CISM CertificationTraining - Certified Information Systems Manager - ITU Online IT Training
Ready to start learning? Individual Plans →Team Plans →
[ Course ]

CISM CertificationTraining – Certified Information Systems Manager

The CISM certification training course is designed to provide on-the-job skills, as well as knowledge to pass the Certified Information System Manager (CISM) certification exam. This cybersecurity training focuses on more advanced topics and should be completed after various certifications in Cisco and Microsoft have been earned, such as PenTest+ or CySA+.

17 Hrs 18 Min48 Videos100 Questions16,027 EnrolledCertificate of CompletionClosed Captions

CISM CertificationTraining – Certified Information Systems Manager



Course Description for Certified Information Security Manager (CISM) Certification Training

This Certified Information Security Manager (CISM) Certification Training course is designed to equip professionals with the knowledge and skills needed to excel in the field of information security management. The course covers a comprehensive range of topics essential for effective information security governance, risk management, program development and management, and incident management. It is tailored to help students understand and implement robust security strategies, frameworks, and best practices in real-world scenarios.

Participants will gain hands-on experience with key concepts such as InfoSec strategic context, GRC strategy, risk analysis, and incident response. The course also includes in-depth modules on security architecture, asset classification, and the integration of security measures into organizational processes. By the end of the course, learners will be well-prepared to take on the CISM certification exam and pursue a career in information security management.

What You Will Learn in CISM Certification Training

In this course, you will gain a comprehensive understanding of the critical aspects of information security management. The structured modules are designed to provide you with the skills and knowledge necessary to protect and manage your organization’s information assets effectively.

  • Understanding the strategic context of information security
  • Developing and implementing InfoSec strategies
  • Managing governance, risk, and compliance (GRC)
  • Conducting risk assessments and managing risks
  • Building and managing effective information security programs
  • Planning and executing incident management processes
  • Preparing for the CISM certification exam with real-world case studies

Exam Objectives for CISM Certification

The CISM certification is governed by ISACA and focuses on four main domains that are critical for information security management. Each domain is represented in the exam and holds a specific percentage weight.

  • Information Security Governance: Establishing and maintaining the framework to manage information security programs (24%)
  • Information Risk Management: Identifying and managing information security risks to achieve business objectives (30%)
  • Information Security Program Development and Management: Establishing and managing the information security program (27%)
  • Information Security Incident Management: Planning, establishing, and managing the capability to detect, investigate, respond to, and recover from information security incidents (19%)

The certifying body for the CISM certification is ISACA.

Who This CISM Certification Training is For

This course is ideal for professionals seeking to advance their careers in information security management. It is designed for individuals who want to deepen their knowledge and skills in managing and overseeing enterprise information security.

  • Information security managers and professionals
  • IT managers and directors
  • Security consultants and auditors
  • IT governance professionals
  • Individuals preparing for the CISM certification exam

Possible Jobs You Can Get With This Knowledge from CISM Certification

Acquiring the CISM certification opens up a wide range of career opportunities in the field of information security management. The skills and knowledge gained from this course are applicable to various high-level roles in different industries.

  • Information Security Manager
  • IT Security Manager
  • Risk Management Professional
  • Security Consultant
  • IT Auditor
  • Chief Information Security Officer (CISO)

Average Industry Salaries for People with CISM Certification

Professionals with CISM certification are in high demand and can command competitive salaries across various industries. The financial benefits of obtaining this certification are significant, reflecting the critical importance of information security management skills.

  • Information Security Manager: $105,000 – $150,000 per year
  • IT Security Manager: $110,000 – $145,000 per year
  • Risk Management Professional: $95,000 – $130,000 per year
  • Security Consultant: $90,000 – $140,000 per year
  • IT Auditor: $85,000 – $125,000 per year
  • Chief Information Security Officer (CISO): $150,000 – $250,000 per year

Get Started Today with CISM Certification Training

Don’t miss the opportunity to advance your career in information security management. Enroll in our Certified Information Security Manager (CISM) Certification Training course today and gain the expertise needed to protect and manage your organization’s information assets effectively. With our comprehensive curriculum and experienced instructors, you’ll be well-prepared to ace the CISM certification exam and achieve your professional goals.

Take the first step towards a rewarding career in information security. Sign up now and start your journey to becoming a Certified Information Security Manager!

Key Term Knowledge Base: Key Terms Related to Certified Information Systems Manager (CISM) Training

Understanding the key terms related to Certified Information Systems Manager (CISM) training is crucial for anyone aspiring to excel in information security management. This knowledge base will not only help in comprehending the course material effectively but also in applying these concepts in real-world scenarios. These terms encompass a broad range of topics including risk management, information security governance, incident management, and more, providing a foundational vocabulary for professionals in this field.

