Description
Who Should Attend
ISACAโs Certified Information Security Manager (CISM) is a globally recognized certification in the field of information security management. The CISM certification is designed for individuals who have experience in managing, designing, and overseeing an organizationโs information security. This certification is intended for professionals working in positions such as Information Security Manager, Information Security Officer, Information Risk Manager, Information Security Director, and Chief Information Security Officer.
To become a CISM, candidates must pass an exam that tests their knowledge of four domains:
-Information Security Governance
-Information Risk Management
-Information Security Program Development and Management
-Information Security Incident Management
In addition to passing the exam, candidates must also have a minimum of five years of professional experience in the information security field, including a minimum of three years of experience in information security management.
Holding the CISM certification validates an individualโs ability to design, implement, monitor and manage an enterprise-wide information security program. It also acknowledges the individualโs knowledge in the areas of information security governance, information risk management and incident management. It is widely recognized by employers and the industry, it helps to advance professionalโs career and increase their income.
You Will Be Able to
Prepare for and pass the Certified Information Security Manager (CISM) exam
Develop an information security strategy and plan of action to implement the strategy
Manage and monitor information security risks
Build and maintain an information security plan
Implement policies and procedures to respond to and recover from disruptive and destructive information security events
Continue learning and face new challenges with after-course one-on-one instructor coaching
CISM Exam Pass Guarantee
When you decide to take one of our courses, you are placing trust in us. Our Exam Pass Guarantee was designed to help you reach your goal to pass the certification exam. If you do not pass the certification exam, you may retake this program live or online and/or enroll in our mentoring program at no additional cost.
Topics Covered in this Official Boot Camp:
CISM Course Outline
Information Security Governance
Enterprise Governance
โขOrganizational Culture
โขLegal, Regulatory, and Contractual Requirements
โขOrganizational Structures, Roles, and Responsibilities
Information Security Strategy
โขInformation Security Strategy Development
โขInformation Governance Frameworks and Standards
โขStrategic Planning (e.g., budgets, resources, business case).
Information Security Risk Management
Information Security Risk Assessment
โขEmerging Risk and Threat Landscape
โขVulnerability and Control Deficiency Analysis
โขRisk Assessment and Analysis
Information Security Risk Response
โขRisk Treatment / Risk Response Options
โขRisk and Control Ownership
โขRisk Monitoring and Reporting
Information Security Program
Information Security Program Development
โขInformation Security Program Resources (e.g., people, tools, technologies)
โขInformation Asset Identification and Classification
โขIndustry Standards and Frameworks for Information Security
โขInformation Security Policies, Procedures, and Guidelines
โขInformation Security Program Metrics
Information Security Program Management
โขInformation Security Control Design and Selection
โขInformation Security Control Implementation and Integrations
โขInformation Security Control Testing and Evaluation
โขInformation Security Awareness and Training
โขManagement of External Services (e.g., providers, suppliers, third parties, fourth parties)
โขInformation Security Program Communications and Reporting
Incident Management
Incident Management Readiness
โขIncident Response Plan
โขBusiness Impact Analysis (BIA)
โขBusiness Continuity Plan (BCP)
โขDisaster Recovery Plan (DRP)
โขIncident Classification/Categorization
โขIncident Management Training, Testing, and Evaluation
Incident Management Operations
โขIncident Management Tools and Techniques
โขIncident Investigation and Evaluation
โขIncident Containment Methods
โขIncident Response Communications (e.g., reporting, notification, escalation)
โขIncident Eradication and Recovery
โขPost-incident Review Practices
ISACA CISM Certification Exam Review
Exam Structure
Exam Registration Process
Time Management
Topics and Concepts
ISACA CISM Certification Question Structure
Vendor Interpretation Techniques