End Of Season Promotion for PMP Certification Training

Click Here

CISM Certification Training

Develop the competence to effectively map technology to your business set up with the CISM certificate.

(1425) Users

In-Person Classroom

Train with industry experts physically available in class

  • 4-days of guaranteed to run in-person training
  • Access to CP’s study guide designed by industry experts
  • Chapter-end quizzes and exercise available in all lessons
  • 2 practice test to gauge your learning post-training
  • Application assistance and support by certified staff

$ 3449
Show Batches

Live Online Classroom

Learn from the comfort of your home with live online training

  • 4-days of assured instructor-led online live training
  • Access to CISM study guide designed by industry experts
  • Chapter end quizzes and exercises in all lessons
  • 2 practice test to gauge your learning post-training
  • Recorded lesson video for post-training learning

$3349
Show Batches

Online Self-Study

Study when you find it convenient with the self-study model.

  • 180 days of complete access to the complete course
  • Access to CISM study guide designed by industry experts
  • Chapter end quizzes and exercises in all lessons
  • 2 practice test to gauge your learning post-training
  • Application assistance and Support by Certified Staff

$899

CISM Certification Training Course Overview

Be a part of the Certification planner’s 4-day CISM certification course and become an expert at effectively aligning information security programs to business goals. The courseware is designed by industry experts having 15+ years of professional experience and includes real-life case studies to give a taste of real-life application of the knowledge acquired during the certification. The course will also assist in clearing the CISM exam in the 1st attempt.

  • Guaranteed to run workshop, which means your Bootcamp will not be canceled
  • Receive support by certified staff even after completion of the training
  • Practices tests that will help you to gauge your learning post-training
  • The course and the course materials are designed to meet ISACA standards

CISM Certification Training Curriculum

course_image_desc

CISM Certification Training Information

With ISACA’s support, CISM has become one of the most popular certifications in Information security management professionals. With the certification in the belt, professionals will be able to

  • Identify issues critical to information security and develop company-specific practices to streamline the governance of information
  • Understand and explain the relationship between information system security and organizational success
  • Align information system practices to realize business deliverables.

CISM Certification Training Pre-requisites

In order to become CISM certified, one needs to have 5 years of experience in information security management. ISACA also has the facility to waiver off experience requirement for up to 2 years.

CISM Certification Training Exam & Certification

Examination Format:

  • No. of questions: 200
  • Duration: 4 hours
  • Pass score: >450 score

Exam Fee:

Members: $415

Non-Members: $465

CISM Certification Training Curriculum

Training Agenda

Lesson No.

Topics

 

Introduction

 

  • What people say about CP
  • Training types
  • Accreditations and Clients
  • About Certification Planner
  • Introduction to live training
  • About the tutorial

1

Information Security Governance

 

  • Introduction
  • Priorities for the CISM
  • Priorities for the CISM Part 2
  • Priorities for the CISM Review Questions
  • Corporate Governance
  • Evaluating the Security Environment
  • Information Security Program
  • Security Strategy
  • Roles and Responsibilities
  • Reporting and Compliance
  • Code of Ethics
  • Summary and Review

2

Information Risk Management and Compliance

 

  • Risk Management Intro
  • Risk Identification
  • Information Security Program Basics
  • Administrative Controls
  • Asset Threats and Vulnerabilities
  • Risk Register
  • Frameworks
  • Information Security Architecture
  • Risk Scenarios
  • Risk Scenarios Continued
  • Risk Assessment Introduction
  • Examples of Risk Analysis Techniques
  • Risk Assessment
  • BCP and DRP
  • Creation of BCP and DRP
  • Risk Mitigation Reduction and Avoidance
  • Risk Mitigation Transference and Acceptance
  • Selecting a Mitigation Strategy
  • Types of Mitigating Controls
  • Risk and Control Monitoring and Reporting
  • KRI's
  • Tools for Risk Monitoring

3

Information Security Program Development and Management

 

  • Information Security Program and Development
  • Information Security Program Concepts
  • Information Security Program Requirements
  • Essential Elements of an Information Security Program
  • Security Frameworks
  • Purpose of Architecture
  • Information Security Frameworks
  • Security Operations Event Monitoring
  • Secure Engineering and Threat Modeling
  • Protecting the Network-Segmentation
  • Protecting the Network-Wireless Security
  • Protecting the Network-Services
  • Protecting the Network through Detection and Network Access Control
  • Data and Endpoint Security
  • Identity and Access Management
  • Third-Party Governance
  • Policies Procedures Standards and Guidelines
  • Certification and Accreditation
  • Domain 3 Wrap-up

4

Information Security Incident Management

 

  • BCP and DRP
  • Incident Management Processes
  • Roles and Responsibilities
  • Making the case for incident response
  • Developing the Incident Response Plan-Capability Assessment
  • Incident Response Planning Processes
  • Incident Detection Devices
  • BCP steps
  • BCP Intro
  • BCP Step 1
  • Business Impact Analysis Step 2
  • BCP Step 3
  • BCP Step 4
  • Analyze and Update a Company BCP/BIA/DRP/CIRP
  • BCP Roles and Responsibilities
  • BCP sub plans
  • Testing the Plan
  • ISACA - CISM - Certified Information Security Manager

CISM Certification Training Video


CISM Certification Training Information

With ISACA’s support, CISM has become one of the most popular certifications in Information security management professionals. With the certification in the belt, professionals will be able to

  • Identify issues critical to information security and develop company-specific practices to streamline the governance of information
  • Understand and explain the relationship between information system security and organizational success
  • Align information system practices to realize business deliverables.

