Certified Information Security Manager (CISM)


Course Details

Designed for experienced information security professionals, the CISM designation is a groundbreaking credential earned by nearly 21,400 professionals since it was established in 2002. The management-focused CISM is the globally accepted standard for individuals who develop, build and manage enterprise information security programs.  The CISM certification promotes international practices and provides executive management with assurance that those earning the designation have the required experience and knowledge to provide effective security management and consulting services. The demand for skilled information security management professionals is on the rise, get the certification that distinguishes you as having knowledge and experience in the development and management of an information security program.

This course includes the following features:

  • Instructor-led demonstrations and visual presentations to develop your skills based on real-world scenarios.
  • Unlike a live class, you can fast-forward, repeat or rewind all your lectures. This gives you all the benefit of hands-on training with the flexibility of doing it around your schedule 24/7.
  • Flash Cards and Education Games are also provided throughout the course.
  • Practice exams prepare you for your exams. These exams are on average 100 questions to ensure you are 100% prepared if you are taking a certification exam.
  • You can also interact and collaborate with other students through our forums, student contributions and announcement features.
Who should complete this course?
  • People who work in the following job roles:
  • Information Security Governance
  • Information Risk Management and Compliance
  • Information Security Program Development and Management
  • Information Security Incident Management.
Entry Requirements / Prerequisites
  • None.
How CMIT eLearning Works…

Topics covered in this Course

Information Security Governance and the chapters under this domain are:

  • Tasks and knowledge statements
  • Information security governance
  • Effective information security governance
  • Information Security concepts and technologies
  • Scope and charter of information security governance
  • Information Strategy overview
  • Information security strategy development

Information Risk Management and Compliance, and the chapters under this domain are:

  • Tasks and Knowledge Statements
  • Introduction to risk management
  • Information classification
  • Information asset valuation methodologies
  • Legal, regulatory and organizational compliance
  • Risk Assessment
  • Risk Response Techniques
  • Controls
  • Business Impact Analysis
  • Enterprise risk management methodologies
  • Risk Monitoring and communication

Information Security Program Development and Management, and the chapters under this domain are:

  • Tasks and Knowledge Statements
  • Information Security Program management overview
  • Information Security program objectives
  • Information Security program concepts
  • Scope and charter of an Information Security program
  • Information security management framework
  • Information security framework components
  • Defining an information security program roadmap
  • Information security infrastructure and architecture
  • Architecture implementation
  • Security program management and administrative activities
  • Security program services and operational activities
  • Controls and countermeasures
  • Security program metrics and monitoring

Information Security Incident Management and the chapters under this domain are:

  • Tasks and Knowledge Statements
  • Incident management overview
  • Incident response procedures
  • Information Security Manager
  • Incident management resources
  • Incident management objectives
  • Incident management metrics and indicators
  • Defining incident management procedures
  • Current state of incident response capability
  • Developing an incident response plan
  • Business continuity and disaster recovery procedures
  • Testing incident response and business continuity/disaster recovery procedures
  • Executing response and recovery plans
  • Following completion of the online assessment, you will receive a Certificate in Information Security from College of Management and IT (CMIT).
  • You may optionally take an online exam to apply for CSIM certification. This is assessed through multiple choice exam. Exam fees are not included in the course price
Technical Requirements
  • Broadband internet connection of at least 10Mbps.
  • Browser – we recommend Chrome or Safari for Tablet or Apple Mac; and Firefox or Internet Explorer for PC hardware.
  • Operating System – PC (Windows 7 or later), Mac or Android.
  • You may optionally take exams to receive CISM certification. This is assessed through computer-based multiple choice exams (ISACA-CISM). Exam fees are not included in the course price.
  • This programme does not lead to an award in the Irish National Framework of Qualifications (NFQ).
  • Click here for Accreditation Details
Student Reviews of this Course
{{ reviewsOverall }} / 5 Users (0 votes)
What students say... Leave your rating
Order by:

Be the first to leave a review.

{{{review.rating_comment | nl2br}}}

Show more
{{ pageNumber+1 }}
Leave your rating