Skillsoft
Skillsoft Logo

Certified Information Security Manager (CISM) 

  • Offered bySkillsoft

Certified Information Security Manager (CISM)
 at 
Skillsoft 
Overview

Duration

28 hours

Total fee

17,876

Mode of learning

Online

Difficulty level

Intermediate

Credential

Certificate

Future job roles

E-governance

Certified Information Security Manager (CISM)
 at 
Skillsoft 
Highlights

  • Mock tests with unlimited attempts & feedback - Test & study mode
  • 400mn+ users & used by Professionals in 70% of Fortune 500 companies
Details Icon

Certified Information Security Manager (CISM)
 at 
Skillsoft 
Course details

Who should do this course?
  • IT Security Professionals
  • Security Managers
  • System Administrators
  • IT professionals who want to get certified and move to a security profile
What are the course deliverables?
  • Unlimited Access to Online Content for six months
  • Course Completion certificate - renowned globally
  • 400mn+ users, World's No 1 & trained 70% of Fortune 500 companies
  • Career boost for students and professionals
  • Content aligned with Information Systems Audit and Control Association (ISACA)
  • Unlimited mock test attempts
More about this course
  • Certified Information Security Manager (CISM) is a certification for information security managers awarded by ISACA, an international professional association focused on IT Governance. This CISM course has been designed specifically to offer candidates the best-in-the-industry training to play the role of an information security manager
  • Aimed at providing the requisite learning path for those preparing for the CISM certification, the course offers high-quality online learning content and study materials
  • The course covers a wide range of topics related to information security like security governance, risk management, compliance, program development and management, and incident management
  • Providing a career boost, the course follows the 2015 ISACA Candidate Information Guide and candidates will get a course completion certificate
Read more

Certified Information Security Manager (CISM)
 at 
Skillsoft 
Curriculum

CISM: Information Security Governance (Part 1)

identify the tasks within the information security governance job practice area

recognize the outcomes of information security governance

recognize the difference between corporate governance and information security governance

match senior management roles with their corresponding responsibilities related to information security governance

identify the elements of the information security business model

recognize the interconnections between the elements of the information security business model

recognize key concepts related to information security governance

identify the optimal reporting relationship between senior management and the information security manager

label examples of reports about information security according to their intended recipients within an organization

identify the goal of converging security-related functions

identify categories of key goal indicators

recognize key concepts related to information security management

CISM: Information Security Governance (Part 2)

match the key participants in developing an information security strategy with their corresponding responsibilities

recognize appropriate models for developing an information security strategy

label examples of pitfalls that organizations may encounter as they develop an information security strategy

assess the effectiveness of a given management team's efforts to develop an information security strategy

recognize questions that an information strategy should answer

recognize two types of objectives an information security strategy should have

identify the key elements of a business case for an information security program

recognize key concepts related to approaches for determining the desired state of security

identify the aspects of security that must be assessed when determining the current state

identify the components of a roadmap for achieving security objectives

match constraints that must be considered when developing an information security strategy to their corresponding descriptions

assess the efforts of a given management team to create a roadmap for its information security strategy

CISM: Information Security Governance (Part 3)

match organizational resources with descriptions of how they are used in developing an information security strategy

distinguish between policies, standards, procedures, and guidelines

match employee-related resources with descriptions of how they impact development of an information security strategy

identify risk-related resources that become part of an information security strategy

match strategies for addressing risk to corresponding examples

recognize key concepts related to information security strategy resources

match the components of an information security action plan with their corresponding roles within the strategy

identify types of metrics used to monitor progress toward achieving information security objectives

match indicators that security objectives have been met with their corresponding descriptions

recognize the key facts about the components of an information security strategy

CISM: Information Risk Management and Compliance (Part 1)

identify the tasks within the information risk management job practice area

identify the outcomes of risk management

sequence the steps in planning a risk management program

recognize the qualities of a good risk management plan

match roles in risk management program development with their corresponding responsibilities

recognize the steps of the risk management process

distinguish between the concepts of risk management, risk analysis, and risk assessment

recognizing activities of the risk management program planning process

associate steps in the risk management process with specific outcomes of an effective risk management program

label examples as either threats or vulnerabilities

recognize examples of risk categories

recognize the process for conducting a semiquantitative risk analysis

match quantitative risk analysis methods with their corresponding descriptions

match common risk assessment methodologies with corresponding descriptions

recognize risk assessment concepts

perform quantitative risk analysis, given a scenario

CISM: Information Risk Management and Compliance (Part 2)

identify examples of information assets that should be valuated

match valuation methods with corresponding examples

recognize how to classify information assets

match disaster recovery terms with their corresponding definitions

recognize considerations related to outsourcing security services to a third-party provider

determine information asset valuation methodologies used by a given information security manager

perform information asset classification

distinguish between examples of RTOs and RPOs

match risk treatment options with corresponding examples of their use

classify examples of controls

identify types of controls

recognize considerations when planning controls and countermeasures

identify the key responsibilities of an information security manager related to risk monitoring and communication

