CISM Certified Information Security Manager Overview

Course syllabus

Who it’s for

What’s included

FAQs

Certified Information Security Manager (CISM) Training Course Outline

Domain 1: Information Security Governance

Module 1: Introduction to Information Security Governance

  • About Information Security Governance
  • Reason for Security Governance
  • Security Governance Activities and Results
  • Risk Appetite
  • Organisation Culture

Module 2: Legal, Regulatory and Contractual Requirements

  • Introduction
  • Requirements for Content and Retention of Business Records

Module 3: Organisational Structures, Roles and Responsibilities

  • Roles and Responsibilities
  • Monitoring Responsibilities

Module 4: Information Security Strategy Development

  • Introduction
  • Business Goals and Objectives
  • Information Security Strategy Objectives
  • Ensuring Objective and Business Integration
  • Avoiding Common Pitfalls and Bias
  • Desired State
  • Elements of a Strategy

Module 5: Information Governance Frameworks and Standards

  • Security Balanced Scorecard
  • Architectural Approaches
  • Enterprise Risk Management Framework
  • Information Security Management Frameworks and Models

Module 6: Strategic Planning

  • Workforce Composition and Skills
  • Assurance Provisions
  • Risk Assessment and Management
  • Action Plan to Implement Strategy
  • Information Security Programme Objectives

Domain 2: Information Security Risk Management

Module 7: Emerging Risk and Threat Landscape

  • Risk Identification
  • Threats
  • Defining a Risk Management Framework
  • Emerging Threats
  • Risk, Likelihood and Impact
  • Risk Register

Module 8: Vulnerability and Control Deficiency Analysis

  • Introduction
  • Security Control Baselines
  • Events Affecting Security Baselines

Module 9: Risk Assessment and Analysis

  • Introduction
  • Determining the Risk Management Context
  • Operational Risk Management
  • Risk Management Integration with IT Life Cycle Management Processes
  • Risk Scenarios
  • Risk Assessment Process
  • Risk Assessment and Analysis Methodologies
  • Other Risk Assessment Approaches
  • Risk Analysis
  • Risk Evaluation
  • Risk Ranking

Module 10: Risk Treatment or Risk Response Options

  • Risk Treatment/Risk Response Options
  • Determining Risk Capacity and Acceptable Risk
  • (Risk Appetite)
  • Risk Response Options
  • Risk Acceptance Framework
  • Inherent and Residual Risk
  • Impact
  • Controls
  • Legal and Regulatory Requirements
  • Costs and Benefits

Module 11: Risk and Control Ownership

  • Risk Ownership and Accountability
  • Risk Owner
  • Control Owner

Module 12: Risk Monitoring and Reporting

  • Risk Monitoring
  • Key Risk Indicators
  • Reporting Changes in Risk
  • Risk Communication, Awareness and Consulting
  • Documentation

Domain 3: Information Security Programme Development and Management

Module 13: Information Security Programme Resources

  • Introduction
  • Information Security Programme Objectives
  • Information Security Programme Concepts
  • Common Information Security Programme Challenges
  • Common Information Security Programme Constraints

Module 14: Information Asset Identification and Classification

  • Information Asset Identification and Valuation
  • Information Asset Valuation Strategies
  • Information Asset Classification
  • Methods to Determine Criticality of Assets and Impact of Adverse Events

Module 15: Industry Standards and Frameworks for Information Security

  • Enterprise Information Security Architectures
  • Information Security Management Frameworks
  • Information Security Frameworks Components

Module 16: Information Security Policies, Procedures, and Guidelines

  • Policies
  • Standards
  • Procedures
  • Guidelines

Module 17: Information Security Programme Metrics

  • Introduction
  • Effective Security Metrics
  • Security Programme Metrics and Monitoring
  • Metrics Tailored to Enterprise Needs

Module 18: Information Security Control Design and Selection

  • Introduction
  • Managing Risk Through Controls
  • Controls and Countermeasures
  • Control Categories
  • Control Design Considerations
  • Control Methods

