close

close

Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.

close

close

Press esc to close

close close

Back to course information

Thank you for your enquiry!

One of our training experts will be in touch shortly to go overy your training requirements.

close close

Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.

CISM Training

Online Instructor-led (4 days)

Online Self-paced (32 hours)

Certified Information Security Manager (CISM) Training Outline

This CISM training course covers the following areas:

 

Domain 1: Information Security Governance

Module 1: Introduction to Information Security Governance

  • About Information Security Governance
  • Reason for Security Governance
  • Security Governance Activities and Results
  • Business Alignment
  • Risk Appetite
  • Roles and Responsibilities
  • Monitoring Responsibilities
  • Information Security Governance Metrics
  • Security Balanced Scorecard
  • Business Model for Information Security
  • Zachman Framework

Module 2: Security Strategy Development

  • Strategy Objectives
  • Control Frameworks
  • Risk Objectives
  • Strategy Resources
  • Strategy Development
  • Strategy Constraints

Domain 2: Information Risk Management

Module 3: Risk Management Concepts

  • Risk Management Concepts
  • Importance of Risk Management
  • Outcomes of Risk Management
  • Risk Management Technologies

Module 4: Implementing a Risk Management Programme

  • Risk Management Strategy
  • Risk Management Framework
  • R I M S
  • RIMS Report
  • FRAP Facilitated Risk Management
  • Risk Management Context
  • Gap Analysis
  • External Support

Module 5: Risk Management Life Cycle

  • Risk Management Methodologies
  • Asset Identification and Valuation
  • Asset Classification
  • Asset Valuation
  • Threat Identification
  • Vulnerability Identification
  • Risk Identification
  • Risk Analysis Techniques and Considerations

Module 6: Operational Risk Management

  • Risk Management Objectives
  • Risk Management and Business Continuity Planning
  • Third-Party Risk Management
  • Risk Register
  • Integration of Risk Management into Other Processes
  • Risk Monitoring and Reporting
  • Key Risk Indicators
  • Training and Awareness
  • Risk Documentation

Domain 3: Information Security Programme Development and Management

Module 7: Information Security Programmes

  • Introduction to Information Security Programme
  • Outcomes
  • Charter
  • Information Security Management Frameworks
  • Information Security Architecture

Module 8: Security Programme Management

  • Risk Management
  • Risk Management Programme
  • Risk Treatment
  • Audit and Reviews
  • Third-Party Risk Management

Module 9: Security Programme Operations

  • Event Monitoring
  • Vulnerability Management
  • Security Engineering and Development
  • Network Protection
  • Endpoint Protection and Management
  • Identity and Access Management
  • Security Incident Management
  • Security Awareness Training
  • Managed Security Service Providers
  • Data Security
  • Cryptography
  • Symmetric Key Algorithms

Module 10: IT Service Management

  • Service Desk
  • Incident Management
  • Problem Management
  • Change Management
  • Configuration Management
  • Release Management
  • Service Levels Management
  • Financial Management
  • Capacity Management
  • Service Continuity Management
  • Availability Management
  • Asset Management

Module 11: Controls

  • Internal Control Objectives
  • Information Systems Control Objectives
  • General Computing Controls
  • Control Frameworks
  • Controls Development
  • Control Assessment

Module 12: Metrics and Monitoring

  • Types of Metrics
  • Audiences
  • Continuous Improvement

Domain 4: Information Security Incident Management

Module 13: Security Incident Response Overview

  • Phases of Incident Response

Module 14: Incident Response Plan Development

  • Objectives
  • Maturity
  • Resources
  • Roles and Responsibilities
  • Gap Analysis
  • Plan Development

Module 15: Responding to Security Incidents

  • Detection
  • Initiation
  • Evaluation
  • Recovery
  • Remediation
  • Closure
  • Post-Incident Review

Module 16: Business Continuity and Disaster Recovery Planning

  • Business Continuity Planning
  • Disaster
  • Disaster Recovery Planning
  • Testing BC and DR Planning

Show moredown

Prerequisites

There are no prerequisites for this CISM training course. However, candidates will thrive if they have some information security experience.

