Menu

Certified Information Security Manager Prep Course (CISM)

Overview

Obtaining an ISACA CISM certification provides executive management with assurance that those earning the certification have the required experience and knowledge to provide effective security management and consulting services. Individuals earning the CISM certification become part of an elite peer network, attaining a unique and respected credential.  The CISM training program will assist you in becoming part of that elite network, as we’ll teach you all the knowledge and skills needed to earn the certification. 

Experienced information security managers and those who have information security management responsibilities, including IT consultants, auditors, managers, security policy writers, privacy officers, information security officers, network administrators, security device administrators, and security engineers.
Five years of experience with audit, IT systems, and security of information systems; systems administration experience; familiarity with TCP/IP; and an understanding of UNIX, Linux, and Windows. This advanced course also requires intermediate-level knowledge of the security concepts covered in the Security+ Prep Course.
Have an in-depth understanding of the four domains required to pass the CISM exam:
  • Information Security Governance
  • Information Risk Management and Compliance
  • Information Security Program Development and Management
  • Information Security Incident Management
  • Module 1: Testing-Taking Tips and Study TechniquesPreparation for the CISM exam
  • Submitting Required Paperwork
  • Resources and Study Aids
  • Passing the Exam the First Time
  • Module 2: Information Security GovernanceAsset Identification
  • Risk Assessment
  • Vulnerability Assessments
  • Asset Management
  • Module 3: Information Risk ManagementAsset Classification and Ownership
  • Structured Information Risk Assessment Process
  • Business Impact Assessments
  • Change Management
  • Module 4: Information Security Program DevelopmentInformation Security Strategy
  • Program Alignment of Other Assurance Functions
  • Development of Information Security Architectures
  • Security Awareness, Training, and Education
  • Communication and Maintenance of Standards, Procedures, and Other Documentation
  • Change Control
  • Lifecycle Activities
  • Security Metrics
  • Module 5: Information Security Program ManagementSecurity Program Management Overview
  • Planning
  • Security Baselines
  • Business Processes
  • Security Program Infrastructure
  • Lifecycle Methodologies
  • Security Impact on Users
  • Accountability
  • Security Metrics
  • Managing Resources
  • Module 6: Incident Management and ResponseResponse Management Overview
  • Importance of Response Management
  • Performing a Business Impact Analysis
  • Developing Response and Recovery Plans
  • The Incident Response Process
  • Implementing Response and Recovery Plans
  • Response Documentation
  • Post-Event Reviews
  • Module 7: Review and Q&A SessionFinal Review and Test Prep

Check out our full list of training locations and learning formats. Please note that the location you choose may be an Established HD-ILT location.

SLI Main Menu