- +1 855.488.5327
- customerservice@ituonline.com
- Mon - Fri: 9:00am - 5:00pm ET
CISM Training – Certified Information Systems Manager
Take 25% off all orders of $49.00 or more! No coupon needed; auto applies in cart.
$49.00
Sale Ends Soon
- 00Days
- 00Hours
- 00Minutes
- 00Seconds
The CISM training course is designed to provide on-the-job skills, as well as knowledge to pass the Certified Information System Manager (CISM) certification exam. This cybersecurity training focuses on more advanced topics and should be completed after various certifications in Cisco and Microsoft have been earned, such as PenTest+ or CySA+.
17 Training Hours
48 Videos
6 Topics
100 Practice Questions
Course Description
About our online self paced CISM training course
The CISM training course is designed to provide on-the-job skills, as well as knowledge to pass the Certified Information System Manager (CISM) certification exam for individuals in the security management field as security professionals. This is advanced-level cybersecurity training to complete once the PenTest+, CySA+, and various higher-level certifications in Cisco and Microsoft have been completed.
The CISM Training – Certified Information Systems Manager course instructor is Roger St Hilaire, with 30+ years of experience and CISM, CGEIT, MOF, TOGAF & PSP-Rainmaker Foundation Certifications.
The course will cover the following list of main areas, spanning the four domains of the CISM practice and the related tasks. The ITU Online CISM Training – Certified Information Systems Manager Exam Preparation Course Outline:
- Information Security Defined
- Information Security Principles
- Support the Business
- Defend the Business
- Promote Responsible Security Program Development and Security Behavior
DOMAIN 1 – Knowledge of Security Governance, Information Security Governance and Security Policies
- Section One: Designing a Strategy and Governance Framework
- Section Two: Gaining Management Approval
- Section Three: Implementing the Security Strategy
DOMAIN 2 – Information Security Risk Management and Security Requirements
- Section One: Risk Identification
- Section Two: Risk Analysis and Treatment
- Section Three: Risk Monitoring and Reporting and Monitoring of Security Activities
DOMAIN 3 – Information Security Management and Security Program Development
- Section One: Alignment and Resource Management
- Section Two: Standards Awareness and Training
- Section Three: Building Security into Processes and Practices
- Section Four: Security Monitoring and Reporting
DOMAIN 4 – Information Security Incident Management
- Section One: Planning and Integration
- Section Two: Readiness and Assessment
- Section Three Identification and Response
- Exam Techniques
ISACA Requirements for Certification:
- To facilitate the student’s understanding of ISACA’s approach to information security, and its related concepts such as risk.
- Develop an understanding of key practices in the governance, management of risk, program development, and incident management in the realm of information security.
- Ensure that the student is appropriately prepared for successful completion of the Certified Information Security Manager exam given by ISACA on the first attempt.
Prerequisites Requirements CISM: Certified Information Security
To acquire the distinguished certification of a Certified Information Security Manager (CISM), you must submit evidence verifying at least five years of experienced information security managers in data security, 3-year information security management requirement more specifically dedicated to security experience spread across multiple security business model disciplines. This job practice analysis must be completed within 10 years leading up to your CISM application date, or within 5 short years from when you initially passed the exam.
Your Training Instructor
Roger is an experienced IT professional with a proven track record of designing and managing large-scale technology systems. Successfully designed the first knowledge engine for UNDP Sub-Regional Resource Facility, known as the Request Tracker, which facilitated workflow-based tracking of queries and increased productivity. Managed and grew a $70 million USD dual data centre national network system for the Trinidad and Tobago government, expanding it from 400+ sites to 512 and increasing customer satisfaction. Skilled in vendor negotiations, securing approximately $200K USD in committed support during a crisis event. Adept in saving clients money and improving their operations, saving one BPR client $60K USD and improving their security processes. Committed to driving positive change and delivering results in fast-paced and dynamic environments.
Course Outline
Certified Information Security Manager (CISM) Course Outline
Module 1: Introduction
- Instructor Introduction
- Course Introduction
- Exam Overview
Module 2: Information Security Governance
- Module Overview
- InfoSec Strategic Context Part 1
- InfoSec Strategic Context Part 2
- GRC Strategy and Assurance
- Roles and Responsibilities
- GMA Tasks Knowledge and Metrics
- IS Strategy Overview
- Strategy Implemenation
- Strategy Development Support
- Architecture and Controls
- Considerations and Action Plan
- InfoSec Prog Objectives and Wrap-Up
Module 3: Information Security Risk Management
- Module Overview
- Risk Identification Task and Knowledge
- Risk Management Strategy
- Additional Considerations
- Risk Analysis and Treatment Tasks & Knowledge
- Leveraging Frameworks
- Assessment Tools and Analysis
- Risk Scenario Development
- Additional Risk Factors
- Asset Classification and Risk Management
- Risk Monitoring and Communication
- Information Risk Management Summary
Module 4: InfoSec Prog Development and Management
- Module Overview
- Alignment and Resource Management - Task and Knowledge
- Key Relationships
- Standards Awareness and Training - Tasks and Knowledge
- Awareness and Training
- Building Security into Process and Practices - Tasks and Knowledge
- Additional Technology Infrastructure Concerns
- Security monitoring and reporting Overview Tasks and Knowledge
- Metrics and Monitoring
- Summary
Module 5: Information Security Incident Management
- Module Overview
- Planning and Integration Overview Task and Knowledge
- Incident Response Concepts and Process
- Forensics and Recovery
- Readiness and Assessment - Overview Tasks and Knowledge
- Identification and Response Overview Tasks and Knowledge
- Incident Processes
Module 6: Exam Prep
- Case Study - Security On a Shoestring Budget
- Case Study - APT In Action
- Summary
- Exam Prep
CISM Training – Certified Information Systems Manager
$49.00
The CISM training course is designed to provide on-the-job skills, as well as knowledge to pass the Certified Information System Manager (CISM) certification exam. This cybersecurity training focuses on more advanced topics and should be completed after various certifications in Cisco and Microsoft have been earned, such as PenTest+ or CySA+.
Additional Options to Access This Training
This training is also part of our extensive training library containing over 225 courses, 12,000+ videos and over 19,000 practice test questions.
Monthly All-Access Subscription
$39.00 / month
A great option at an affordable monthly price.
Annual All-Access Subscription
$229 / year
A discounted price when paying for your All Access library on an annual basis.
Lifetime All-Access Library
$379 One time payment
Exceptional Value. Pay once, never have to buy IT training again.
Related Courses
$49.00
This course is designed to provide six hours of training and 45 videos that will equip you with the knowledge and skills needed to create network diagrams, explain basic networking concepts, understand switches and routers, comprehend OSI models, gain insight into wide area (WAN) and local area networks (LAN), master wireless networking strategies ,and develop IP addressing proficiency.
$15.00
The CCNP Troubleshooting IP Networks 300-135 exam ascertains that the candidate possesses the information and abilities required to regularly maintain complex enterprise routed and switched networks.
$49.00
In this Microsoft 70-686 course, students will learn how to efficiently plan and deploy Windows 7 desktops in large organizations. By the end of the course, students should be able to confidently design, configure, and manage any Windows 7 client environment.
$49.00
ITUs course is designed for the Microsoft 70-688 Exam focusing on configuring and supporting Windows 8 computers within a network.