CISM CertificationTraining - Certified Information Systems Manager - ITU Online

CISM CertificationTraining – Certified Information Systems Manager

The CISM certification training course is designed to provide on-the-job skills, as well as knowledge to pass the Certified Information System Manager (CISM) certification exam. This cybersecurity training focuses on more advanced topics and should be completed after various certifications in Cisco and Microsoft have been earned, such as PenTest+ or CySA+.

Included In This Course

Microsoft 70-488: Developing SharePoint Server Core Solutions
17 Hrs 18 Min
Videos
48 On-demand Videos
Closed Captions

Closed Captions

Course Topics
6  Topics
Question & Answers
100 Prep Questions
Certificate of Completion

Certificate of Completion

Course Description for Certified Information Security Manager (CISM) Certification Training

This Certified Information Security Manager (CISM) Certification Training course is designed to equip professionals with the knowledge and skills needed to excel in the field of information security management. The course covers a comprehensive range of topics essential for effective information security governance, risk management, program development and management, and incident management. It is tailored to help students understand and implement robust security strategies, frameworks, and best practices in real-world scenarios.

Participants will gain hands-on experience with key concepts such as InfoSec strategic context, GRC strategy, risk analysis, and incident response. The course also includes in-depth modules on security architecture, asset classification, and the integration of security measures into organizational processes. By the end of the course, learners will be well-prepared to take on the CISM certification exam and pursue a career in information security management.

What You Will Learn in CISM Certification Training

In this course, you will gain a comprehensive understanding of the critical aspects of information security management. The structured modules are designed to provide you with the skills and knowledge necessary to protect and manage your organization’s information assets effectively.

  • Understanding the strategic context of information security
  • Developing and implementing InfoSec strategies
  • Managing governance, risk, and compliance (GRC)
  • Conducting risk assessments and managing risks
  • Building and managing effective information security programs
  • Planning and executing incident management processes
  • Preparing for the CISM certification exam with real-world case studies

Exam Objectives for CISM Certification

The CISM certification is governed by ISACA and focuses on four main domains that are critical for information security management. Each domain is represented in the exam and holds a specific percentage weight.

  • Information Security Governance: Establishing and maintaining the framework to manage information security programs (24%)
  • Information Risk Management: Identifying and managing information security risks to achieve business objectives (30%)
  • Information Security Program Development and Management: Establishing and managing the information security program (27%)
  • Information Security Incident Management: Planning, establishing, and managing the capability to detect, investigate, respond to, and recover from information security incidents (19%)

The certifying body for the CISM certification is ISACA.

Who This CISM Certification Training is For

This course is ideal for professionals seeking to advance their careers in information security management. It is designed for individuals who want to deepen their knowledge and skills in managing and overseeing enterprise information security.

  • Information security managers and professionals
  • IT managers and directors
  • Security consultants and auditors
  • IT governance professionals
  • Individuals preparing for the CISM certification exam

Possible Jobs You Can Get With This Knowledge from CISM Certification

Acquiring the CISM certification opens up a wide range of career opportunities in the field of information security management. The skills and knowledge gained from this course are applicable to various high-level roles in different industries.

  • Information Security Manager
  • IT Security Manager
  • Risk Management Professional
  • Security Consultant
  • IT Auditor
  • Chief Information Security Officer (CISO)

Average Industry Salaries for People with CISM Certification

Professionals with CISM certification are in high demand and can command competitive salaries across various industries. The financial benefits of obtaining this certification are significant, reflecting the critical importance of information security management skills.

  • Information Security Manager: $105,000 – $150,000 per year
  • IT Security Manager: $110,000 – $145,000 per year
  • Risk Management Professional: $95,000 – $130,000 per year
  • Security Consultant: $90,000 – $140,000 per year
  • IT Auditor: $85,000 – $125,000 per year
  • Chief Information Security Officer (CISO): $150,000 – $250,000 per year

Get Started Today with CISM Certification Training

Don’t miss the opportunity to advance your career in information security management. Enroll in our Certified Information Security Manager (CISM) Certification Training course today and gain the expertise needed to protect and manage your organization’s information assets effectively. With our comprehensive curriculum and experienced instructors, you’ll be well-prepared to ace the CISM certification exam and achieve your professional goals.

