Certified Information Security Manager Training Overview
Prerequisites to attend this Certified Information Security Manager Training
Who should attend this Certified Information Security Manager Training?
- Information Security Managers
- Internal Auditors
- Risk Management Specialists
- Compliance Officers
- Security Analysts
- IT Consultants
- Data Protection Officers
Course structure
- In the first 3 days, the course will cover the essential materials needed to understand CISM
- The last day will cover the essential materials needed to take the CISM Certified Information Security Manager exam
Certified Information Security Manager Training Outline
- About Information Security Governance
- Reason for Security Governance
- Security Governance Activities and Results
- Risk Appetite
- Organisation Culture
- Introduction
- Requirements for Content and Retention of Business Records
- Roles and Responsibilities
- Monitoring Responsibilities
- Introduction
- Business Goals and Objectives
- Information Security Strategy Objectives
- Ensuring Objective and Business Integration
- Avoiding Common Pitfalls and Bias
- Desired State
- Elements of a Strategy
- Security Balanced Scorecard
- Architectural Approaches
- Enterprise Risk Management Framework
- Information Security Management Frameworks and Models
- Workforce Composition and Skills
- Assurance Provisions
- Risk Assessment and Management
- Action Plan to Implement Strategy
- Information Security Program Objectives
- Risk Identification
- Threats
- Defining a Risk Management Framework
- Emerging Threats
- Risk, Likelihood and Impact
- Risk Register
- Introduction
- Security Control Baselines
- Events Affecting Security Baselines
- Introduction
- Determining the Risk Management Context
- Operational Risk Management
- Risk Management Integration with IT Life Cycle Management Processes
- Risk Scenarios
- Risk Assessment Process
- Risk Assessment and Analysis Methodologies
- Other Risk Assessment Approaches
- Risk Analysis
- Risk Evaluation
- Risk Ranking
- Risk Treatment/Risk Response Options
- Determining Risk Capacity and Acceptable Risk
- (Risk Appetite)
- Risk Response Options
- Risk Acceptance Framework
- Inherent and Residual Risk
- Impact
- Controls
- Legal and Regulatory Requirements
- Costs and Benefits
- Risk Ownership and Accountability
- Risk Owner
- Control Owner
- Risk Monitoring
- Key Risk Indicators
- Reporting Changes in Risk
- Risk Communication, Awareness and Consulting
- Documentation
- Introduction
- Information Security Program Objectives
- Information Security Program Concepts
- Common Information Security Program Challenges
- Common Information Security Program Constraints
- Information Asset Identification and Valuation
- Information Asset Valuation Strategies
- Information Asset Classification
- Methods to Determine Criticality of Assets and Impact of Adverse Events
- Enterprise Information Security Architectures
- Information Security Management Frameworks
- Information Security Frameworks Components
- Policies
- Standards
- Procedures
- Guidelines
- Introduction
- Effective Security Metrics
- Security Program Metrics and Monitoring
- Metrics Tailored to Enterprise Needs
- Introduction
- Managing Risk Through Controls
- Controls and Countermeasures
- Control Categories
- Control Design Considerations
- Control Methods
- Risk Management
- Risk Management Programme
- Risk Treatment
- Audit and Reviews
- Third-Party Risk Management
- Event Monitoring
- Vulnerability Management
- Security Engineering and Development
- Network Protection
- Endpoint Protection and Management
- Identity and Access Management
- Security Incident Management
- Security Awareness Training
- Managed Security Service Providers
- Data Security
- Cryptography
- Symmetric Key Algorithms
- Service Desk
- Incident Management
- Problem Management
- Change Management
- Configuration Management
- Release Management
- Service Levels Management
- Financial Management
- Capacity Management
- Service Continuity Management
- Availability Management
- Asset Management
- Internal Control Objectives
- Information Systems Control Objectives
- General Computing Controls
- Control Frameworks
- Controls Development
- Control Assessment
- Types of Metrics
- Audiences
- Continuous Improvement
- Phases of Incident Response
- Objectives
- Maturity
- Resources
- Roles and Responsibilities
- Gap Analysis
- Plan Development
- Detection
- Initiation
- Evaluation
- Recovery
- Remediation
- Closure
- Post-Incident Review
- Business Continuity Planning
- Disaster
- Disaster Recovery Planning
- Testing BC and DR Planning
What ‘s Included
World-Class Training Sessions From Experienced Instructors
CISM Certificate
Ways to take this course
Classroom Training
Face-to-face sessions led by expert instructors, fostering interactive learning experiences and collaboration among delegates.
Online Instructor-Led Training
Live virtual classes led by experienced trainers, offering real-time interaction and guidance for optimal learning outcomes.
Online Self-Paced Training
Flexible learning at your own pace, with access to comprehensive course materials and resources available anytime, anywhere.
On-Site Training
Customised courses delivered at your location, tailored to your specific needs and scheduling preferences.
CISM Certified Information Security Manager Calender
CISM Certified Information Security Manager
£2295
1st July 2024
4th July 2024
(4 days)Virtual
CISM Certified Information Security Manager
£2295
8th July 2024
11th July 2024
(4 days)Virtual
CISM Certified Information Security Manager
£2295
15th July 2024
18th July 2024
(4 days)Virtual
CISM Certified Information Security Manager
£2295
22nd July 2024
25th July 2024
(4 days)Virtual
Worldwide Learning Experience
These courses cater to learners worldwide, offering flexible options to fit your schedule and location.
