Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.



Press esc to close

close close

Back to course information

Thank you for your enquiry!

One of our training experts will be in touch shortly to go overy your training requirements.

close close

Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.

Course Information

Certified Information Security Manager (CISM) Training Outline

This CISM training course covers the following areas:


Domain 1: Information Security Governance

Module 1: Introduction to Information Security Governance

  • About Information Security Governance
  • Reason for Security Governance
  • Security Governance Activities and Results
  • Business Alignment
  • Risk Appetite
  • Roles and Responsibilities
  • Monitoring Responsibilities
  • Information Security Governance Metrics
  • Security Balanced Scorecard
  • Business Model for Information Security
  • Zachman Framework

Module 2: Security Strategy Development

  • Strategy Objectives
  • Control Frameworks
  • Risk Objectives
  • Strategy Resources
  • Strategy Development
  • Strategy Constraints

Domain 2: Information Risk Management

Module 3: Risk Management Concepts

  • Risk Management Concepts
  • Importance of Risk Management
  • Outcomes of Risk Management
  • Risk Management Technologies

Module 4: Implementing a Risk Management Programme

  • Risk Management Strategy
  • Risk Management Framework
  • R I M S
  • RIMS Report
  • FRAP Facilitated Risk Management
  • Risk Management Context
  • Gap Analysis
  • External Support

Module 5: Risk Management Life Cycle

  • Risk Management Methodologies
  • Asset Identification and Valuation
  • Asset Classification
  • Asset Valuation
  • Threat Identification
  • Vulnerability Identification
  • Risk Identification
  • Risk Analysis Techniques and Considerations

Module 6: Operational Risk Management

  • Risk Management Objectives
  • Risk Management and Business Continuity Planning
  • Third-Party Risk Management
  • Risk Register
  • Integration of Risk Management into Other Processes
  • Risk Monitoring and Reporting
  • Key Risk Indicators
  • Training and Awareness
  • Risk Documentation

Domain 3: Information Security Programme Development and Management

Module 7: Information Security Programmes

  • Introduction to Information Security Programme
  • Outcomes
  • Charter
  • Information Security Management Frameworks
  • Information Security Architecture

Module 8: Security Programme Management

  • Risk Management
  • Risk Management Programme
  • Risk Treatment
  • Audit and Reviews
  • Third-Party Risk Management

Module 9: Security Programme Operations

  • Event Monitoring
  • Vulnerability Management
  • Security Engineering and Development
  • Network Protection
  • Endpoint Protection and Management
  • Identity and Access Management
  • Security Incident Management
  • Security Awareness Training
  • Managed Security Service Providers
  • Data Security
  • Cryptography
  • Symmetric Key Algorithms

Module 10: IT Service Management

  • Service Desk
  • Incident Management
  • Problem Management
  • Change Management
  • Configuration Management
  • Release Management
  • Service Levels Management
  • Financial Management
  • Capacity Management
  • Service Continuity Management
  • Availability Management
  • Asset Management

Module 11: Controls

  • Internal Control Objectives
  • Information Systems Control Objectives
  • General Computing Controls
  • Control Frameworks
  • Controls Development
  • Control Assessment

Module 12: Metrics and Monitoring

  • Types of Metrics
  • Audiences
  • Continuous Improvement

Domain 4: Information Security Incident Management

Module 13: Security Incident Response Overview

  • Phases of Incident Response

Module 14: Incident Response Plan Development

  • Objectives
  • Maturity
  • Resources
  • Roles and Responsibilities
  • Gap Analysis
  • Plan Development

Module 15: Responding to Security Incidents

  • Detection
  • Initiation
  • Evaluation
  • Recovery
  • Remediation
  • Closure
  • Post-Incident Review

Module 16: Business Continuity and Disaster Recovery Planning

  • Business Continuity Planning
  • Disaster
  • Disaster Recovery Planning
  • Testing BC and DR Planning

Show moredowndown


There are no prerequisites for this CISM training course. However, candidates will thrive if they have some information security experience.


This training course is designed for experienced Information Security Managers and others involved in directing information security programmes. However, this training course will be much more beneficial for:

  • Information Security Managers
  • IT Consultants
  • Chief Information Officers

Certified Information Security Manager (CISM) Training Overview

Information security managers are IT experts that supervise other IT workers by performing various information and digital security activities. Information security managers are focused on ensuring that their team properly meets their organisation's information security demands. Studying the CISM (Certified Information Security Manager) Training course will help learners to comprehend the information security system topics. It helps associations by recommending and implementing needed updates to the existing systems. This training will also indicate the expertise of individuals in information security governance, programme development and management, and risk management. Acquiring the required skills and knowledge of securing the data will surely help individuals to undertake various international jobs.