Take the first step towards a rewarding career in information security. Sign up now and start your journey to becoming a Certified Information Security Manager!

Key Term Knowledge Base: Key Terms Related to Certified Information Systems Manager (CISM) Training

Understanding the key terms related to Certified Information Systems Manager (CISM) training is crucial for anyone aspiring to excel in information security management. This knowledge base will not only help in comprehending the course material effectively but also in applying these concepts in real-world scenarios. These terms encompass a broad range of topics including risk management, information security governance, incident management, and more, providing a foundational vocabulary for professionals in this field.

TermDefinition
Information Security GovernanceThe collection of practices related to supporting, defining, and directing the security efforts of an organization.
Risk ManagementThe process of identifying, assessing, and controlling threats to an organization’s capital and earnings.
Information Security Program DevelopmentThe process of establishing and maintaining a framework to provide assurance that information security strategies are aligned with organizational objectives.
Incident ManagementThe process of identifying, managing, recording, and analyzing security threats or incidents in real-time.
Information Risk AssessmentThe process of identifying and evaluating risks for information assets, considering the impact of confidentiality, integrity, and availability breaches.
Information Security StrategyThe set of policies and plans for reducing information security risks to an acceptable level.
Business Impact Analysis (BIA)The process of determining the potential impacts resulting from the interruption of time-sensitive or critical business processes.
Compliance ManagementThe process of ensuring that the organization conforms to regulatory and legal requirements.
Security ArchitectureThe framework and components that make up an organization’s information security system.
Disaster Recovery PlanningThe process of creating a strategy to maintain and recover IT infrastructure in the event of a disaster.
Security Awareness TrainingTraining provided to employees to enhance their understanding of the importance of information security.
Information Asset ManagementThe process of ensuring that information assets receive an appropriate level of protection.
Change ManagementThe process of managing changes to the IT environment in a controlled manner.
Vulnerability ManagementThe process of identifying, classifying, remediating, and mitigating vulnerabilities in software and network systems.
Threat AssessmentThe process of identifying and evaluating threats to an organization.
Security PoliciesGuidelines and rules set by an organization to ensure information security.
EncryptionThe method of converting information or data into a code to prevent unauthorized access.
Access ControlThe process of granting or denying specific requests to obtain and use information.
Security AuditingThe process of evaluating the effectiveness of an organization’s information security measures.
CybersecurityThe practice of protecting systems, networks, and programs from digital attacks.

These terms form the backbone of the CISM curriculum and are essential for anyone involved in information security management.

Frequently Asked Questions About CISM Training – Certified Information Systems Manager

What is CISM Certification?

he CISM (Certified Information Security Manager) certification is a highly respected credential in the field of information security management. Offered by ISACA (Information Systems Audit and Control Association), this certification is designed for IT professionals who manage and oversee an organization’s information security.

How long does a CISM certification last?

A CISM (Certified Information Security Manager) certification is valid for three years. To maintain the certification, holders are required to participate in continuing professional education (CPE) activities. ISACA, the organization that offers the CISM certification, mandates that certified professionals earn and report a minimum of 120 CPE credits over a three-year period. Additionally, a minimum of 20 CPE credits must be earned and reported annually.

Who is the instructor for this IT Training Course?

The course instructor is Roger St Hilaire. He brings 30+ years of experience in IT and various certifications including CISM, CGEIT, MOF, TOGAF, and PSP-Rainmaker Foundation. Roger has a proven track record of designing and managing large-scale technology systems and has achieved remarkable results in various domains of IT.

What are the prerequisites for the CISM Training Online Course?

To undertake this course, you should already have some experience in information security management. Specifically, you need to submit evidence verifying at least five years of experience in data security, with a 3-year information security management requirement dedicated to security experience spread across multiple security business model disciplines. This job practice analysis should be completed within 10 years leading up to your CISM application date or within 5 years from when you initially passed the exam​.

What modules does the CISM IT Training Course include?

The CISM Training Course consists of six modules: Information Security Governance, Information Security Risk Management, InfoSec Program Development and Management, Information Security Incident Management, and Exam Prep. Each module comes with a variety of sub-topics to give you a comprehensive understanding of the subject matter.

What type of content does the online course offer?