Audience

This training course is designed for experienced Information Security Managers and others involved in directing information security programmes. However, this training course will be much more beneficial for:

  • Information Security Managers
  • IT Consultants
  • Chief Information Officers

Certified Information Security Manager (CISM) Training Overview

Information security managers are IT experts that supervise other IT workers by performing various information and digital security activities. Information security managers are focused on ensuring that their team properly meets their organisation's information security demands. Studying the CISM (Certified Information Security Manager) Training course will help learners to comprehend the information security system topics. It helps associations by recommending and implementing needed updates to the existing systems. This training will also indicate the expertise of individuals in information security governance, programme development and management, and risk management. Acquiring the required skills and knowledge of securing the data will surely help individuals to undertake various international jobs.

This 4-day CISM (Certified Information Security Manager) training course covers all the essential topics by which delegates will become fully familiar with the information security system. During this training, delegates will get familiar with the information security programme development and management. They will also learn about the importance of risk management, strategy development, asset valuation, gap analysis, data security, financial management, and many more. Our highly professional trainer with years of experience in teaching such courses will conduct this training course and will help you get a complete understanding of this course.

This training will cover various essential topics, such as: 

  • Risk appetite
  • Asset classification
  • Risk register
  • Problem management
  • Cryptography  
  • Key risk indicators

After attending this CISM (Certified Information Security Manager) training course, delegates will be able to implement a risk management programme in an organisation effectively. They will also be able to efficiently plan business continuity, disaster recovery, and risk management.

If you are interested in improving and developing more skills for Information Security Manager role, we provide a wide range of training that will help you develop your skills and knowledge. These courses are BCS CISMP (Certificate In Information Security Management Principles), Chief Information Security Officer Training, and many more.

Show moredown

What’s Included in this CISM Training Course?

  • Exam Pass Guarantee
  • Experienced CISM Instructor
  • Certificate on Completion
  • Refreshments

Show moredown

Not sure which course to choose?

Speak to a training expert for advice if you are unsure of what course is right for you. Give us a call on 646-687-6780 or Inquire.

Package deals

Our training experts have compiled a range of course packages to compliment a variety of categories in order to help fast track your career. The packages consist of the best possible qualifications in each industry and allows you to purchase multiple courses at a discounted rate.

Swipe for more. Don’t miss out!

What our customers are saying

Frequently asked questions

FAQ's

The Knowledge Academy’s CISM training courses include an exam pass guarantee, the courseware book, course material, ISACA exam preparation, a certificate, an experienced instructor, and refreshments.
Our exam pass guarantee essentially assures that we will support you until you pass your CISM examination. We guarantee that if you attend our training course, you will pass your CISM exam. All we require is that you sit the exam within 90 days of course completion, you attend all classes, and complete all assignments (pre-course work and homework). If you do happen to fail your CISM examination, you will be able to attend the class again and re-sit the exam free of charge. CISM examination results must be confirm to allow re-enrolment (subject to availability).
No, examinations are not included with CISM training courses as exams are provided by ISACA. You will need to book directly with ISACA using this address: http://www.isaca.org/certification/pages/exam-registration.aspx.
CISM training courses are designed for anyone interested/involved in information systems management.
Please see our CISM Training courses available in the United States
The Knowledge Academy is the Leading global training provider in the world for CISM Training.
The price for CISM Training certification in the United States starts from $.

Why we're the go to training provider for you

icon

Best price in the industry

You won't find better value in the marketplace. If you do find a lower price, we will beat it.

icon

Trusted & Approved

We are accredited by PeopleCert on behalf of AXELOS

icon

Many delivery methods

Flexible delivery methods are available depending on your learning style.

icon

High quality resources

Resources are included for a comprehensive learning experience.

barclays Logo
deloitte Logo
Thames Water Logo

"Really good course and well organised. Trainer was great with a sense of humour - his experience allowed a free flowing course, structured to help you gain as much information & relevant experience whilst helping prepare you for the exam"

Joshua Davies, Thames Water

santander logo
bmw Logo
Google Logo