CISM® Certified Information Security Manager (exam included)

1.950,00 EUR

  • 50 hours
Blended Learning
eLearning
Live Virtual Classroom

Learn the fundamentals of security architecture design for an IT operation! Certified Information Security Manager (CISM) is a globally accepted standard of achievement in enterprise security management. The course, closely aligned with ISACA best practices, demonstrates an understanding of the relationship between information security programs and business goals and objectives. It will enable you to design enterprise security architecture, deliver reliable customer service, and achieve IT compliance and governance. The idea of approaching IT security from a business perspective rather than IT one is increasingly considered a vital business driver; CISM stands out in this regard for its emphasis on business understanding and leadership. It will give you the skills to manage ongoing security and adapt technology to your organization.

Key Features

Language

Course and material in English

Level

Intermediate - Advanced level for professional

Live virtual classroom

90 days of flexible access to online classroom sessions; held every month

1 Year Access

to eLearning platform & Class recordings

9.5 hours

self-paced eLearning video

Study Time

50-100 hours of recommended study time needed

Material

Course material inline with CISM certification by ISACA

Practice

3 Exam Simulation test each with 150 Questions

Exam Included

Official ISACA CISM KIT included to get Exam Voucher

Hero

Learning Outcomes

By the end of this training, you will be able to:

Information Security Governance

Develop security strategy aligned with business goals. Establish policies, standards, and roles. Ensure regulatory and compliance adherence.

Information Risk Management

Identify, assess, and mitigate security risks. Implement risk assessment methodologies. Monitor and report risk-related activities.

Information Security Program Development & Management

Design and manage security programs, allocate resources effectively, and implement security training and awareness.

Information Security Incident Management

Develop and maintain incident response plans. Detect, respond to, and recover from incidents. Conduct post-incident analysis and improvements.

Course timeline

Hero
  1. Information Security Governance

    Lesson 01

    • Information Security Governance: Overview
    • Effective Information Security Governance
    • Information Security Concepts and Technologies
    • Scope and Charter of Information Security Governance
    • Information Security Governance Metrics
    • Information Security Strategy: Overview
    • Creating Information Security Strategy
    • Overview of Information Security Governance
    • Roles and Responsibilities in Information Security
    • Governance of Third-Party Relationships
    • Obtaining Senior Management Commitment
    • The Feasibility Study and the Business Case
    • Information Security Governance Metrics
    • Information Security Strategy Overview
    • COBIT
    • ISO Standards
  2. Information Security Risk Management

    Lesson 02

    • Information Risk Management and Compliance
    • Good Information Security Risk Management
    • Risk Assessment
    • Controls Countermeasures
    • Recovery Time Objective
    • Risk Monitoring and Communication
    • Risk Management: Overview
    • Good Information Security Risk Management
    • Information Security Risk Management Concepts
    • Implementing Risk Management
    • Testing Response and Recovery Plans
    • Controls Countermeasures
    • Recovery Time Objectives
    • Risk Monitoring and Communication
  3. Information Security Program

    Lesson 03

    • Development of Information Security Program
    • Information Security Program Objectives
    • Information Security Program Development Concepts
    • Scope and Charter of Information Security Program Development
    • Information Security Framework Components
    • Implementing an Information Security Program
    • Information Infrastructure and Architecture
    • Information Security Program
    • Security Program Services and Operational Activities
    • Overview of Information Security Programme Management
    • Program Objectives for Information Security
    • Components of an Information Security Framework
    • Creating a Road Map for an Information Security Programme
    • Policy, Standards, and Procedures
    • Budget for Security
    • Administration and Management of Security Programmes
    • Privacy Regulations
    • Architecture of Information Security
    • Implementation of Architecture
    • Cloud Computing
    • Countermeasures and Controls
    • Metrics and Monitoring for Security Programmes
    • Security Education and Training
  4. Incident Management

    Lesson 04

    • Incident Response: Procedures
    • Incident Management: Organization
    • Incident Management: Resources
    • Incident Management: Objectives
    • Incident Management: Metrics and Indicators
    • Current State of Incident Response Capability
    • Developing an Incident Response Plan
    • Information Security Incident Management
    • Incident Response Procedures
    • BCP DRP
    • Testing Response and Recovery Plans
    • Executing the Plan
  5. CISM Case Studies

    Lesson 05

    • Air Traffic Control
    • CISM solution
    • IT Security Governance
    • Program Office Unique Framework
    • Is Critical Incident Stress Debriefing Effective?
    • Critical Incident Stress Debriefing
    • Information Security Risks Assessment
    • Impact Controls
    • Custom Incident Management Software
    • Incident Management Process
    • Information Security Program Development and Management
    • Developing Cyber Risk Management Strategy
    • Good Practices for Managing Information Risk
    • Managing Information Security Risk
    • Information Risk Management Communication
    • Stages of Information Security and Risk Management
    • Incident Risk: Management Functions
    • Information Risk: Management Introduction
    • Information Security: Incident Management
    • Process, How it works, best practices
    • Responsibilities and Procedures
    • CISM Course summary
CISM certification

Who Should Enroll in this Program?

The CISM certification is specifically for experienced security managers and those with information security (IS) management responsibilities:

IS Managers

IS/IT Consultants

IT Directors and Managers

Security Auditors and Architects

Security Systems Engineers

Chief Information Security Officers (CISOs)

Chief Compliance/Privacy/Risk Officers

Start course now

Prerequisites

There are no formal prerequisites to take the CISM course or certification exam. Anyone can register and attempt the exam. However, to earn the CISA certification, you must meet specific requirements, including:

1. Work Experience Requirement

  • At least 5 years of work experience in information security management.
  • Experience must be gained within 10 years prior to the application or within 5 years after passing the exam.

2. Experience Waivers (Up to 2 Years)

Candidates can reduce the 5-year requirement by up to 2 years with:

  • 1 year waiver for holding another certification (e.g., CISA, CISSP, Security+).
  • 1-2 years waiver for relevant education (e.g., a bachelor’s/master’s degree in information security).

3. Pass the CISM Exam

  • The exam consists of 150 multiple-choice questions covering four domains.

4. Agree to ISACA’s Code of Ethics

  • Candidates must adhere to ISACA’s professional code of ethics.

5. Continuing Education (CPE) Requirements

  • Maintain certification with 20 CPE hours per year and 120 CPE hours over 3 years.

Exam Details

The CISM exam is included with this course,you will receive a course completion certificate once you have:

  • Completed 85% of the course
  • Completed one simulation test with a minimum score of 60%
  • To take the official exam, you will need to register with the ISACA, and there is an Exam Candidate Guide on their website to guide you through the process.

The CISM Exam tests your knowledge in the following CISM areas:

  • Domain 1 - Information Security Governance (24%)
  • Domain 2 - Information Risk Management (30%)
  • Domain 3 - Information Security Program Development and Management (27%)
  • Domain 4 - Information Security Incident Management (19%)

Statements

Licensing and accreditation

CISM Training course is offered by Simplilearn according to Partner Program Agreement and complies with the License Agreement requirements. AVC Promotes this course on behalf of Simplilearn.

Equity Policy

Simplilearn does not provide accommodations due to a disability or medical condition of any students. Candidates are encouraged to reach out to AVC for guidance and support throughout the accommodation process.

Frequently Asked Questions

certification training

Need corporate solutions or LMS integration?

Didn't find the course or program which would work for your business? Need LMS integration? Write us, we will solve everything!