Certified Information Security Manager (CISM) has been accepted as the universal standard to strive towards the sphere of information security, thus depicting the qualification as a prominent representation of expertise and commitment. This Certified Information Security Manager (CISM) training course focuses on the construction, development, and governance of information security operations. Successfully completion of this CISM Training makes delegates valuable for their organisation and help to expand their clientele due to their implementation of information security governance and program development. It also helpful to pass the exam in very first attempt.
Certified Information Security Manager (CISM) Training
$1,499.00 – $2,999.00
CISM – Certified Information Security Manager Certification Training
The CISM Certification Training is an excellent step for you to sharpen your skillset as an IT Security professional. This Certified Information Security Manager course validates your learning and experience required to create a robust data security program. The CISM Course outline at Certification Guide covers everything right from ‘What is Information Security’, IS Governance, Risk Management, and Security Program Development to ISACA’s Laws and Regulations of Information Security. The CISM Training at Certification Guide follows an all-encompassing approach. It is a 5-days, comprehensive, and instructor-led corporate certification training program every IT Security Professional must go for.
- Share:
Overview
With growing emphasis on information protection, the need for trained and capable information security management professionals is steadily increasing, and the CISM® certification, an internationally renowned ISACA qualification, is the globally established standard of achievement in this area. The intent of the CISM certification training is to provide a common body of knowledge for Information security management.
Key Features
Certified and experienced Subject Matter Experts
4 days Intensive and guaranteed to run In-Person training
Access to the CG’s Pre-Learning courseware designed by industry experts
CISM Simulations and chapter end quizzes
Application and post workshop support by experts
Practice tests to prepare for exam
About the Course
Pre-Requisite
Submit verified evidence of a minimum of five years of information security work experience, with a minimum of three years of work experience in three or more job practice analysis areas of information security management. The work experience must be gained within the 10 years preceding the application date for certification or within 5 years from the exam’s passing date.
The following security-related certifications and information systems management experience can be used to substitute the indicated amount of information security work experience.
Two Years:
Certified Information Systems Auditor (CISA) in good standing
Certified Information Systems Security Professional (CISSP) in good standing
Post-graduate degree in information security or a related field (e.g., business administration, information systems, information assurance)
One Year:
One full year of information systems management experience
One full year of general security management experience
Skill-based security certifications (e.g., SANS Global Information Assurance Certification (GIAC), Microsoft Certified Systems Engineer (MCSE), CompTIA Security +, Disaster Recovery Institute Certified Business
Continuity Professional (CBCP), ESL IT Security Manager)
Completion of an information security management program at an institution aligned with the Model Curriculum
Exam format
Passing marks: 450 out of 800
Number of questions: 150
Duration: 4 Hours
Question format: Multiple Choice
Exam language: English, Japanese, Korean, Spanish
Exam Cost
Members: $415
Non-Members: $465
Curriculum to CISM – Certified Information Security Manager Certification Training
Introduction
Introduction to CISM, ISACA, and Course
Certification Guide, Instructor, Participant introduction and Set expectation by participant
Information Security Governance
Introduction
Priorities for the CISM
Priorities for the CISM Part 2
Priorities for the CISM Review Questions
Corporate Governance
Evaluating the Security Environment
Information Security Program
Security Strategy
Roles and Responsibilities
Reporting and Compliance
Code of Ethics
Summary and Review
Information Risk Management and Compliance
Risk Management Intro
Risk Identification
Information Security Program Basics
Administrative Controls
Asset Threats and Vulnerabilities
Risk Register
Frameworks
Information Security Architecture
Risk Scenarios
Risk Scenarios Continued
Risk Assessment Introduction
Examples of Risk Analysis Techniques
Risk Assessment
BCP and DRP
Creation of BCP and DRP
Risk Mitigation Reduction and Avoidance
Risk Mitigation Transference and Acceptance
Selecting a Mitigation Strategy
Types of Mitigating Controls
Risk and Control Monitoring and Reporting
KRI’s
Tools for Risk Monitoring
Information Security Program Development and Management
Information Security Program and Development
Information Security Program Concepts
Information Security Program Requirements
Essential Elements of an Information Security Program
Security Frameworks
Purpose of Architecture
Information Security Frameworks
Security Operations Event Monitoring
Secure Engineering and Threat Modeling
Protecting the Network-Segmentation
Protecting the Network-Wireless Security
Protecting the Network-Services
Protecting the Network through Detection and Network Access Control
Data and Endpoint Security
Identity and Access Management
Third-Party Governance
Policies Procedures Standards and Guidelines
Certification and Accreditation
Domain 3 Wrap-up
Information Security Incident Management
BCP and DRP
Incident Management Processes
Roles and Responsibilities
Making the case for incident response
Developing the Incident Response Plan-Capability Assessment
Incident Response Planning Processes
Incident Detection Devices
BCP steps
BCP Intro
BCP Step 1
Business Impact Analysis Step 2
BCP Step 3
BCP Step 4
Analyze and Update a Company BCP/BIA/DRP/CIRP
BCP Roles and Responsibilities
BCP sub plans
Testing the Plan
ISACA – CISM – Certified Information Security Manager
FAQ
Does the course fee include the examination fee as well?
The exam fee for CISM is not included in the course fee. Schedule your exam directly through www.pearsonvue.com.
Will I get the CISM® certificate after completing this certification course?
On completion of 4 days of In-person training, you will receive a 35 PDU’s certificate. A soft copy of the certificate will be mailed to your registered email address within 48 hours of course completion.
Does CG offers 100% money back guarantee?
Yes, we offer 100% money back guarantee on our CISM training. CLICK HERE to know more about the money back guarantee.
Is this course accredited?
No, this course is not accredited. However, our course material is well aligned with the official guide and developed by a panel of certified instructors.
How long the course materials access will be provided?
All registered participants will receive a link to download the courseware from Dropbox. Once downloaded, you will have lifetime single-user access to the CG course material.
When will I receive the course location and the workshop details?
Registration confirmation email and the courseware access will be shared immediately after the registration. Other details such as location, venue, timing’s. do’s and don’ts will shared 5 day prior for in-person classroom training and link to join the class, timing’s (time zone) details will be shared 24 our prior to the class.
How do I reschedule OR cancel my enrolment?
Absolutely yes, you need to drop an email to Support@certificationguide.com with your request, and depending upon when you raise a refund or rescheduling request, a fee will be applicable. To learn more, please read our refund policy.
Is there an assistance with an exam application and scheduling?
Yes, for online exams, we will help you set up your PC/Laptop, and for an In-person exam, we will help you find the nearest location, available date and time.
Who are the instructors?
The trainers are highly qualified and certified instructors with years of relevant industry and coaching experience who will hand hold you through the workshop and ensure your success.
Related products
-
CISA – Certification Training
Certified Information Systems Auditor® (CISA®) Certification Training
Certification Guide’s Certified Information Systems Auditor® (CISA®) training is a globally recognized and the most valuable professional certification training in Information Technology Audit… -
CISSP – Certification Training
Certified Information Systems Security Professional (CISSP®) – Certification Training
CISSP is the most renowned certification in the information security domain. Our CISSP certification training program aims to equip participants with…