CISM® - Certified Information Security Manager
he CISM certification program was developed by ISACA for experienced information security management professionals who have experience developing and managing information security programs and who understand the program's relationship to the overall business goals. The CISM exam consists of 200 multiple-choice questions that cover the four CISM domains. The American National Standards Institute (ANSI) has accredited the CISM certification program under ISO/IEC 17024:2003, General Requirements for Bodies Operating Certification Systems of Persons.
About this Course
The CSIM course is blended learning combining classroom instruction (remote-live) and self paced training.
Outline
Domain 1: Information Security Governance
Develop an information security strategy, aligned with business goals and directives. Establish and maintain an information security governance framework. Integrate information security governance into corporate governance. Develop and maintain information security policies. Develop business cases to support investments in information security. Identify internal and external influences to the organization. Gain ongoing commitment from senior leadership and other stakeholders. Define, communicate and monitor information security responsibilities Establish internal and external reporting and communication channels.
Domain 2: Information Risk Management
Establish and/or maintain a process for information asset classification to ensure that measures taken to protect assets are proportional to their business value. Identify legal, regulatory, organizational and other applicable requirements to manage the risk of noncompliance to acceptable levels. Ensure that risk assessments, vulnerability assessments and threat analyses are conducted consistently, and at appropriate times, to identify and assess risk to the organization’s information. Identify, recommend or implement appropriate risk treatment/response options to manage risk to acceptable levels based on organizational risk appetite. Determine whether information security controls are appropriate and effectively manage risk to an acceptable level. Facilitate the integration of information risk management into business and IT processes to enable a consistent and comprehensive information risk management program across the organization. Monitor for internal and external factors (e.g., threat landscape, cybersecurity, geopolitical, regulatory change) that may require a reassessment of risk to ensure that changes to existing or new risk scenarios are identified and managed appropriately. Report noncompliance and other changes in information risk to facilitate the risk management decision-making process. Ensure that information security risk is reported to senior management to support an understanding of the potential impact on the organizational goals and objectives.
Domain 3: Information Security Program Development & Management
Develop a security program, aligned with information security strategy Ensure alignment between the information security program and other business functions Establish and maintain requirements for all resources to execute the IS program Establish and maintain IS architectures to execute the IS program Develop documentation that ensures compliance with policies Develop a program for information security awareness and training Integrate information security requirements into organizational processes Integrate information security requirements into contracts and activities of third parties Develop procedures (metrics) to evaluate the effectiveness and efficiency of the IS program Compile reports to key stakeholders on the overall effectiveness of the IS program and the underlying business processes in order to communicate security performance.
Domain 4: Information Security Incident Management
Define (types of) information security incidents Establish an incident response plan Develop processes for timely identification of information security incidents Develop processes to investigate and document information security incidents Develop incident escalation and communication processes Establish teams that effectively respond to information security incidents Test and review the incident response plan Establish communication plans and processes Determine the root cause of IS incidents Align the incident response plan with DRP and BCP.
Exam Details
Exam: CISM® - Certified Information Security Manager
Exam Pass Guarantee
At Microtrain we are committed to your success! Let us show you the return you get from great tech training. We will personally guarantee that if you take our class and follow our program you will be successfully certified!
Raves & Praise
Ron Cwik
PMP Certification Training, 2008
Great training facility. Great instructors. Great experience.
D. Easter
PMP Certification Training, November 2008
Thanks Microtrain for conducting a great PMP course that set me on a successful path to obtain my PMP certification. I have passed the test!
Jean S.
PMP Certification Training, Lombard, 2008
I was laid off for many months and not really getting many callbacks for my resume and no job offers. After I put the letters PMP on it, not only did I see an increase in quantity, but also quality of interviews. I had been spinning my wheels for 5 months, and after the PMP went on, I had 2 job offers in 6 weeks. It really was the "golden ticket"
Karine Bucci
Project Management
Great class, loved the interaction and team-building exercises. Plenty of materials and learning tools supplied. Although it was a full week's class, never boring. Donna [Russell] was awesome and gave many supporting examples for better understanding.
Robert Graf
MCSA
Microtrain presents the course material in an interesting and concise manner. Microtrain gives the student all the resources necessary to pass the certification exams. Both the Chicago and Lombard facilities were excellent, and the staff goes to any length to accommodate any student changes.
Connect with MicroTrain
Begin building a successful long-term career pathway.