CISM Certification Training
Simplilearn
How long?
- 8 days
- online
- on demand
What are the topics?
Simplilearn
Coursalytics is an independent platform to find, compare, and book executive courses. Coursalytics is not endorsed by, sponsored by, or otherwise affiliated with any business school or university.
Full disclaimer.Read more about Cybersecurity
Read more about Operations
Reviews
Comprehensive course analysis
Essentials
- What do past participants have to say about the course?
Full
- How many participants were promoted within three years after graduation?
- How did this course affect participants' professional trajectories?
- How many participants got their salary increased within two years after completing the program?
- What do past participants have to say about the course?
Who should attend
CISM certification is a globally recognized professional requirement in the IT Security domain. This certification is best suited for security consultants and managers, IT directors and managers, security auditors and architects, security system engineers, CISOs, information security managers, IT consultants, and risk officers.
Pre-requisites
To become a CISM certified professional or to opt for this CISM training course, you need to fulfill some criteria, including - A completed application submitted within five years from the date of initially passing the examination (you must ensure that all experience is independently verified by employers).
About the course
CISM (Certified Information Security Manager) is a key certification for information security professionals who manage, design, oversee, and assess enterprise information security. This CISM certification course, closely aligned with ISACA's best practices, helps you learn about IT security systems.
Course Overview
You will acquire the requisite skills to design, deploy, and manage security architecture for your organization with this CISM certification training from Simplilearn. This course is aligned with ISACA best practices. Today, enterprises and government agencies increasingly expect their IT professionals to hold a CISM certification.
Key Features
- 16 hours of high-quality e-learning content
- 16 CPE’s offered
Skills Covered
- Information Security Governance
- Information Security Incident Management
- Design security architecture
- Knowledge of ISACA domains
- Information security programs
- Enterprise IT frameworks
Course Curriculum
Domain 01: Information Security Governance
Lesson 1: Information Security Governance Overview
Information Security Governance Overview Part 1
Information Security Governance Overview Part 2
Information Security Governance Overview Part 3
Information Security Governance Overview Part 4
Information Security Governance Overview Part 5
Importance of Information Security Governance Part 1
Importance of Information Security Governance Part 2
Outcomes of Information Security Governance Part 1
Outcomes of Information Security Governance Part 2
Outcomes of Information Security Governance Part 3
Outcomes of Information Security Governance Part 4
Outcomes of Information Security Governance Part 5
Outcomes of Information Security Governance Part 6
Lesson 2: Effective Information Security Governance
Business Goals and Objectives Part 1
Business Goals and Objectives Part 2
Roles and Responsibilities of Senior Management Part 1
Roles and Responsibilities of Senior Management Part 2
Domain Tasks Part 1
Domain Tasks Part 2
Business Model for Information Security Part 1
Business Model for Information Security Part 2
Business Model for Information Security Part 3
Business Model for Information Security Part 4
Dynamic Interconnections Part 1
Dynamic Interconnections Part 2
Dynamic Interconnections Part 3
Dynamic Interconnections Part 4
Lesson 3: Information Security Concepts and Technologies
Information Security Concepts and Technologies Part 1
Information Security Concepts and Technologies Part 2
Information Security Concepts and Technologies Part 3
Technologies Part 1
Technologies Part 2
Lesson 4: Information Security Manager
Responsibilities
Senior Management Commitment Part 1
Senior Management Commitment Part 2
Obtaining Senior Management Commitment Part 1
Obtaining Senior Management Commitment Part 2
Establishing Reporting and Communication Channels Part 1
Establishing Reporting and Communication Channels Part 2
Lesson 5: Scope and Charter of Information Security Governance
Assurance Process Integration and Convergence
Convergence
Governance and Third-Party Relationships
Lesson 6: Information Security Governance Metrics
Metrics
Effective Security Metrics Part 1
Effective Security Metrics Part 2
Effective Security Metrics Part 3
Effective Security Metrics Part 4
Security Implementation Metrics
Strategic Alignment Part 1
Strategic Alignment Part 2
Risk Management
Value Delivery
Resource Management Part 1
Resource Management Part 2
Performance Measurement
Assurance Process Integration/Convergence
Lesson 7: Information Security Strategy Overview
Another View of Strategy
Lesson 8: Creating Information Security Strategy
Information Security Strategy
Common Pitfalls Part 1
Common Pitfalls Part 2
Objectives of the Information Security Strategy
What is the Goal?
Defining Objectives
Business Linkages
Business Case Development Part 1
Business Case Development Part 2
Business Case Development Part 3
Business Case Objectives
The Desired State
COBIT
COBIT Controls
COBIT Framework
Capability Maturity Model
Balanced Scorecard
Architectural Approaches
ISO/IEC 27001 and 27002
Risk Objectives Part 1
Risk Objectives Part 2
Lesson 9: Determining Current State Of Security
Current Risk Part 1
Current Risk Part 2
BIA
Lesson 10: Information Security Strategy Development
The Roadmap
Elements of a Strategy
Strategy Resources and Constraints
Lesson 11: Strategy Resources
Policies and Standards
Definitions
Enterprise Information Security Architectures
Controls
Countermeasures
Technologies
Personnel
Organizational Structure
Employee Roles and Responsibilities
Skills
Audits
Compliance Enforcement
Threat Assessment
Vulnerability Assessment
Risk Assessment
Insurance
Business Impact Assessment
Outsourced Security Providers
Lesson 12: Strategy Constraints
Legal and Regulatory Requirements
Physical Constraints
The Security Strategy
Lesson 13: Action Plan to Implement Strategy
Gap Analysis Part 1
Gap Analysis Part 2
Gap Analysis Part 3
Policy Development Part 1
Policy Development Part 2
Standards Development
Training and Awareness
Action Plan Metrics
General Metric Considerations Part 1
General Metric Considerations Part 2
General Metric Considerations Part 3
General Metric Considerations Part 4
CMM4 Statements
Objectives for CMM4
Section Review
Knowledge Check
Training Options
SELF-PACED LEARNING
- Lifetime access to high-quality self-paced e-learning content curated by industry experts
- 24x7 learner assistance and support
Experts
Dean Pompilio
Mr.Pompilio has been an IT Professional since 1989. He has worn many hats along the way and holds over 20 IT certifications which include EC-Council CEI, CEH, CHFI, CISSP, CISA, CISM. His passion is to help IT professionals achieve their training goals and career growth. A+, CASP, Cloud+, Networ...
Videos and materials
CISM Certification Training at Simplilearn
Read more about Cybersecurity
Read more about Operations
Because of COVID-19, many providers are cancelling or postponing in-person programs or providing online participation options.
We are happy to help you find a suitable online alternative.