Module 19: Security Programme Management

  • Risk Management
  • Risk Management Programme
  • Risk Treatment
  • Audit and Reviews
  • Third-Party Risk Management

Module 20: Security Programme Operations

  • Event Monitoring
  • Vulnerability Management
  • Security Engineering and Development
  • Network Protection
  • Endpoint Protection and Management
  • Identity and Access Management
  • Security Incident Management
  • Security Awareness Training
  • Managed Security Service Providers
  • Data Security
  • Cryptography
  • Symmetric Key Algorithms

Module 21: IT Service Management

  • Service Desk
  • Incident Management
  • Problem Management
  • Change Management
  • Configuration Management
  • Release Management
  • Service Levels Management
  • Financial Management
  • Capacity Management
  • Service Continuity Management
  • Availability Management
  • Asset Management

Module 22: Controls

  • Internal Control Objectives
  • Information Systems Control Objectives
  • General Computing Controls
  • Control Frameworks
  • Controls Development
  • Control Assessment

Module 23: Metrics and Monitoring

  • Types of Metrics
  • Audiences
  • Continuous Improvement

Domain 4: Information Security Incident Management

Module 24: Security Incident Response Overview

  • Phases of Incident Response

Module 25: Incident Response Plan Development

  • Objectives
  • Maturity
  • Resources
  • Roles and Responsibilities
  • Gap Analysis
  • Plan Development

Module 26: Responding to Security Incidents

  • Detection
  • Initiation
  • Evaluation
  • Recovery
  • Remediation
  • Closure
  • Post-Incident Review

Module 27: Business Continuity and Disaster Recovery Planning

  • Business Continuity Planning
  • Disaster
  • Disaster Recovery Planning
  • Testing BC and DR Planning
Show more blue-arrow

Who should attend this CISM Certified Information Security Manager Course?

The CISM Course is a globally recognised certification focusing on developing a professional’s expertise in managing Information Security systems and practices. This CISM Certification Course can be beneficial for professionals, including:

  • Information Security Managers
  • Internal Auditors
  • Risk Management Specialists
  • Compliance Officers
  • Security Analysts
  • IT Consultants
  • Data Protection Officers

Prerequisites of the CISM Certified Information Security Manager Course

There are no formal prerequisites for this CISM Certified Information Security Manager Course. However, a basic understanding of Information Security and experience in job roles related to it can be beneficial for delegates.

CISM Certified Information Security Manager Course Overview

The Certified Information Security Manager (CISM) Training equips professionals with the skills and knowledge to safeguard valuable information assets. It is a highly relevant and crucial discipline in a technology-driven landscape. CISM, offered by ISACA, is a globally recognised certification that ensures individuals are well-versed in managing and governing an organisation's information security.

Proficiency in the CISM Training Course is vital as it empowers professionals to navigate the complex landscape of Information Security, ensuring the confidentiality, integrity, and availability of data. IT and Cybersecurity Experts, Risk Managers, Compliance Officers, and those aspiring to lead and manage information security teams should aim to master CISM.

The Knowledge Academy’s 4-day CISM Training gives delegates a comprehensive understanding of Information Security Management. Delegates will gain expertise in risk management, governance, incident response, and security development. Through real-world case studies and practical exercises, delegates will learn how to apply their knowledge effectively, making them invaluable assets to their organisations.

Course Objectives

  • To understand the core principles of Information Security governance
  • To learn to develop and manage an Information Security aligned with business objectives
  • To master risk management processes to safeguard an organisation's assets
  • To acquire skills for incident response and recovery
  • To gain the ability to establish and maintain Information Security policies and procedures
  • To develop the competence to align Information Security with regulatory and compliance requirements
  • To learn how to manage and govern Information Security teams effectively
  • To prepare for the CISM exam and enhance their career prospects

After completing this CISM Training and passing the certification exam, delegates will be recognised as Certified Information Security Managers. This globally respected CISM Certification demonstrates their expertise in Information Security management and opens up numerous career opportunities.

