Key points about this course

Certified Information Security Manager (CISM)

Title: Certified Information Security Manager (CISM)

Duration: 4 Days

Certification Exam(s): Certified Information Security Manager (CISM)

Accredited: No

Pre-course Reading: 1-2 Hours

Rating: 5 Star

Support: Fully Available

 

Dates and Prices Course Information

 

Certified Information Security Manager (CISM) Training Course

The CISM Review Course is an intensive, four-day review program to prepare individuals who are planning to sit for the Certified Information Security Manager (CISM) exam. The course focuses on the key points covered in the CISM Review Manual 15th Edition and includes class lectures, group discussions/activities, exam practice and answer debrief. 

This training course equips professionals with the knowledge and skills for proficiency in information security management. It also helps in passing the certification examination successfully.

HIGHLIGHTS

  • Based on official CISM syllabus by ISACA
  • Industry experienced consultants as trainers
  • Learn Information Security Management & prepare for exam in 4 days

Continue Reading...

Select your preferred delivery method

Select a Month

Online Instructor-Led

Sep 06, 2021

Places Available

1995

(ex. VAT)

Book Now

Online Instructor-Led

Oct 04, 2021

Places Available

1995

(ex. VAT)

Book Now

Online Instructor-Led

Nov 01, 2021

Places Available

1995

(ex. VAT)

Book Now

Online Instructor-Led

Dec 06, 2021

Places Available

1995

(ex. VAT)

Book Now

 

Select a Month

Online Instructor-Led

Sep 06, 2021

Places Available

1995

(ex. VAT)

Book Now

Online Instructor-Led

Oct 04, 2021

Places Available

1995

(ex. VAT)

Book Now

Online Instructor-Led

Nov 01, 2021

Places Available

1995

(ex. VAT)

Book Now

Online Instructor-Led

Dec 06, 2021

Places Available

1995

(ex. VAT)

Book Now

 

Select a Country
Select a Location
Select a Month

There are no training slots currently available for Classroom method of delivery. Why not check Virtual Classroom slots?

Alternatively, please Contact us and we may be able to help you.

Course Information

Overview
Prerequisites

There are no formal pre-requisites for joining this course. However, basic understanding of IT security or IT security management will be useful.

Course Outline

Course trainer will cover following areas for the Certified Information Security Manager (CISM) course:

  • Domain 1: Information Security Governance
    • Information Security Governance Overview
    • Effective Information Security Governance
    • Roles and Responsibilities
    • Risk Management Roles and Responsibilities
    • Governance of Third-party Relationships
    • Information Security Governance Metrics
    • Information Security Strategy Overview
    • Information Security Strategy Objectives
    • Determining the Current State of Security
    • Information Security Strategy Development
    • Strategy Resources
    • Strategy Constraints
    • Action Plan to Implement Strategy
    • Information Security Program Objectives
  • Domain 2: Information Risk Management
    • Risk Management Overview
    • Risk Management Strategy
    • Effective Information Risk Management
    • Information Risk Management Concepts
    • Implementing Risk Management
    • Risk Assessment and Analysis Methodologies
    • Risk Assessment
    • Information Asset Classification
    • Operational Risk Management
    • Third-party Service Providers
    • Risk Management Integration With Life Cycle Processes
    • Security Control Baselines
    • Risk Monitoring and Communication
  • Domain 3: Information Security Program Development and Management
    • Information Security Program Management Overview
    • Information Security Program Objectives
    • Information Security Program Concepts
    • Scope and Charter of an Information Security Program
    • The Information Security Management Framework
    • Information Security Framework Components
    • Defining an Information Security Program Road Map
    • Information Security Infrastructure and Architecture
    • Architecture Implementation
    • Security Program Management and Administrative Activities
    • Security Program Services and Operational Activities
    • Controls and Countermeasures
    • Security Program Metrics and Monitoring
    • Common Information Security Program Challenges
  • Domain 4: Information Security Incident Management
    • Incident Management Overview
    • Incident Response Procedures
    • Incident Management Organization
    • Incident Management Resources
    • Incident Management Objectives
    • Incident Management Metrics and Indicators
    • Defining Incident Management Procedures
    • Current State of Incident Response Capability
    • Developing an Incident Response Plan
    • Business Continuity and Disaster Recovery Procedures
    • Testing Incident Response and Business Continuity/Disaster Recovery Plans
    • Executing Response and Recovery Plans

Post-incident Activities and Investigation

Who should attend?

This course is highly valuable for:

  • Chief Information Officers
  • Chief Information Security Officers
  • Security Professionals who are taking or considering taking the CISM examination
  • Anyone seeking an overall understanding of essential IT security risks and controls.

Virtual classroom trainings are held using video conferencing software. A trainer leads the class for the duration of course. Delegates may attend the session using PC, laptop or tablets.

Virtual classroom trainings are held using video conferencing software, lead by a trainer. Delegates may attend the sessions using PC, laptop or tablets. Such trainings are held like normal classrooms where delegates ask questions, take part in exercises, interact with trainer throughout the course.

Tecknologia uses licensed APMG Learning Platform (ALP) which is fully integrated into APMG systems and operates securely.

Delegates may attend the session using PC, laptop or tablets. Device used by delegate MUST have (or be connected to external) webcam, microphone and speaker.

This course has been designed and developed by Tecknologia hence it is not accredited by any certification body.

Tecknologia trainers are highly experienced practitioners with excellent training delivery capabilities. Our trainers are fully accredited by ISACA for relevant training deliveries.

Delegates will need to book the exam directly with ISACA and take the exam according to the available schedule.

Exam is not part of this course. Please refer to ISACA website for full details of CISM exam and certification.

No, the exam is not included. Delegates need to book their exam through ISACA:
http://www.isaca.org/certification/pages/exam-registration.aspx.

90% of delegates who attend this training with us pass the exam in first attempt. Our accredited trainers simplify Information Security Management concepts for you to understand, and prepare you for exam in 4 days. Delegates should participate actively in group discussions.

  • Course reference manual containing copy of course slides
  • Support documents
  • Quizzes and answers
  • Practice exam
  • Course Certificate


Delegates Testimonials!

Certified Information Security Manager (CISM) training course prepares delegates for CISM certification that indicates expertise in information security governance, programme development & management, incident and risk management.

Certified Information Security Manager (CISM) training course helps prepare for CISM exam that tests credibility of delegates as an expert in IS/IT audit, control and information security. This course elevates delegates within their organizations and helps them stand out in the hiring and promotion process. 

Throughout Tecknologia’s Certified Information Security Manager (CISM) training course, our experienced instructors will guide delegates through the critical concepts needed to master the CISM exam. Tecknologia instructors will also guide the delegates on how to approach the CISA exam when attempted. 

With this 4 days Certified Information Security Manager (CISM) training course candidates should expect to gain competencies in the following areas:

  • Information Security Governance
  • Information Risk Management
  • Information Security Program Development and Management
  • Information Security Incident Management.
Tecknologia1611439668_CISM.png Tecknologia1611439668_CISM.png123 /uploads/1611439668_CISM.png