CISM - Certified Information Security Manager Training Course

Course Overview

  • Course Rating 4.6/5

Overview

This program is about CISM .

Our CISM training methodology provides an in-depth coverage of contents across the Four CISM domains with a clear focus on building concepts and solving ISACA released CISM exam questions. The course is an intense training and hard-core exam preparation for ISACA’s Certified Information Security Manager (CISM®) Examination.

refer:

Certified Information Security Manager (CISM) certification indicates expertise in information security governance, program development and management, incident management and risk management.

CISM corporate training and certification oriented remote program aims to upskill you with Information Security Governance, Information Security, Incident Management, Design security architecture, Knowledge of ISACA domains, Information security programs, Enterprise IT framework

Currently due to Covid19 outbreak, the course is available remote and however it can also be accessed online via your nearby Prog360 centre based on local availability.

Course Prerequisites

To become a CISM certified professional or to opt for this CISM course, you need to fulfill some criteria, including - A completed application submitted within five years from the date of initially passing the examination (you must ensure that all experience is independently verified by employers). The experience must have been gained within the 10-year period preceding the application date for certification or within five years of passing the examination. Three of the five years of work experience must be gained in the role of an information security manager (it must be broad and gained in three of the four CISM domains)

Course Content

    Information Security Governance

    • Establish and maintain an information security strategy, and align the strategy with corporate governance
    • Establish and maintain an information security governance framework
    • Establish and maintain information security policies
    • Develop a business case
    • Identify internal and external influences to the organization
    • Obtain management commitment
    • Define roles and responsibilities
    • Establish, monitor, evaluate, and report metrics

    Information Risk Management and Compliance

    • Establish a process for information asset classification and ownership
    • Identify legal, regulatory, organizational, and other applicable requirements
    • Ensure that risk assessments, vulnerability assessments, and threat analyses are conducted periodically
    • Determine appropriate risk treatment options
    • Evaluate information security controls
    • Identify the gap between current and desired risk levels
    • Integrate information risk management into business and IT processes
    • Monitor existing risk
    • Report noncompliance and other changes in information risk

    Information Security Program Development and Management

    • Establish and maintain the information security program
    • Ensure alignment between the information security program and other business functions
    • Identify, acquire, manage, and define requirements for internal and external resources
    • Establish and maintain information security architectures
    • Establish, communicate, and maintain organizational information security standards, procedures, and guidelines
    • Establish and maintain a program for information security awareness and training
    • Integrate information security requirements into organizational processes
    • Integrate information security requirements into contracts and activities of third parties
    • Establish, monitor, and periodically report program management and operational metrics

    Information Security Incident Management

    • Establish and maintain an organizational definition of, and severity hierarchy for, information security incidents
    • Establish and maintain an incident response plan
    • Develop and implement processes to ensure the timely identification of information security incidents
    • Establish and maintain processes to investigate and document information security incidents
    • Establish and maintain incident escalation and notification processes
    • Organize, train, and equip teams to effectively respond to information security incidents
    • Test and review the incident response plan periodically
    • Establish and maintain communication plans and processes
    • Conduct post-incident reviews
    • Establish and maintain integration among the incident response plan, disaster recovery plan, and business continuity plan

CISM Certifications

CISM course delivery involves case studies, examples, discussions and exercises to enhance the learning experience.
At the end of the training the participants will be awarded Course Completion Certificates on CISM.