Show more blue-arrow

What’s included in this CISM Certified Information Security Manager Course?

  • World-Class Training Sessions from Experienced Instructors
  • CISM Certificate
  • Digital Delegate Pack

You’ll also get access to the MyTKA Training Portal, which will be your go to hub for all your training.
Show more blue-arrow
Show more blue-arrow

Ways to take CISM Certified Information Security Manager

Online Instructor-Led Learning

Online Self-Paced Learning

Onsite Learning

Experience live, interactive learning from home with The Knowledge Academy's Online Instructor-led CISM Certified Information Security Manager Course. Engage directly with expert instructors, mirroring the classroom schedule for a comprehensive learning journey. Enjoy the convenience of virtual learning without compromising on the quality of interaction.

classes

Live classes

Join a scheduled class with a live instructor and other delegates.

interactive

Interactive

Engage in activities, and communicate with your trainer and peers.

degree

Global Pool of the Best Trainers

We handpick from a global pool of expert trainers for our Online Instructor-led courses.

expertise

Expertise

With 10+ years of quality, instructor-led training, we equip professionals with lasting skills for success.

global

Global Reach

With classes running in all timezones, access any of our courses and course material from anywhere, anytime.

Master CISM Certified Information Security Manager with a flexible yet structured approach that combines live, expert-led sessions and self-paced study. With weekly one-to-one tutor support and consistently high pass rates, you’ll receive tailored guidance and achieve real results.

trainer

Structured Yet Flexible Learning

Take part in scheduled, instructor-led sessions with real-time feedback, while enjoying the freedom to study independently. Interactive resources and progress tracking tools help you stay motivated and on target.

venue

Engaging & Interactive Training

Join dynamic live sessions featuring discussions, practical activities, and peer collaboration. Learn from CISM Certified Information Security Manager industry experts and reinforce your knowledge with self-paced modules—plus, connect with professionals in your field.

classes

Expert-Led Course

Gain valuable insight from experienced trainers during live sessions, and revisit course materials anytime to deepen your understanding. This method offers the ideal balance between expert guidance and independent learning.

money

Global Training Accessibility

Access top-quality training across time zones—anytime, anywhere. Whether at home or on the go, our expert-led sessions and flexible study materials support your goals, and help you on the journey towards the certification.

Package deals for CISM Certified Information Security Manager

Our training experts have compiled a range of course packages on a variety of categories in CISM Certified Information Security Manager, to boost your career. The packages consist of the best possible qualifications with CISM Certified Information Security Manager, and allows you to purchase multiple courses at a discounted rate.

CISM Certified Information Security Manager FAQs

What is a CISM (Certified Information Security Manager)?

Certified Information Security Manager (CISM) is a globally recognised certification for information security professionals. It validates expertise in managing, designing, and assessing information security programs, focusing on governance, risk management, and ensuring organisational compliance with cybersecurity standards.

What are the benefits of completing Certified Information Security Manager Training Course?

Certified Information Security Manager Course enhances your skills in managing security programs, boosts your career prospects, and provides global recognition. It equips you to handle complex security challenges, ensuring organisational resilience against cyber threats while improving earning potential in the cybersecurity field.

Do I need any prior certifications to attend Certified Information Security Manager Course ?

No prior certifications are required to attend the Certified Information Security Manager Course. However, having experience in information security or related fields can help you better understand the advanced concepts covered during the training.

Where can I complete CISM Certified Information Security Manager Training?

You can complete the Certified Information Security Manager Training with reputable providers like The Knowledge Academy, authorised ISACA centres, or online platforms. These options provide expert-led sessions and resources to prepare you for the CISM certification exam effectively.

Who should attend this Certified Information Security Manager Course?

Certified Information Security Manager is ideal for Information Security Managers, IT Professionals, Risk Managers, and anyone responsible for securing organisational data. It is also beneficial for those aspiring to take on leadership roles in cybersecurity.

What are the roles and responsibilities of a Certified Information Security Manager?