This 4-day CISM (Certified Information Security Manager) training course covers all the essential topics by which delegates will become fully familiar with the information security system. During this training, delegates will get familiar with the information security programme development and management. They will also learn about the importance of risk management, strategy development, asset valuation, gap analysis, data security, financial management, and many more. Our highly professional trainer with years of experience in teaching such courses will conduct this training course and will help you get a complete understanding of this course.

This training will cover various essential topics, such as: 

  • Risk appetite
  • Asset classification
  • Risk register
  • Problem management
  • Cryptography  
  • Key risk indicators

After attending this CISM (Certified Information Security Manager) training course, delegates will be able to implement a risk management programme in an organisation effectively. They will also be able to efficiently plan business continuity, disaster recovery, and risk management.

If you are interested in improving and developing more skills for Information Security Manager role, we provide a wide range of training that will help you develop your skills and knowledge. These courses are BCS CISMP (Certificate In Information Security Management Principles), Chief Information Security Officer Training, and many more.

Show moredowndown

What’s Included in this CISM Training Course?

  • Exam Pass Guarantee
  • Experienced CISM Instructor
  • Certificate on Completion
  • Refreshments

Show moredowndown

Why choose us

Ways to take this course

Our easy to use Virtual platform allows you to sit the course from home with a live instructor. You will follow the same schedule as the classroom course, and will be able to interact with the trainer and other delegates.

Our fully interactive online training platform is compatible across all devices and can be accessed from anywhere, at any time. All our online courses come with a standard 90 days access that can be extended upon request. Our expert trainers are constantly on hand to help you with any questions which may arise.

What our customers are saying

CISM Certified Information Security Manager FAQs


No, the exam is not included. Delegates need to book their exam through ISACA website
We provide CISM delegates with an exam pass guarantee, so if they enrol on CISM we are confident that they will pass the ISACA examination. All we require is that delegates attend all training days, complete any extra work they may be given, and carry out revision.
No, you do not need any prior qualifications to attend this CISM training course.
We run CISM Certified Information Security Manager in locations all over the UK and across the globe, so you will be able to find a course near you.
The information security manager is in charge of securing a company's computers, networks, and data from computer viruses, security breaches, and harmful hacker assaults.
Monitor all operations and infrastructure, maintain all security tools and technology, monitor internal and external policy compliance, monitor regulation compliance, ensure cybersecurity stays on the organisational radar, etc., are the main roles and responsibilities of the information security manager.
Preparation, identification, containment, eradication, recovery, and lessons learned are the phases of incident response.
External benchmarking, profit percentage analysis, process improvement, understanding key performance indicators, identifying gaps in the market, launching a new product, etc., are the benefits of gap analysis.
During the CISM (Certified Information Security Manager) Training course, you will learn various essential topics such as disaster recovery planning, plan development, maturity, types of metrics, configuration management, capacity management, business alignment, and many more.
The price for CISM Certified Information Security Manager certification in the United States starts from $2295
The Knowledge Academy is the Leading global training provider in the world for CISM Certified Information Security Manager.
Please see our CISM Training courses available in the United States

Why choose us


Best price in the industry

You won't find better value in the marketplace. If you do find a lower price, we will beat it.


Many delivery methods

Flexible delivery methods are available depending on your learning style.


High quality resources

Resources are included for a comprehensive learning experience.

barclays Logo
deloitte Logo
Thames Water Logo

"Really good course and well organised. Trainer was great with a sense of humour - his experience allowed a free flowing course, structured to help you gain as much information & relevant experience whilst helping prepare you for the exam"

Joshua Davies, Thames Water

santander logo
bmw Logo
Google Logo
backBack to course information

Security Certification

Save upto 40%
4 courses
Included courses:

ISO 27001 Lead Auditor$2295

CISA Certified Information Systems Auditor$2295

CISM Certified Information Security Manager$2295

CISSP Certified Information Systems Security Professional$2295

Total without package:  $9180

Package price:  $5495 (Save $3685)

Purchase now

Information Security Bundle

Save upto 40%
3 courses
Included courses:

ISO 27001 Lead Auditor$2295

CISM Certified Information Security Manager$2295

CISSP Certified Information Systems Security Professional$2295

Total without package:  $6885

Package price:  $4095 (Save $2790)

Purchase now