CISM Certification Training Pre-requisites

In order to become CISM certified, one needs to have 5 years of experience in information security management. ISACA also has the facility to waiver off experience requirement for up to 2 years.

CISM Certification Training Exam & Certification

Examination Format:

  • No. of questions: 200
  • Duration: 4 hours
  • Pass score: >450 score

Exam Fee:

Members: $415

Non-Members: $465

CISM Certification Training Curriculum

Training Agenda

Lesson No.

Topics

 

Introduction

 

  • What people say about CP
  • Training types
  • Accreditations and Clients
  • About Certification Planner
  • Introduction to live training
  • About the tutorial

1

Information Security Governance

 

  • Introduction
  • Priorities for the CISM
  • Priorities for the CISM Part 2
  • Priorities for the CISM Review Questions
  • Corporate Governance
  • Evaluating the Security Environment
  • Information Security Program
  • Security Strategy
  • Roles and Responsibilities
  • Reporting and Compliance
  • Code of Ethics
  • Summary and Review

2

Information Risk Management and Compliance

 

  • Risk Management Intro
  • Risk Identification
  • Information Security Program Basics
  • Administrative Controls
  • Asset Threats and Vulnerabilities
  • Risk Register
  • Frameworks
  • Information Security Architecture
  • Risk Scenarios
  • Risk Scenarios Continued
  • Risk Assessment Introduction
  • Examples of Risk Analysis Techniques
  • Risk Assessment
  • BCP and DRP
  • Creation of BCP and DRP
  • Risk Mitigation Reduction and Avoidance
  • Risk Mitigation Transference and Acceptance
  • Selecting a Mitigation Strategy
  • Types of Mitigating Controls
  • Risk and Control Monitoring and Reporting
  • KRI's
  • Tools for Risk Monitoring

3

Information Security Program Development and Management

 

  • Information Security Program and Development
  • Information Security Program Concepts
  • Information Security Program Requirements
  • Essential Elements of an Information Security Program
  • Security Frameworks
  • Purpose of Architecture
  • Information Security Frameworks
  • Security Operations Event Monitoring
  • Secure Engineering and Threat Modeling
  • Protecting the Network-Segmentation
  • Protecting the Network-Wireless Security
  • Protecting the Network-Services
  • Protecting the Network through Detection and Network Access Control
  • Data and Endpoint Security
  • Identity and Access Management
  • Third-Party Governance
  • Policies Procedures Standards and Guidelines
  • Certification and Accreditation
  • Domain 3 Wrap-up

4

Information Security Incident Management

 

  • BCP and DRP
  • Incident Management Processes
  • Roles and Responsibilities
  • Making the case for incident response
  • Developing the Incident Response Plan-Capability Assessment
  • Incident Response Planning Processes
  • Incident Detection Devices
  • BCP steps
  • BCP Intro
  • BCP Step 1
  • Business Impact Analysis Step 2
  • BCP Step 3
  • BCP Step 4
  • Analyze and Update a Company BCP/BIA/DRP/CIRP
  • BCP Roles and Responsibilities
  • BCP sub plans
  • Testing the Plan
  • ISACA - CISM - Certified Information Security Manager

CISM Certification Training Video



CISM Certification Training FAQ's

The exams for CISM  are made up of 150 multiple-choice questions and a duration of 4 hours to pass the exam.

No, this course is not accredited. However, our course material is well aligned with the official guide and developed by a panel of certified instructors.

No. The CISM exam fee is not included in the course fee as it is directly paid to ISACA for membership, application, and examination.

On completion of 4 days of In-person. You will receive a 35 PDU's certificate. A soft copy of the certificate will be mailed to your registered email address within 48 hours of course completion.

All registered participants will receive a link to download the courseware from Dropbox. Once downloaded, you will have lifetime single-user access to the CP course material.

Yes, for online exams, we will help you set up your PC/Laptop, and for an In-person exam, we will help you find the nearest location, available date and time.

Our in-person and live online classroom training offers a similar learning experience except for the physical presence of the instructor and fellow students in the live online classrooms. You can see, talk, and chat with the instructor in online classes as well, just like the traditional classes. 

A course confirmation email will be sent immediately after the registration. Other information such as location, courseware access, instructor contact, timings, do’s, and don’ts will be shared five days before the class by our training team.

Absolutely yes. You need to drop an email to Support@certificationplanner.com with your request, and depending upon when you raise a refund or rescheduling request, a fee will be applicable. To learn more, please read our refund policy.

Our certification training programs are designs to help you pass the exam in 1st attempt. With a hands-on learning approach and globally accredited courseware, our training program will boost your confidence not only to pass the exam but also to retain the knowledge beyond the classroom. 

CISM Certification Training Review

Talk with An Expert

Fill in the form and our training experts will reach out to you

Thank You for submiting query! our expert will call you shortly.