CISM Certification Training

CISM (Certified Information Security Manager) is a key certification for information security professionals who manage, design, oversee, and assess enterprise information security. This CISM certification course, closely aligned with ISACA's best practices, helps you learn about IT security systems.

2.1k + Satisfied learners Live Classes

CISM Certification Training Course Content

  • Lesson One: Information Security Governance Overview
  • Information Security Governance Overview Part One
  • Information Security Governance Overview Part Two
  • Information Security Governance Overview Part Three
  • Information Security Governance Overview Part Four
  • Information Security Governance Overview Part Five
  • Importance of Information Security Governance Part One
  • Importance of Information Security Governance Part Two
  • Outcomes of Information Security Governance Part one
  • Outcomes of Information Security Governance Part Two
  • Outcomes of Information Security Governance Part Three
  • Outcomes of Information Security Governance Part Four
  • Outcomes of Information Security Governance Part Five
  • Outcomes of Information Security Governance Part Six
  • Lesson Two: Effective Information Security Governance
  • Business Goals and Objectives Part One
  • Business Goals and Objectives Part Two
  • Roles and Responsibilities of Senior Management Part One
  • Roles and Responsibilities of Senior Management Part Two
  • Domain Tasks Part One
  • Domain Tasks Part Two
  • Business Model for Information Security Part One
  • Business Model for Information Security Part Two
  • Business Model for Information Security Part Three
  • Business Model for Information Security Part Four
  • Dynamic Interconnections Part One
  • Dynamic Interconnections Part Two
  • Dynamic Interconnections Part Three
  • Dynamic Interconnections Part Four
  • Lesson Three: Information Security Concepts and Technologies
  • Information Security Concepts and Technologies Part One
  • Information Security Concepts and Technologies Part Two
  • Information Security Concepts and Technologies Part Three
  • Technologies part One
  • Technologies part Two
  • Lesson Four: Information Security Manager
  • Responsibilities
  • Senior Management Commitment Part One
  • Senior Management Commitment Part Two
  • Obtaining Senior Management Commitment Part One
  • Obtaining Senior Management Commitment Part Two
  • Establishing Reporting and Communication Channels Part One
  • Establishing Reporting and Communication Channels Part Two
  • Lesson Five: Scope and Charter of Information Security Governance
  • Assurance Process Integration and Convergence
  • Convergence
  • Governance and Third-Party Relationships
  • Lesson Six: Information Security Governance Metrics
  • Metrics
  • Effective Security Metrics Part One
  • Effective Security Metrics Part Two
  • Effective Security Metrics Part Three
  • Effective Security Metrics Part Four
  • Security Implementation Metrics
  • Strategic Alignment Part One
  • Strategic Alignment Part Two
  • Risk Management
  • Value Delivery
  • Resource Management Part One
  • Resource Management Part Two
  • Performance Measurement
  • Assurance Process Integration/Convergence
  • Lesson Seven: Information Security Strategy Overview
  • Another View of Strategy
  • Lesson Eight: Creating Information Security Strategy
  • Information Security Strategy
  • Common Pitfalls Part One
  • Common Pitfalls Part Two
  • Objectives of the Information Security Strategy
  • What is the Goal?
  • Defining Objectives
  • Business Linkages
  • Business Case Development Part One
  • Business Case Development Part Two
  • Business Case Development Part Three
  • Business Case Objectives
  • The Desired State
  • COBIT
  • COBIT Controls
  • COBIT Framework
  • Capability Maturity Model
  • Balanced Scorecard
  • Architectural Approaches
  • ISO/IEC 27001 and 27002
  • Risk Objectives Part One
  • Risk Objectives Part Two
  • Lesson Nine: Determining Current State Of Security
  • Current Risk One
  • Current Risk Two
  • BIA
  • Lesson Ten: Information Security Strategy Development
  • The Roadmap
  • Elements of a Strategy
  • Strategy Resources and Constraints
  • Lesson Eleven: Strategy Resources
  • Policies and Standards
  • Definitions
  • Enterprise Information Security Architectures
  • Controls
  • Countermeasures
  • Technologies
  • Personnel
  • Organizational Structure
  • Employee Roles and Responsibilities
  • Skills
  • Audits
  • Compliance Enforcement
  • Threat Assessment
  • Vulnerability Assessment
  • Risk Assessment
  • Insurance
  • Business Impact Assessment
  • Outsourced Security Providers
  • Lesson twelve: Strategy Constraints
  • Legal and Regulatory Requirements
  • Physical Constraints
  • The Security Strategy
  • Lesson Thirteen: Action Plan to Implement Strategy
  • Gap Analysis Part One
  • Gap Analysis Part Two
  • Gap Analysis Part Three
  • Policy Development Part One
  • Policy Development Part Two
  • Standards Development
  • Training and Awareness
  • Action Plan Metrics
  • General Metric Considerations Part One
  • General Metric Considerations Part Two
  • General Metric Considerations Part Three
  • General Metric Considerations Part Four
  • CMMFour Statements
  • Objectives for CMMFour
  • Section Review
Knowledge Check
  • Knowledge Check One