Term Definition
Information Security Governance The collection of practices related to supporting, defining, and directing the security efforts of an organization.
Risk Management The process of identifying, assessing, and controlling threats to an organization’s capital and earnings.
Information Security Program Development The process of establishing and maintaining a framework to provide assurance that information security strategies are aligned with organizational objectives.
Incident Management The process of identifying, managing, recording, and analyzing security threats or incidents in real-time.
Information Risk Assessment The process of identifying and evaluating risks for information assets, considering the impact of confidentiality, integrity, and availability breaches.
Information Security Strategy The set of policies and plans for reducing information security risks to an acceptable level.
Business Impact Analysis (BIA) The process of determining the potential impacts resulting from the interruption of time-sensitive or critical business processes.
Compliance Management The process of ensuring that the organization conforms to regulatory and legal requirements.
Security Architecture The framework and components that make up an organization’s information security system.
Disaster Recovery Planning The process of creating a strategy to maintain and recover IT infrastructure in the event of a disaster.
Security Awareness Training Training provided to employees to enhance their understanding of the importance of information security.
Information Asset Management The process of ensuring that information assets receive an appropriate level of protection.
Change Management The process of managing changes to the IT environment in a controlled manner.
Vulnerability Management The process of identifying, classifying, remediating, and mitigating vulnerabilities in software and network systems.
Threat Assessment The process of identifying and evaluating threats to an organization.
Security Policies Guidelines and rules set by an organization to ensure information security.
Encryption The method of converting information or data into a code to prevent unauthorized access.
Access Control The process of granting or denying specific requests to obtain and use information.
Security Auditing The process of evaluating the effectiveness of an organization’s information security measures.
Cybersecurity The practice of protecting systems, networks, and programs from digital attacks.

These terms form the backbone of the CISM curriculum and are essential for anyone involved in information security management.

Frequently Asked Questions About CISM Training – Certified Information Systems Manager

What is CISM Certification?

he CISM (Certified Information Security Manager) certification is a highly respected credential in the field of information security management. Offered by ISACA (Information Systems Audit and Control Association), this certification is designed for IT professionals who manage and oversee an organization’s information security.

How long does a CISM certification last?

A CISM (Certified Information Security Manager) certification is valid for three years. To maintain the certification, holders are required to participate in continuing professional education (CPE) activities. ISACA, the organization that offers the CISM certification, mandates that certified professionals earn and report a minimum of 120 CPE credits over a three-year period. Additionally, a minimum of 20 CPE credits must be earned and reported annually.

Who is the instructor for this IT Training Course?

The course instructor is Roger St Hilaire. He brings 30+ years of experience in IT and various certifications including CISM, CGEIT, MOF, TOGAF, and PSP-Rainmaker Foundation. Roger has a proven track record of designing and managing large-scale technology systems and has achieved remarkable results in various domains of IT.

What are the prerequisites for the CISM Training Online Course?

To undertake this course, you should already have some experience in information security management. Specifically, you need to submit evidence verifying at least five years of experience in data security, with a 3-year information security management requirement dedicated to security experience spread across multiple security business model disciplines. This job practice analysis should be completed within 10 years leading up to your CISM application date or within 5 years from when you initially passed the exam​.

What modules does the CISM IT Training Course include?

The CISM Training Course consists of six modules: Information Security Governance, Information Security Risk Management, InfoSec Program Development and Management, Information Security Incident Management, and Exam Prep. Each module comes with a variety of sub-topics to give you a comprehensive understanding of the subject matter.

What type of content does the online course offer?

The CISM Training Online Course provides a mix of 48 on-demand videos and 100 prep questions for comprehensive learning. You’ll cover six topics across 17 training hours, ensuring you are well-prepared for the CISM certification exam. The course also includes closed captions for accessibility.

Module 1: Introduction
  • Instructor Introduction
  • Course Introduction
  • Exam Overview
Module 2: Information Security Governance
  • Module Overview
  • InfoSec Strategic Context Part 1
  • InfoSec Strategic Context Part 2
  • GRC Strategy and Assurance
  • Roles and Responsibilities
  • GMA Tasks Knowledge and Metrics
  • IS Strategy Overview
  • Strategy Implemenation
  • Strategy Development Support
  • Architecture and Controls
  • Considerations and Action Plan
  • InfoSec Prog Objectives and Wrap-Up
Module 3: Information Security Risk Management
  • Module Overview
  • Risk Identification Task and Knowledge
  • Risk Management Strategy
  • Additional Considerations
  • Risk Analysis and Treatment Tasks & Knowledge
  • Leveraging Frameworks
  • Assessment Tools and Analysis
  • Risk Scenario Development
  • Additional Risk Factors
  • Asset Classification and Risk Management
  • Risk Monitoring and Communication
  • Information Risk Management Summary
Module 4: InfoSec Prog Development and Management
  • Module Overview
  • Alignment and Resource Management – Task and Knowledge
  • Key Relationships
  • Standards Awareness and Training – Tasks and Knowledge
  • Awareness and Training
  • Building Security into Process and Practices – Tasks and Knowledge
  • Additional Technology Infrastructure Concerns
  • Security monitoring and reporting Overview Tasks and Knowledge
  • Metrics and Monitoring
  • Summary
Module 5: Information Security Incident Management
  • Module Overview
  • Planning and Integration Overview Task and Knowledge
  • Incident Response Concepts and Process
  • Forensics and Recovery
  • Readiness and Assessment – Overview Tasks and Knowledge
  • Identification and Response Overview Tasks and Knowledge
  • Incident Processes
Module 6: Exam Prep
  • Case Study – Security On a Shoestring Budget
  • Case Study – APT In Action
  • Summary
  • Exam Prep

This course is included in all of our team and individual training plans. Choose the option that works best for you.

[ Team Training ]

Enroll My Team.

Give your entire team access to this course and our full training library. Includes team dashboards, progress tracking, and group management.

Get Team Pricing

[ Individual Plans ]

Choose a Plan.

Get unlimited access to this course and our entire library with a monthly, quarterly, annual, or lifetime plan.

View Individual Plans

Ready to start learning? Individual Plans →Team Plans →