Site Logo

Hello, you are using an old browser that's unsafe and no longer supported. Please consider updating your browser to a newer version, or downloading a modern browser.

ISACA OFFICIAL CISM CERTIFICATION

Our ISACA Official CISM Certification Programs are geared towards preparing students to pass the Certified Information Security Manager examination.

CISM CERTIFICATION COURSE OUTLINE

Our courses are boosted with Training Camp’s exam prep methodology so your course content will always be up-to-date with the most current version of the exam.

INFORMATION SECURITY GOVERNANCE

Explain the need for and the desired outcomes of an effective information security strategy
Create an information security strategy aligned with organizational goals and objectives
>Gain stakeholder support using business cases
Identify key roles and responsibilities needed to execute an action plan
Establish metrics to measure and monitor the performance of security governance

INFORMATION RISK MANAGEMENT

Explain the importance of risk management as a tool to meet business needs and develop a security management program to support these needs
Identify, rank, and respond to a risk in a way that is appropriate as defined by organizational directives
Assess the appropriateness and effectiveness of information security controls
Report information security risk effectively

INFORMATION SECURITY PROGRAM DEVELOPMENT AND MANAGEMENT

Align information security program requirements with those of other business functions
Manage the information security program resources
Design and implement information security controls
Incorporate information security requirements into contracts, agreements and third-party management processes

INFORMATION SECURITY INCIDENT MANAGEMENT

Understand the concepts and practices of Incident Management
Identify the components of an Incident Response Plan and evaluate its effectiveness
Understand the key concepts of Business Continuity Planning, or BCP and Disaster Recovery Planning, or DRP
Be familiar with techniques commonly used to test incident response capabilities