The CISM Training Online Course provides a mix of 48 on-demand videos and 100 prep questions for comprehensive learning. You’ll cover six topics across 17 training hours, ensuring you are well-prepared for the CISM certification exam. The course also includes closed captions for accessibility.

Proudly Display
Your Achievement

Upon completion of your training, you’ll receive a personalized certificate of completion to help validate to others your new skills.
Example Certificate

Certified Information Security Manager (CISM) Course Content

Module 1: Introduction

  •    Instructor Introduction
  •    Course Introduction
  •    Exam Overview

Module 2: Information Security Governance

  •    Module Overview
  •    InfoSec Strategic Context Part 1
  •    InfoSec Strategic Context Part 2
  •    GRC Strategy and Assurance
  •    Roles and Responsibilities
  •    GMA Tasks Knowledge and Metrics
  •    IS Strategy Overview
  •    Strategy Implemenation
  •    Strategy Development Support
  •    Architecture and Controls
  •    Considerations and Action Plan
  •    InfoSec Prog Objectives and Wrap-Up

Module 3: Information Security Risk Management

  •    Module Overview
  •    Risk Identification Task and Knowledge
  •    Risk Management Strategy
  •    Additional Considerations
  •    Risk Analysis and Treatment Tasks & Knowledge
  •    Leveraging Frameworks
  •    Assessment Tools and Analysis
  •    Risk Scenario Development
  •    Additional Risk Factors
  •    Asset Classification and Risk Management
  •    Risk Monitoring and Communication
  •    Information Risk Management Summary

Module 4: InfoSec Prog Development and Management

  •    Module Overview
  •    Alignment and Resource Management - Task and Knowledge
  •    Key Relationships
  •    Standards Awareness and Training - Tasks and Knowledge
  •    Awareness and Training
  •    Building Security into Process and Practices - Tasks and Knowledge
  •    Additional Technology Infrastructure Concerns
  •    Security monitoring and reporting Overview Tasks and Knowledge
  •    Metrics and Monitoring
  •    Summary

Module 5: Information Security Incident Management

  •    Module Overview
  •    Planning and Integration Overview Task and Knowledge
  •    Incident Response Concepts and Process
  •    Forensics and Recovery
  •    Readiness and Assessment - Overview Tasks and Knowledge
  •    Identification and Response Overview Tasks and Knowledge
  •    Incident Processes

Module 6: Exam Prep

  •    Case Study - Security On a Shoestring Budget
  •    Case Study - APT In Action
  •    Summary
  •    Exam Prep
Add a review
Currently, we are not accepting new reviews
4.8
Based on 81 reviews
1-5 of 81 reviews
  1. SJ

    good

  2. AA
  3. K
  4. BO
  5. A

    Smooth delivery and easy access to LMS. Good to see that the LMS offers progress tracking. Would be great if badges were offered on completion of courses to share via Credly to future employers.

Your Training Instructor

Roger St Hilaire

Roger St Hilaire

CISM, CGEIT, CRISC, TOGAF, Certified Trainer and Governance Specialist

Roger is an experienced IT professional with a proven track record of designing and managing large-scale technology systems. Successfully designed the first knowledge engine for UNDP Sub-Regional Resource Facility, known as the Request Tracker, which facilitated workflow-based tracking of queries and increased productivity. Managed and grew a $70 million USD dual data centre national network system for the Trinidad and Tobago government, expanding it from 400+ sites to 512 and increasing customer satisfaction. Skilled in vendor negotiations, securing approximately $200K USD in committed support during a crisis event. Adept in saving clients money and improving their operations, saving one BPR client $60K USD and improving their security processes. Committed to driving positive change and delivering results in fast-paced and dynamic environments.

Certified Information Security Manager (CISM)

Subscribe To All-Access
Lock In $16.99 / Month Forever

Gain access to this training and all our other courses with our cost-effective monthly subscription. No obligations. Cancel anytime.

$49.99 $16.99 Monthly

OR

$49.00

today Only: 1-Year For $79.00!

Get 1-year full access to every course, over 2,600 hours of focused IT training, 20,000+ practice questions at an incredible price of only $79.00

Learn CompTIA, Cisco, Microsoft, AI, Project Management & More...