Certified Information Security Manager (CISM) Training
Categories
Information Security Certification
$199 – $2,999Price range: $199 through $2,999
$199
-
LevelIntermediate
-
Duration32 hours
-
Last UpdatedDecember 26, 2025
Hi, Welcome back!
Requirements
- Candidates must submit verified evidence of at least 5 years of information security work experience, including 3 years in information security management across at least three CISM job practice areas
- Work experience must be gained within:
- The 10 years preceding the application date, or
- Within 5 years of passing the CISM exam
- Experience waivers may apply based on prior certifications, education, or management experience (up to 2 years)
- The CISM exam fee is not included and must be scheduled separately through Pearson VUE
- Stable internet connection required for online support and exam preparation
- For rescheduling or cancellation, contact Support@certificationguide.com
Target Audience
- This CISM certification training is ideal for:
- Information Security Managers
- IT Managers and Senior IT Professionals
- Risk Management and Compliance Professionals
- Information Security Consultants
- Governance, Risk, and Compliance (GRC) Professionals
- Security Architects and Security Program Managers
- Professionals aspiring to leadership roles in information security
Material Includes
- 4-day intensive, guaranteed-to-run instructor-led training
- Training delivered by certified and experienced Subject Matter Experts
- Pre-learning courseware designed by industry experts
- Lifetime single-user access to downloadable course materials
- Chapter-end quizzes and CISM simulation exercises
- Practice tests to prepare for the CISM exam
- Application guidance and post-workshop expert support
- Course completion certificate with 35 PDUs
- 100% money-back guarantee
Description
The Certified Information Security Manager (CISM®) Training by Certification Guide is a globally recognized, instructor-led program designed for experienced IT security professionals aiming to move into information security leadership and management roles. Offered under ISACA standards, CISM validates your ability to design, govern, and manage enterprise-level information security programs.
This comprehensive training covers the complete lifecycle of information security management—from governance and risk management to security program development and incident response. The course follows an all-encompassing, practical approach and equips learners with the knowledge, skills, and confidence required to clear the CISM exam on the first attempt and deliver measurable value to their organizations.
What I will learn?
- After completing this course, you will be able to:
- Understand core principles of information security and ISACA’s CISM framework
- Establish and manage an enterprise information security governance structure
- Align information security strategy with business goals and regulatory requirements
- Identify, assess, and manage information security risks effectively
- Develop, implement, and manage a comprehensive information security program
- Apply security frameworks, architectures, and best practices
- Manage third-party risk and security operations
- Design and implement effective incident response, BCP, and DRP strategies
- Demonstrate mastery across all four CISM domains
- Gain exam-focused knowledge to successfully pass the CISM Certification Exam
Course Agenda
Introduction
-
Introduction to CISM, ISACA, and Course
-
Certification Guide, Instructor, Participant introduction and Set expectation by participant
Module 01 : Information Security Governance
-
Introduction
-
Priorities for the CISM
-
Priorities for the CISM Part 2
-
Priorities for the CISM Review Questions
-
Corporate Governance
-
Evaluating the Security Environment
-
Information Security Program
-
Security Strategy
-
Roles and Responsibilities
-
Reporting and Compliance
-
Code of Ethics
-
Summary and Review
Module 02 : Information Risk Management and Compliance
-
Risk Management Intro
-
Risk Identification
-
Information Security Program Basics
-
Administrative Controls
-
Asset Threats and Vulnerabilities
-
Risk Register
-
Frameworks
-
Information Security Architecture
-
Risk Scenarios
-
Risk Scenarios Continued
-
Risk Assessment Introduction
-
Examples of Risk Analysis Techniques
-
Risk Assessment
-
BCP and DRP
-
Creation of BCP and DRP
-
Risk Mitigation Reduction and Avoidance
-
Risk Mitigation Transference and Acceptance
-
Selecting a Mitigation Strategy
-
Types of Mitigating Controls
-
Risk and Control Monitoring and Reporting
-
KRI’s
-
Tools for Risk Monitoring
Module 03 : Information Security Program Development and Management
-
Information Security Program and Development
-
Information Security Program Concepts
-
Information Security Program Requirements
-
Essential Elements of an Information Security Program
-
Security Frameworks
-
Purpose of Architecture
-
Information Security Frameworks
-
Security Operations Event Monitoring
-
Secure Engineering and Threat Modeling
-
Protecting the Network-Segmentation
-
Protecting the Network-Wireless Security
-
Protecting the Network-Services
-
Protecting the Network through Detection and Network Access Control
-
Data and Endpoint Security
-
Identity and Access Management
-
Third-Party Governance
-
Policies Procedures Standards and Guidelines
-
Certification and Accreditation
-
Domain 3 Wrap-up
Module 04 : Information Security Incident Management
-
BCP and DRP
-
Incident Management Processes
-
Roles and Responsibilities
-
Making the case for incident response
-
Developing the Incident Response Plan-Capability Assessment
-
Incident Response Planning Processes
-
Incident Detection Devices
-
BCP steps
-
BCP Intro
-
BCP Step 1
-
Business Impact Analysis Step 2
-
BCP Step 3
-
BCP Step 4
-
Analyze and Update a Company BCP/BIA/DRP/CIRP
-
BCP Roles and Responsibilities
-
BCP sub plans
-
Testing the Plan
-
ISACA – CISM – Certified Information Security Manager
Student Ratings & Reviews
No Review Yet