Certified Information Security Manager (CISM) (Voucher Included)
In a world where cyberattacks are rising, security managers are the driving force behind an organization's cybersecurity policies, ensuring that risk assessments, vulnerability assessments, and threat analyses are conducted consistently to safeguard an organization's information. These key individuals typically started their IT careers in hands-on roles before earning their Certified Information Security Manager (CISM) certification and taking on managerial duties. This CISM training course is...
Certified Information Security Manager (CISM) (Voucher Included)
Details + Objectives
Course code: GES3106
What you will learn
- Understand information security governance strategies and responsibilities
- Review information risk management and compliance
- Discover information security program development and management fundamentals
- Learn how to use and apply information security incident management
How you will benefit
- Build confidence toward successfully completing the CISM certification exam
- Become recognized by ISACA, a global leader in certification, training, and career development
- Prove comprehensive information security knowledge to employers, validated by your CISM certification
How the course is taught
- Self-paced, online course
- 6 Months to complete
- Open enrollment, begin anytime
- 75 course hours
Instructors & Support
Derrick Coston
Derrick Coston is a blue-team cybersecurity professional. Derrick has run a team of cybersecurity professionals for a major financial institution. Outside of teaching classes such as CISA and CISSP, Derrick serves as a cybersecurity consultant and auditor for organizations and performs security assessments for large organizations.
Requirements
Prerequisites:
While there are no prerequisites to take this course, ISACA recommends at least five years of work experience in information security. The work experience must be gained within the 10-year period preceding the application date for certification.
Certification Requirements:
ISACA recommends 5 or more years of work experience in information security management, with at least 3 years of that experience in three or more of the job practice analysis areas – or domains – listed below:
- Domain 1: Information Security Governance
- Domain 2: Information Risk Management and Compliance
- Domain 3: Information Security Program Development and Management
- Domain 4: Information Security Incident Management
Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 10 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Virtual Labs included with course
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment.
- Study guide
- Practice exams
The following textbook(s) will also be shipped to you approximately 7-10 business days after enrollment:
- Principles of Information Security, 7th Edition
More About
About Certification: ISACA
ISACA is an independent, nonprofit, global association that engages in the development, adoption and use of globally acceptedinformation system(IS) knowledge and practices. Previously known as the Information Systems Audit and Control Association, ISACA now goes by its acronym only.
ISACA provides guidance, benchmarks and governance tools for enterprises that use information systems. ISACA also hosts a series of international conferences that focus on technical and managerial topics relating to IS assurance, control, security and IT governance.
It also administers many professional certifications, including Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), Certified in the Governance of Enterprise IT, Certified in Risk and Information Systems Control, Certified Data Privacy Systems Engineer, Cybersecurity Practitioner Credential, Certified in Emerging Technology (CET) and Information Technology Certified Associate (ITCA). Candidates must pass a certification exam to obtain the desired credential. Due to the popularity of the CISA exam, ISACA increased the frequency and locations of test centers for CISA candidates several years ago.