Certified Information Security Manager (CISM)

Approved eLearning course leading to certification from ISACA

Students have 12 months to work at their own pace, and can start at any time of year.

Certified
Leads to Industry certification.

Self-paced course
Online self-paced course.

Flexible
Start any time and work at your own pace.

Learn anywhere
Learn anytime, anywhere.

Certified Information Security Manager (CISM)

€595

or 3 interest-free payments with Klarna Logo

Course Details

Designed for experienced information security professionals, the CISM Course designation is a ground breaking credential earned by nearly 21,400 professionals since it was established in 2002. The management-focused CISM is the globally accepted standard for individuals who develop, build and manage enterprise information security programs.  The CISM certification promotes international practices and provides executive management with assurance that those earning the designation have the required experience and knowledge to provide effective security management and consulting services. The demand for skilled information security management professionals is on the rise, get the certification that distinguishes you as having knowledge and experience in the development and management of an information security program.

This CISM course includes the following features:

  • Instructor-led demonstrations and visual presentations to develop your skills based on real-world scenarios.
  • Unlike a live class, you can fast-forward, repeat or rewind all your lectures. This gives you all the benefit of hands-on training with the flexibility of doing it around your schedule 24/7.
  • Flash Cards and Education Games are also provided throughout the course.
  • Practice exams prepare you for your exams. These exams are on average 100 questions to ensure you are 100% prepared if you are taking a certification exam.
  • You can also interact and collaborate with other students through our forums, student contributions and announcement features.
Who should complete this CISM Course?

These job roles align with the content and objectives of the Certified Information Security Manager (CISM) course at CMIT. As cybersecurity threats continue to evolve, and organizations place a higher emphasis on securing their digital assets, the demand for skilled professionals with CISM certification remains strong. This course prepares individuals to excel in leadership positions and contribute to the security and governance of organisations on a global scale.

  • Information Security Managers: The CISM certification is specifically designed for individuals aspiring to become Information Security Managers. According to the (ISC)² Cybersecurity Workforce Study, there is a global shortage of cybersecurity professionals, with millions of unfilled positions. CISM-certified professionals are well-equipped to take on leadership roles and oversee an organisation’s information security strategy effectively.
  • Chief Information Security Officers (CISOs): CISOs are responsible for setting and implementing an organisation’s cybersecurity vision. Completing the CISM course and obtaining certification equips individuals with the advanced knowledge and skills needed to excel in this high-level executive position.
  • Security Consultants: Security consultants play a pivotal role in helping organisations assess their security posture and develop effective security strategies. CISM-certified professionals are trusted advisors to organisations seeking to enhance their cybersecurity defences and governance.
  • IT Auditors: IT auditors assess an organisation’s IT systems and controls to ensure compliance and security. With regulations becoming more stringent and the need for IT audits growing, individuals with CISM certification are well-prepared to excel in this role.
  • Risk Management Professionals: Professionals in risk management roles can benefit from this course as it covers essential cybersecurity risk management principles. With the increasing complexity of cyber threats, organisations require individuals with expertise in assessing and managing cybersecurity risks to protect their assets effectively.
Entry Requirements / Prerequisites

How CMIT eLearning Works…

Play
Topics covered in this CISM Course
Information Security Governance and the chapters under this domain are:
  • Tasks and knowledge statements
  • Information security governance
  • Effective information security governance
  • Information Security concepts and technologies
  • Scope and charter of information security governance
  • Information Strategy overview
  • Information security strategy development
Information Risk Management and Compliance, and the chapters under this domain are:
  • Tasks and Knowledge Statements
  • Introduction to risk management
  • Information classification
  • Information asset valuation methodologies
  • Legal, regulatory and organizational compliance
  • Risk Assessment
  • Risk Response Techniques
  • Controls
  • Business Impact Analysis
  • Enterprise risk management methodologies
  • Risk Monitoring and communication
Information Security Program Development and Management, and the chapters under this domain are:
  • Tasks and Knowledge Statements
  • Information Security Program management overview
  • Information Security program objectives
  • Information Security program concepts
  • Scope and charter of an Information Security program
  • Information security management framework
  • Information security framework components
  • Defining an information security program roadmap
  • Information security infrastructure and architecture
  • Architecture implementation
  • Security program management and administrative activities
  • Security program services and operational activities
  • Controls and countermeasures
  • Security program metrics and monitoring
Information Security Incident Management and the chapters under this domain are:
  • Tasks and Knowledge Statements
  • Incident management overview
  • Incident response procedures
  • Information Security Manager
  • Incident management resources
  • Incident management objectives
  • Incident management metrics and indicators
  • Defining incident management procedures
  • Current state of incident response capability
  • Developing an incident response plan
  • Business continuity and disaster recovery procedures
  • Testing incident response and business continuity/disaster recovery procedures
  • Executing response and recovery plans
Assessment
  • Once you successfully pass the programme(s), you will be able to download a CMIT Digital Certificate of Completion. This can be accessed via the Progress Reports section located on the top right side of your eLearning platform.
  • You may optionally take exams to receive certification. Exam fees are not included in the course price. More information on exams can be found on the CMIT exam page.
Accreditation
  • You may optionally take exams to receive professional certification.
  • More information can be found on the CMIT Accreditation Details page.

Request Prospectus

Complete the form below to request a prospectus.

"*" indicates required fields

This field is for validation purposes and should be left unchanged.
This field is hidden when viewing the form
Opt in

Student Reviews of this course

4.0
4.0 out of 5 stars (based on 1 review)
Excellent
Very good
Average
Poor
Terrible

No Title

April 3, 2025

Hi

Increase traffic & sales with expert SEO! Get higher rankings, more leads, and real results. Start now!

Regards

Kazim

Kazim Bin Khalid

Request A Prospectus

"*" indicates required fields

This field is for validation purposes and should be left unchanged.
This field is hidden when viewing the form
Opt in
College of Management and IT (CMIT)
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Click here to view our Privacy Policy