ISACA CISM Live Online
Certified Information Security Manager (CISM) enhances credibility and ensures synchronization between the organization’s information security strategy and broader objectives. This certification elevates the perception of IT security professionals, showcasing their ability to communicate vulnerabilities and solutions from a strategic business standpoint while effectively prioritizing tasks. Additionally, CISM grants immediate recognition and credibility with external regulators, auditors, and clients, enhancing overall industry reputation.
what’s in the course?

Course Overview

Certified Information Security Manager (CISM) enhances credibility and ensures synchronization between the organization’s information security strategy and broader objectives. This certification elevates the perception of IT security professionals, showcasing their ability to communicate vulnerabilities and solutions from a strategic business standpoint while effectively prioritizing tasks. Additionally, CISM grants immediate recognition and credibility with external regulators, auditors, and clients, enhancing overall industry reputation.
What’s Included
[whats_included]
worried about cost?

Now you can pay in 4.

Buy Now, Pay Later
with
Don’t worry! Get what you want today, pay it in four installments, always interest-free with Buy Now Pay Later options. Select Afterpay at checkout.


  • All you need to apply is to have debit or credit card, to be over 18 years of age, and to be a resident of USA.

  • Late fees and additional eligibility criteria apply. The first payment may be due at the time of purchase. For complete terms visit afterpay.com/terms.
Select a course date
ISACA CISM Live Online

Course Outline 5 Chapters

  • 1.

    Enterprise Governance Overview

    2.

    Organizational Culture, Structures, Roles and Responsibilities

    3.

    Legal, Regulatory and Contractual Requirements

    4.

    Information Security Strategy

    5.

    Information Governance Frameworks and Standards

    6.

    Strategic Planning

  • 1.

    Risk and Threat Landscape

    2.

    Vulnerability and Control Deficiency Analysis

    3.

    Risk Assessment, Evaluation and Analysis

    4.

    Information Risk Response

    5.

    Risk Monitoring, Reporting and Communication

  • 1.

    IS Program Development and Resources

    2.

    IS Standards and Frameworks

    3.

    Defining an IS Program Road Map

    4.

    IS Program Metrics

    5.

    IS Program Management

    6.

    IS Awareness and Training

    7.

    Integrating the Security Program with IT Operations

    8.

    Program Communications, Reporting and Performance Management

  • 1.

    Incident Management and Incident Response Overview

    2.

    Incident Management and Response Plans

    3.

    Incident Classification/Categorization

    4.

    Incident Management Operations, Tools and Technologies

    5.

    Incident Investigation, Evaluation, Containment and Communication

    6.

    Incident Eradication, Recovery and Review

    7.

    Business Impact and Continuity

    8.

    Disaster Recovery Planning

    9.

    Training, Testing and Evaluation

  • 1.

    Mock Exams and Practice Questions

    2.

    Review of Key Concepts

    3.

    Test-taking Strategies

don’t know where to start?
Take the Quiz and
Let’s Begin Here.
Lorem ipsum, a little small blurb goes here that talks about the benefits of taking this quiz to best direct the user where to begin in their cyber security career and how the benefit from that.
Live Online
Training Schedule
Benefit from the same comprehensive training kit as our on-demand packages, but with an added edge. With Live Online Training, you’ll have a certified instructor guiding you in real-time, providing personalized feedback, expert advice on exams, and an open forum to ask all your burning questions. It’s your direct path to certification success!