  • Lesson One: Risk Management Overview
  • Risk Management Overview
  • Types of Risk Analysis
  • The Importance of Risk Management
  • Risk Management Outcomes
  • Risk Management Strategy
  • Lesson Two: Good Information Security Risk Management
  • Context and Purpose
  • Scope and Charter
  • Assets
  • Other Risk Management Goals
  • Roles and Responsibilities
  • Lesson Three: Information Security Risk Management Concepts
  • Technologies
  • Lesson Four: Implementing Risk Management
  • The Risk Management Framework
  • The External Environment
  • The Internal Environment
  • The Risk Management Context
  • Gap Analysis
  • Other Organizational Support
  • Lesson Five: Risk Assessment
  • NIST Risk Assessment Methodology
  • Aggregated or Cascading Risk
  • Other Risk Assessment Approaches
  • Identification of Risks
  • Threats
  • Vulnerabilities Part One
  • Vulnerabilities Part Two
  • Risks
  • Analysis of Relevant Risks
  • Risk Analysis
  • Semi -Quantitative Analysis
  • Quantitative Analysis Example
  • Evaluation of Risks
  • Risk Treatment Options
  • Impact
  • Lesson Six: Controls Countermeasures
  • Controls
  • Residual Risk
  • Information Resource Valuation
  • Methods of Valuing Assets
  • Information Asset Classification
  • Determining Classification
  • Impact Part One
  • Impact Part Two
  • Lesson Seven: Recovery Time Objectives
  • Recovery Point Objectives
  • Service Delivery Objectives
  • Third-Party Service Providers
  • Working with Lifecycle Processes
  • IT System Development
  • Project Management Part One
  • Project Management Part Two
  • Lesson Eight: Risk Monitoring and Communication
  • Risk Monitoring and Communication
  • Other Communications
  • Section Review
Knowledge Check
  • Knowledge Check Two

  • Introduction
  • Lesson One: Development of Information Security Program
  • Importance of the Program
  • Outcomes of Security Program Development
  • Effective Information Security Program Development
  • Lesson Two: Information Security Program Objectives
  • Cross Organizational Responsibilities
  • Program Objectives Part One
  • Program Objectives Part Two
  • Defining Objectives Part One
  • Defining Objectives Part Two
  • Lesson 3: Information Security Program Development Concepts Part One
  • Information Security Program Development Concepts Part Two
  • Technology Resources
  • Information Security Manager
  • Lesson Four: Scope and Charter of Information Security Program Development
  • Assurance Function Integration
  • Challenges in Developing Information Security Program
  • Pitfalls
  • Objectives of the Security Program
  • Program Goals
  • The Steps of the Security Program
  • Defining the Roadmap Part One
  • Defining the Roadmap Part Two
  • Elements of the Roadmap Part One
  • Elements of the Roadmap Part Two
  • Elements of the Roadmap Part Three
  • Elements of the Roadmap Part Four
  • Elements of the Roadmap Part Five
  • Gap Analysis
  • Lesson Five: Information Security Management Framework
  • Security Management Framework
  • COBIT Five
  • ISO/IEC 27001
  • Lesson Six: Information Security Framework Components
  • Operational Components Part One
  • Operational Components Part Two
  • Management Components
  • Administrative Components
  • Educational and Informational Components
  • Lesson Seven: Information Security Program Resources
  • Resources
  • Documentation
  • Enterprise Architecture Part One
  • Enterprise Architecture Part Two
  • Enterprise Architecture Part Three
  • Controls as Strategy Implementation Resources Part One
  • Controls as Strategy Implementation Resources Part Two
  • Controls as Strategy Implementation Resources Part Three
  • Controls as Strategy Implementation Resources Part Four
  • Common Control Practices
  • Countermeasures
  • Technologies Part One/li>
  • Technologies Part Two
  • Technologies Part Three
  • Technologies Part Four
  • Personnel Part One
  • Personnel Part Two
  • Security Awareness
  • Awareness Topics
  • Formal Audits
  • Compliance Enforcement
  • Project Risk Analysis
  • Other Actions
  • Other Organizational Support
  • Program Budgeting Part One
  • Program Budgeting Part Two
  • Lesson Eight: Implementing an Information Security Program
  • Policy Compliance
  • Standards Compliance
  • Training and Education
  • ISACA Control Objectives
  • Third-party Service Providers Part One
  • Third-party Service Providers Part Two
  • Integration into Lifecycle Processes
  • Monitoring and Communication
  • Documentation
  • The Plan of Action Part One
  • The Plan of Action Part Two
  • Lesson Nine: Information Infrastructure and Architecture
  • Managing Complexity Part One
  • Managing Complexity Part Two
  • Objectives of Information Security Architectures Part One
  • Objectives of Information Security Architectures Part Two
  • Physical and Environmental Controls
  • Lesson Ten: Information Security Program
  • Information Security Program Deployment Metrics
  • Metrics
  • Strategic Alignment
  • Risk Management
  • Value Delivery
  • Resource Management
  • Assurance Process Integration
  • Performance Measurement
  • Security Baselines
  • Lesson Eleven: Security Program Services and Operational Activities
  • IS Liaison Responsibilities Part One
  • IS Liaison Responsibilities Part Two
  • Cross-Organizational Responsibilities
  • Security Reviews and Audits Part One
  • Security Reviews and Audits Part Two
  • Management of Security Technology
  • Due Diligence Part One
  • Due Diligence Part Two
  • Compliance Monitoring and Enforcement Part One
  • Compliance Monitoring and Enforcement Part Two
  • Assessment of Risk and Impact Part One
  • Assessment of Risk and Impact Part Two
  • Outsourcing and Service Providers
  • Cloud Computing Part One
  • Cloud Computing Part Two
  • Cloud Computing Part Three
  • Integration with IT Processes
  • Section Review
Knowledge Check
  • Knowledge Check Three

