the risk of noncompliance to acceptable levels.
  • Ensure that risk assessments, vulnerability assessments and threat analyses are conducted consistently, and at appropriate times, to identify and assess risk to the organization’s information.
  • Identify, recommend or implement appropriate risk treatment/response options to manage risk to acceptable levels based on organizational risk appetite.
  • Determine whether information security controls are appropriate and effectively manage risk to an acceptable level.
  • Facilitate the integration of information risk management into business and IT processes to enable a consistent and comprehensive information risk management program across the organization.
  • Monitor for internal and external factors (e.g., threat landscape, cybersecurity, geopolitical, regulatory change) that may require reassessment of risk to ensure that changes to existing or new risk scenarios are identified and managed appropriately.
  • Report noncompliance and other changes in information risk to facilitate the risk management decision-making process.
  • Ensure that information security risk is reported to senior management to support an understanding of potential impact on the organizational goals and objectives.

Domain 3: Information Security Program Development & Management

  • Develop a security program, aligned with information security strategy
  • Ensure alignment between the information security program and other business functions
  • Establish and maintain requirements for all resources to execute the IS program
  • Establish and maintain IS architectures to execute the IS program
  • Develop documentation that ensures compliance with policies
  • Develop a program for information security awareness and training
  • Integrate information security requirements into organizational processes
  • Integrate information security requirements into contracts and activities of third parties
  • Develop procedures (metrics) to evaluate the effectiveness and efficiency of the IS program
  • Compile reports to key stakeholders on overall effectiveness of the IS program and the underlying business processes in order to communicate security performance.

Domain 4: Information Security Incident Management

  • Define (types of) information security incidents
  • Establish an incident response plan
  • Develop processes for timely identification of information security incidents
  • Develop processes to investigate and document information security incidents
  • Develop incident escalation and communication processes
  • Establish teams that effectively respond to information security incidents
  • Test and review the incident response plan
  • Establish communication plans and processes
  • Determine the root cause of IS incidents
  • Align incident response plan with DRP and BCP.
Request More Information

Time Frame: 0-3 Months4-12 Months

0