Post Course Evaluation

You may chose to enroll for a post course evaluation to analyse your knowledge metrics. The post course evaluation would cover the topics related to the training delivered over the period of the complete session, like:

    • Information Security Governance
    • Information Security, Incident Management
    • Design security architecture
    • Information security programs
    • Enterprise IT framework
The topic listed above are only to give you a general idea and the post training evaluation may or may not restrict to these topics. Post successful evaluation attempt the participants would be awarded Evaluation Certificates on CISM. Upon Completion of this Course you will accomplish following:
    • Information Security Governance
    • Information Risk Management and Compliance
    • Information Security Program Development and Management
    • Information Security Incident Management

     

View All events from this course

Upcoming Sessions Near You

City
Start Date
End Date
Apply
New South Wales, Australia
13-Dec-2024
16-Dec-2024
Melbourne, Australia
13-Dec-2024
16-Dec-2024
New South Wales, Australia
26-Dec-2024
29-Dec-2024
Melbourne, Australia
26-Dec-2024
29-Dec-2024
New South Wales, Australia
12-Jan-2025
15-Jan-2025
Melbourne, Australia
12-Jan-2025
15-Jan-2025
New South Wales, Australia
25-Jan-2025
28-Jan-2025
Melbourne, Australia
25-Jan-2025
28-Jan-2025
Melbourne, Australia
11-Feb-2025
14-Feb-2025
New South Wales, Australia
11-Feb-2025
14-Feb-2025
Melbourne, Australia
24-Feb-2025
27-Feb-2025
New South Wales, Australia
24-Feb-2025
27-Feb-2025

CISM Corporate Training

Corporate Training

Prog360 offers on-demand corporate learning and development solutions around CISM that can be delivered both onsite and remote (based on availability). With Prog360, you can train your employees with our 360 Approach which not only enhance professional skills but also improvise inter-personal development. Please feel free to inquire further. We are open to discuss your requirement to provide you more customized solution specific to your needs. We will evaluate the skillset, analyze the business requirement and post that provide customized training solutions as per your business needs. Our corporate team for CISM training is based across the globe hence you can reach us nearby your region as well. For general training inquiries you can contact us at training@prog360.com.

CISM Consultation

Consultation

If you have already up-skilled your team and have started implementing CISM, but are still facing challenges, Prog360 can still help you. Our SMEs can get on a call with you to understand the situation and provide you a plan involving the next steps covering both audit and implementation based on your problem statement. Our corporate team for CISM consultation is based across the globe hence you can reach us nearby your region as well. For general consultation inquiries you can contact us at consult@prog360.com . For more nearby inquiries you can reach your nearby team.

South East Asia and Oceania

Oceania: Melbourne, Australia: 152 Elizabeth St,Melbourne,VIC,Melbourne,

Corporate Training: training.au@prog360.com

Consulting Services: consult.au@prog360.com

South East Asia: Singapore: 5, Temasek Boulevard, Singapore, Central Region, 03898, Singapore

Corporate Training: training.sg@prog360.com

Consulting Services: consult.sg@prog360.com

Contact Number :- +61 3 9015 4952

South Asia and Middle East

South Asia: Bengaluru, India: No. 78, Next to KR Puram Tin Factory, Old Madras Road, Bangalore – Mahadevapura, Bengaluru, Karnataka, 560016

Corporate Training: training.southasia@prog360.com

Consulting Services: consult.southasia@prog360.com

Middle East:- Dubai, UAE: The Offices 4, One Central Dubai World Trade Center, Dubai, Dubai, 00000, UAE

Corporate Training: training.ae@prog360.com

Consulting Services: consult.ae@prog360.com

Contact Number :- +91 9810 643 989

For any Queries

Testimonials & Reviews

The CISM training was comprehensive and covered all critical aspects of information security management. The case studies provided practical insights into real-world scenarios.
Olivia Martinez
Comprehensive CISM Training
Excellent training for CISM with detailed explanations on security management and control frameworks. The instructor was highly knowledgeable and engaging.
Aditi Singh
Excellent CISM Training
Insightful training with a focus on key CISM domains. The course provided a strong foundation in information security management practices.
Saanvi Sharma
Insightful CISM Training
Great preparation for the CISM certification exam. The course material was well-structured, and the practice exams were very helpful.
Jorge Castillo
Great CISM Certification Preparation
Effective training for CISM with detailed lessons on security management and risk assessment. The instructor's experience made the course valuable and practical.
Raj Patel
Effective CISM Training
View All Review From This course