recognize methods of integrating risk management processes with other life-cycle processes within an organization

determine appropriate actions to effectively manage a given risk

CISM: Information Security Program Development and Management (Part 1)

define the purpose of the Information Security Program Development and Management domain

describe the tasks within Information Security Program Development and Management job practice area

describe the fundamentals of an information security program

recognize how an information security program supports the objectives of information security governance

identify the defining goals of the information security program

identify key information security program concepts

develop an information security program

develop an information security program

CISM: Information Security Program Development and Management (Part 2)

describe the function of COBIT 5 in the information security management framework

identify the objectives of the information security management framework

describe the function of ISO/IEC 27001:2013 in the information security management framework

recognize the components of the information security management framework

create an information security program road map

recognize what the information security architecture involves

recognize the questions an information security manager should ask when building an IS architecture

develop an information security management framework

CISM: Information Security Program Development and Management (Part 3)

identify responsibilities of an information security manager related to administering an information security program

identify good practices related to security personnel and positive security culture

identify areas that should be part of a security awareness program

identify areas that an information security manager must be aware of and raise awareness of amongst security personnel

identify responsibilities of information security manager related to documentation

identify project management processes that are performed by information security managers

recognize key activities of the PDCA methodology

identify key points regarding the evaluation of an information security program

recognize key points related to information security management

recognize key project management responsibilities of an information security manager

recognize key points about evaluating an information security program

CISM: Information Security Program Development and Management (Part 4)

match information organizational roles to their corresponding responsibilities

determine the responsibilities of individuals within an organization related to standard security program components

sequence the steps of a security review, given a scenario

identify key points regarding audits that an information security manager should remember during program implementation

identify preventive measures that minimize security risk

identify the responsibilities of an information security manager with relation to compliance monitoring and enforcement

recognize the results of commonly used risk analysis methods

recognize the responsibilities of an information security manager related to monitoring and compliance

identify activities that allow an information security manager to integrate a security program within an organization

recognize strategies for managing risk of outsourcing when using third-party service providers

recognize examples of cloud computing models

recognize the responsibilities of an information security manager related to process integration and outsourcing

CISM: Information Security Program Development and Management (Part 5)

distinguish between two types of information security controls

recognize principles of effective security control

recognize examples of physical, environmental, and technical controls

distinguish between examples of controls and countermeasures

identify factors to consider when recommending improvements to information security controls

describe types of controls and how they are used in information security management

explain the use of controls and countermeasures to manage risk

categorize examples of information security metrics

determine whether a given metric would be effective

recognize examples of measures used to assess the effectiveness of an information security program

recognize examples of monitoring activities

recognize the relationship between information security metrics, measurement, and monitoring

recognize effective approaches to measuring and monitoring an information security program

recognize strategies for overcoming common challenges to information security management

Other courses offered by Skillsoft

5.03 K
6 hours
Intermediate
6.01 K
3 hours
Intermediate
6.01 K
3 hours
Intermediate
11.83 K
1 hours
Intermediate
View Other 249 CoursesRight Arrow Icon

Certified Information Security Manager (CISM)
 at 
Skillsoft 
Students Ratings & Reviews

4.6/5
Verified Icon13 Ratings
V
v udaykumar
Certified Information Security Manager (CISM)
Offered by Skillsoft
5
Learning Experience: Very good
Faculty: Good Best
Reviewed on 5 Jan 2023Read More
Thumbs Up IconThumbs Down Icon
A
Aashish Ranjan
Certified Information Security Manager (CISM)
Offered by Skillsoft
5
Learning Experience: Manage information security in the organization
Faculty: Instructors taught well Curriculum was relevant and comprehensive
Course Support: Career support was helpful
Reviewed on 6 Jun 2022Read More
Thumbs Up IconThumbs Down Icon
S
Sushobhan Chanda
Certified Information Security Manager (CISM)
Offered by Skillsoft
5
Learning Experience: Learning experience was good
Faculty: Instructors taught well Curriculum was relevant and comprehensive
Course Support: No career support provided
Reviewed on 2 Jun 2022Read More
Thumbs Up IconThumbs Down Icon
T
Tanmay Vijay Tamhane
Certified Information Security Manager (CISM)
Offered by Skillsoft
5
Other: Nice training experience. You get video recording of your training sessions. Which may help you in future a lot.
Reviewed on 9 Oct 2021Read More
Thumbs Up IconThumbs Down Icon
M
Manisha Chandran
Certified Information Security Manager (CISM)
Offered by Skillsoft
3
I thought its copied from the internet
Other: This programme needs more elaboration. Nothing special about this course, similar information is available on the internet as well.
Reviewed on 23 Dec 2019Read More
Thumbs Up IconThumbs Down Icon
View All 6 ReviewsRight Arrow Icon
qna

Certified Information Security Manager (CISM)
 at 
Skillsoft 

Student Forum

chatAnything you would want to ask experts?
Write here...