Learning Path Towards Success
Explore
Dive into our comprehensive courses to find the best fit for your career goals.
Study
Avail our high-quality learning resources to scale up your career.
Practice
Gain hands-on experience through practical exercises, assignments and case studies.
Succeed
Achieve the skill set to attain a competitive edge in the job market.
Frequently Asked Questions
How does the Certified Information Security Manager Training prepare candidates for real-world challenges?
The training curriculum integrates theoretical knowledge with practical insights and case studies, allowing candidates to apply concepts learned to real-world scenarios.
Can I take the CISM exam with this course?
No, delegates will have to make direct contact with ISACA to book and arrange for the CISM exam to be taken at one of the following locations - London, Birmingham or Manchester.
Can I pursue Certified Information Security Manager Training while working full-time?
Yes, the training is designed to accommodate busy schedules. Flexible learning options, including online courses and evening classes, allow participants to balance their professional commitments with their pursuit of certification.
What career opportunities can Certified Information Security Manager Training lead to?
Completion of the training and attainment of the CISM certification open doors to various career opportunities, including roles such as Information Security Manager, IT Risk Manager, Compliance Manager, and Security Consultant, across diverse industries globally.
Can I sit for the exam at a time and date suitable to me?
No. The CISM exams are carried out three times a year, June, September and December on set dates. For clarification, please contact ISACA directly.
What is the Exam Pass Guarantee?
Our exam pass guarantee gives you confidence that we will support your learning until you pass your CISM exam.
Is the Certified Information Security Manager Training recognised internationally?
Yes, the training is globally recognised and aligned with industry standards set by ISACA (Information Systems Audit and Control Association). The CISM certification earned upon passing the exam is respected by employers worldwide as a mark of proficiency in Information Security Management.
Is this course accredited?
This is an exam preparation course. You will become certified once you pass the ISACA CISM examination.
What are the prerequisites?
There are no official prerequisites to attend this course.
What is the experience of the instructor(s) delivering my course?
All our instructors are fully qualified and have 10+ years of experience in ISACA CISM methodologies.
What do you provide as part of the course?
In this course, you will receive a courseware book, exam preparation guidance, completion certificate, and world-class training by an experienced instructor.
Will I receive a certificate of completion?
Yes, you will receive a certificate of completion once you have completed your CISM course.
Find Your Best Course With Us
Discover the best courses tailored to your career goals. Get in touch with our support team for expert guidance.
Explore Our Client Saying
PRINCE2 Training has been an invaluable investment for us. The course was engaging, the material was excellent, and the instructors truly knew their stuff. It's not just about getting certified; it's about gaining skills that move our projects and our people forward.
Michael Carter
Project DirectorThe depth and clarity of the PRINCE2 Training have surpassed all our expectations. Our team now approaches projects with greater confidence and a solid framework, leading to more predictable and successful results. We're truly grateful for the transformation.
Samantha Wong
Project LeadChoosing PRINCE2 Training was a pivotal decision for our team. The structured approach and practical insights have significantly improved our project delivery times and outcomes. It's clear why PRINCE2 is a leader in Project Management training!
David Patel
Senior Project CoordinatorAs a Project Manager, I can confidently say that registering for PRINCE2 Training was a game-changer for me. The comprehensive curriculum and practical approach gave me the tools and strategies I needed to excel in my role.
Emily Johnson
Project ManagerPRINCE2 Training was a game-changer for our team. The standardised approach to project management not only improved our efficiency but also enhanced collaboration and communication among team members. We're already seeing the positive impact of implementing PRINCE2 methodologies in our projects. Thank you for such a valuable learning experience!
Ada Richman
Project Governance DirectorI can't say enough good things about PRINCE2 Training! The instructors were passionate about the subject matter and went above and beyond to ensure that all participants understood the material. Whether you're new to project management or looking to enhance your skills, I highly recommend investing in PRINCE2 Training.
Rod Stewart
IT Project ManagerAs someone with limited experience in project management, I found PRINCE2 Training to be incredibly valuable. The course content was well-structured and easy to follow, even for beginners like me. I appreciated the emphasis on practical application, which allowed me to immediately implement what I learned in my workplace.
Luca Bianchi
Program DirectorPRINCE2 Training provided me with the tools and techniques I needed to excel in my project management career. The practical exercises and real-world examples helped me apply the concepts to my job immediately. I'm grateful for the valuable skills I gained through this training program.
Henri Mitchell
Business Transformation ManagerI had been looking for a comprehensive project management course, and PRINCE2 Training exceeded my expectations. The material was thorough, the instructors were engaging, and the support staff were always available to answer my questions. Thanks to PRINCE2, I feel confident tackling any project that comes my way.
Loren Crookes
Risk Management SpecialistRegistering for the PRINCE2 Training Was a Game-changer For Me! The Course Structure Was Well-organised, The Instructors were knowledgeable, and the hands-on approach really helped solidify my understanding of project management principles. Highly recommended!