Browse Courses

Home > Project Management > CISM Certification Training

CISM Certification Training CLASSROOM AND LIVE ONLINE COURSES

Rating 3/5 Stars based on Reviews | 11878 students enrolled

Key Features

  • Money Back Guarantee*
  • Course Completion Certificate
  • Complimentary E-Learning For All Participants
  • Instructor-Led Online Project Mentoring Sessions
  • Accredited Courseware With Chapter-End Quizzes
  • 3 Months Online Exam Simulator For Exam Preparation
  • Industry Based Case Studies
  • 2 Full-Length Simulation Tests
  • Interactive Sessions By An Expert Trainer
  • Real Life Case Studies And Examples
  • Classroom And Live Online Training Worldwide
  • 24x7 Customer Support

CISM Certification Training SCHEDULE

In-Person
Classroom

USD : $1389.00$ 1749.00

  • 4-days of guaranteed to run in-person training
  • Access to Scaleup Certification’s study guide designed by industry experts
  • Chapter-end quizzes and exercise available in all lessons
  • 2 practice test to gauge your learning post-training
  • Application assistance and support by certified staff

Live Online
Classroom

USD : $1349.00 $ 999.00

  • 4-days of assured instructor-led online live training
  • Access to CISM study guide designed by industry experts
  • Chapter end quizzes and exercises in all lessons
  • 2 practice test to gauge your learning post-training
  • Recorded lesson video for post-training learning

Online
Self Study

USD : $789.00$ 489.00

  • 180 days of complete access to the complete course
  • Access to CISM study guide designed by industry experts
  • Chapter end quizzes and exercises in all lessons
  • 2 practice test to gauge your learning post-training
  • Application assistance and Support by Certified Staff

CISM Certification Training DESCRIPTION

Scaleup Certification’s offers variety of worldwide recognised certifications exclusively designed for Information Security professionals. Validate your IS knowledge and skills by certifying with us. Prove your capability of continuous learning in IS & showcase your expertise gaining top skills to stay up on the latest threats & technology.

Course Agenda

  • Introduction
  • Priorities for the CISM
  • Priorities for the CISM Part 2
  • Priorities for the CISM Review Questions
  • Corporate Governance
  • Evaluating the Security Environment
  • Information Security Program
  • Security Strategy
  • Roles and Responsibilities
  • Reporting and Compliance
  • Code of Ethics
  • Summary and Review

  • Risk Management Intro
  • Risk Identification
  • Information Security Program Basics
  • Administrative Controls
  • Asset Threats and Vulnerabilities
  • Risk Register
  • Frameworks
  • Information Security Architecture
  • Risk Scenarios
  • Risk Scenarios Continued
  • Risk Assessment Introduction
  • Examples of Risk Analysis Techniques
  • Risk Assessment
  • BCP and DRP
  • Creation of BCP and DRP
  • Risk Mitigation Reduction and Avoidance
  • Risk Mitigation Transference and Acceptance
  • Selecting a Mitigation Strategy
  • Types of Mitigating Controls
  • Risk and Control Monitoring and Reporting
  • KRI's
  • Tools for Risk Monitoring

  • Information Security Program and Development
  • Information Security Program Concepts
  • Information Security Program Requirements
  • Essential Elements of an Information Security Program
  • Security Frameworks
  • Purpose of Architecture
  • Information Security Frameworks
  • Security Operations Event Monitoring
  • Secure Engineering and Threat Modeling
  • Protecting the Network-Segmentation
  • Protecting the Network-Wireless Security
  • Protecting the Network-Services
  • Protecting the Network through Detection and Network Access Control
  • Data and Endpoint Security
  • Identity and Access Management
  • Third-Party Governance
  • Policies Procedures Standards and Guidelines
  • Certification and Accreditation
  • Domain 3 Wrap-up

  • BCP and DRP
  • Incident Management Processes
  • Roles and Responsibilities
  • Making the case for incident response
  • Developing the Incident Response Plan-Capability Assessment
  • Incident Response Planning Processes
  • Incident Detection Devices
  • BCP steps
  • BCP Intro
  • BCP Step 1
  • Business Impact Analysis Step 2
  • BCP Step 3
  • BCP Step 4
  • Analyze and Update a Company BCP/BIA/DRP/CIRP
  • BCP Roles and Responsibilities
  • BCP sub plans
  • Testing the Plan
  • ISACA - CISM - Certified Information Security Manager

Course Overview

The CISM certification was developed by ISACA for experienced information security management professionals who have experience developing & managing IS programs. At the end of the course completion, you will gain expertise on Information security governance, Information risk management & compliance, IS program development & management, IS incident management etc.

In this training you will gain knowledge on all the concepts of information risk management and how to comply with defined standards. Our course strives to make you learn how to identify and mitigate the risks that threaten the integrity, confidentiality & availability of information or a system. Lastly in this course, we make sure you receive every gain of information, practices on information risk management policies and procedures.

CISM Certification Training Exam & Certification

A completed application must be submitted within 5 years from the date of initially passing the examination. All experience must be verified independently with employers. This experience must have been gained within the 10-year period preceding the application date for certification or within five years of passing the examination. Three (3) years of the five (5) years of work experience must be gained performing the role of an information security manager. In addition, this work experience must be broad and gained in three (3) of the four (4) CISMR domains.

Security consultants and managers, Security auditors and architects, IT directors and managers, Security systems engineers, Chief Information Security Officers (CISOs), Information security managers, IS/IT consultants, Chief Compliance/Privacy/Risk Officers.