  • Lesson One: Incident Management Overview Part One
  • Incident Management Overview Part Two
  • Incident Management Overview Part Three
  • Types of Events Part One
  • Types of Events Part Two
  • Goals of Incident Management Part One
  • Goals of Incident Management Part Two
  • Goals of Incident Management Part Three
  • Lesson Two: Incident Response Procedures Part One
  • Incident Response Procedures Part Two
  • Importance of Incident Management
  • Outcomes of Incident Management
  • Incident Management
  • Concepts Part One
  • Concepts Part Two
  • Concepts Part Three
  • Incident Management Systems Part One
  • Incident Management Systems Part Two
  • Lesson Three: Incident Management Organization
  • Responsibilities Part One
  • >Responsibilities Part Two
  • Responsibilities Part Three
  • Senior Management Commitment
  • Lesson Four: Incident Management Resources
  • Policies and Standards
  • Incident Response Technology Concepts
  • Personnel
  • Roles and Responsibilities (eNotes)
  • Skills
  • Awareness and Education
  • Audits
  • Lesson Five: Incident Management Objectives
  • Defining Objectives
  • The Desired State
  • Strategic Alignment
  • Other Concerns
  • Lesson Six: Incident Management Metrics and Indicators
  • Implementation of the Security Program Management
  • Management Metrics and Monitoring Part One
  • Management Metrics and Monitoring Part Two
  • Other Security Monitoring Efforts
  • Lesson Seven: Current State of Incident Response Capability
  • Threats
  • Vulnerabilities
  • Lesson Eight: Developing an Incident Response Plan
  • Elements of an Incident Response Plan
  • Gap Analysis
  • BIA Part One
  • BIA Part Two
  • Escalation Process for Effective IM
  • Help Desk Processes for Identifying Security Incidents
  • Incident Management and Response Teams
  • Organizing, Training, and Equipping the Response Staff
  • Incident Notification Process
  • Challenges in making an Incident Management Plan
  • Lesson Nine: BCP/DRP
  • Goals of Recovery Operations Part One
  • Goals of Recovery Operations Part Two
  • Choosing a Site Selection Part One
  • Choosing a Site Selection Part Two
  • Implementing the Strategy
  • Incident Management Response Teams
  • >Network Service High-availability
  • Storage High-availability
  • Risk Transference
  • Other Response Recovery Plan Options
  • Lesson Ten: Testing Response and Recovery Plans
  • Periodic Testing
  • Analyzing Test Results Part One
  • Analyzing Test Results Part Two
  • Measuring the Test Results
  • Lesson Eleven: Executing the Plan
  • Updating the Plan
  • Intrusion Detection Policies
  • Who to Notify about an Incident
  • Recovery Operations
  • Other Recovery Operations
  • Forensic Investigation
  • Hacker / Penetration Methodology
  • Section Review
  • Sequence Five
Knowledge Check
  • Knowledge Check Four

Get detailed course syllabus in your inbox

Structure your learning and get a certificate to prove it.

Apply Now

CISM Certification Training Certification

Wisdom Educations CISM Certification Training Certification Holders work at 1000s of companies like
Sample of Certificate

CISM Certification Training FAQs

ISACA uses and reports scores on a common scale of 200 to 800. For example, the scaled score of 800 represents a perfect score with all questions answered correctly; a scaled score of 200 is the lowest score possible and signifies that only a small number of questions were answered correctly. You must achieve a score of 450 or higher to pass the CISM exam.

After successful completion of the training, you will be awarded the course completion certificate along with the 16 CPE certificate from Wisdom Educations.

Yes, we do provide assistance for the exam application process. You can state your queries on community.simplilearn.com and get them answered along with any other query or concern that you might have about the course.

Our CISM course is developed to deliver a first attempt pass rate of 100%. With a hands-on learning approach, the training not only gives you the confidence to clear the exam but also helps you retain the knowledge beyond the examination.

Contact us using the form on the right of any page on the Simplilearn website, or select the Live Chat link. Our customer service representatives will be able to give you more details.

CISM Course Key Features

Exam Voucher Included

ISACA Elite Partner

ISACA Accredited Instructors

Official CISM® Review Questions & Explanations Database

Official Review manual from ISACA

16 CPE’s offered