A Certified Information Security Manager designs and manages security policies, ensures compliance with regulations, mitigates risks, and leads cybersecurity teams. They align security strategies with business goals, ensuring robust protection for organisational information assets.

What will I learn during the Certified Information Security Manager (CISM) Training Course?

You will learn information security governance, risk management, incident response, and program development. The course focuses on advanced security concepts, enabling you to design, implement, and manage comprehensive security strategies for organisations.

What are the levels of difficulties for these Certified Information Security Manager Training?

The Certified Information Security Manager Training is designed to be accessible to all levels, making it suitable for both beginners and experienced professionals. It covers foundational concepts while offering in-depth insights into personal and organisational growth strategies.

Can I take Certified Information Security Manager Course if I don't have experience in the field?

Yes, you can take the course even without prior experience. However, gaining practical experience in information security roles is essential for certification eligibility and to maximise the value of the training.

What is included in this Certified Information Security Manager Training Course?

In this training course, delegates will have intensive training with our experienced instructors, a digital delegate pack consisting of important notes related to certified information security manager , and a certificate after course completion.

What is the difference between Certified Information Security Manager Certification and other cybersecurity certifications?

CISM focuses on security management, governance, and risk, while certifications like CISSP emphasise technical security practices. CISM is ideal for leadership roles, whereas others may focus on hands-on technical expertise in cybersecurity.

What to do after completing Certified Information Security Manager Training?

After training, gain relevant work experience to meet certification requirements, take the CISM exam, and apply your skills in information security roles. You can also pursue advanced certifications or specialise further in cybersecurity management.

Do you offer 24/7 support for this Certified Information Security Manager Course?

Yes, The Knowledge Academy offers 24/7 support via phone & email before attending, during, and after the course. Our customer support team is available to assist and promptly resolve any issues you may encounter.

What is the duration of this CISM Certified Information Security Manager Training?

Certified Information Security Manager Training takes 4-day to complete during which delegates participate in intensive learning sessions that cover various course topics.

Do you provide self-paced online Certified Information Security Manager Course?

The Knowledge Academy provides flexible self-paced training for certified information security manager . Self-paced training is beneficial for individuals who have an independent learning style and wish to study at their own pace and convenience.

Who should I contact if I am unable to access my Certified Information Security Manager (CISM) Training?

If you are unable to access your training, contact the support team at The Knowledge Academy via their customer service email or phone number provided on their website for prompt assistance and resolution of your issue.

What is the cost/training fees for CISM Certified Information Security Manager in Canada?

The training fees for CISM Certified Information Security Managerin Canada starts from CAD4295

Which is the best training institute/provider of CISM Certified Information Security Manager in Canada?

The Knowledge Academy is the Leading global training provider for CISM Certified Information Security Manager.

What are the best CISM Training courses in Canada?

Please see our CISM Training courses available in Canada

Show more blue-arrow

Customers Reviews

Request For Pricing

WHO WILL BE FUNDING THE COURSE?
+44

Corporate Training

Unlock tailored pricing and customised training solutions for your team’s needs.

Request your quote today!

Why choose The Knowledge Academy

price

Best price in the industry

You won't find better value in the marketplace. If you do find a lower price, we will beat it.

learning

Many delivery methods

Flexible delivery methods are available depending on your learning style.

resources

High quality resources

Resources are included for a comprehensive learning experience.

Our Clients

"Really good course and well organised. Trainer was great with a sense of humour - his experience allowed a free flowing course, structured to help you gain as much information & relevant experience whilst helping prepare you for the exam"

Joshua Davies, Thames Water
santander barclays bmw google thames-water deloitte bupa tesla
cross
Unlock up to 40% off today!

Get Your Discount Codes Now and Enjoy Great Savings

WHO WILL BE FUNDING THE COURSE?

close

close

Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.

close

close

Press esc to close

close close

Back to course information

Thank you for your enquiry!

One of our training experts will be in touch shortly to go overy your training requirements.

close close

Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.