Professional certification in Cybersecurity

CERTIFIED INFORMATION SECURITY MANAGEMENT – CISM TRAINING

Our IT training courses are developed with industry-standards and career-focused technologies.


Speak to an advisor
Award:
Certification
Awarding Body:
ISACA
Duration & Study Mode:
Full time, Part time, Evening and Weekends, Virtual online
Location:
London, Flexible online
Duration: 5 Days / 5 Weeks

ISACA’s CISM (Certified Information Security Management) is a certified course for IT professionals and approved by ISACA (Information System Audit and Control Association). This certification course is designed for IT professionals and executives who are responsible for managing, designing, developing, deploying and configuring the enterprise-level security protocols for the organization. The content of this course is designed to help the security managers who are in charge of information security management of the organization. CISM course is considered as one of the most prominent credentials for the IT professionals, since 2002. This certification validates the capability of an individual to develop, deploy and configure the applications to ensure the security of the information of the organization.

Considering the skills required for information security management professional, the content of the CISM course focuses and covers the following subject matters:

1. Managing and governing the Information Security protocols of the organization
2. Assess the information regarding the compliance issue and the risk factors
3. Managing any incident regarding Information Security
4. Developing and configuring applications for Information Security
5. Provide hand-on experience so that, the candidates can perform effectively and efficiently at their workplace
6. The training for CISM course is designed to ensure the maximum success rate for the candidates

Prerequisites

  • Pass the CISM Exam within the last 5 years.
  • Have the relevant full-time work experience in the CISM Job Practice Areas.
  • Submit the CISM Certification Application including Application Processing Fee.

What will you gain after this course

Whether you are seeking a new career opportunity or striving to grow within your current organization, a CISM certification proves your expertise in these work-related domains:

  • Information Security Governance
  • Information Risk Management
  • Information Security Program Development & Management
  • Information Security Incident Management

Jobs you can get
with a CISM Certification

  • IT auditor
  • Cybersecurity Specialist
  • Analyst
  • Penetration And Vulnerability Tester

Corporate Group Training

  • Customized Training
  • Onsite / Virtual
  • Instructor-led Delivery
  • For small to large groups

Request Brochure

Top 10 IT Skills in Demand for 2023

Top 10 IT Skills in Demand for 2023

The global economy is constantly changing and evolving, so today's skills in high demand may not be as important ten years from now. This article

If you are not going to university how to get an IT job?

If you are not going to university how to get an IT job?

With the number of graduates in the IT field predicted to grow by 22% between now and 2024, it’s no surprise that there are

Google Certified Professional Cloud Architect Certification

Google Certified Professional Cloud Architect Certification

Cloud Architect professionals’ have adequate knowledge and skill to integrate Google Cloud infrastructure as part of the core IT platform for the company. These professionals

London IT Training Google

AWS Certified Cloud Practitioner

AWS Certified Cloud Practitioner

As by the name, it is evident that this course is a fundamental course in which the start will be taken from a very

CompTIA Server+ Certification

CompTIA Server+ Certification

An overview of CompTIA Server+ Certification: CompTIA Server+ certification recognises both the knowledge and experience of an IT Professional to configure, maintain and troubleshoot the

CompTIA A+ Certification

CompTIA A+ Certification

Competencies of CompTIA A+ certification for an entry-level IT Technician CompTIA A+ certifications certify the set of skill and knowledge required for an entry-level IT

MCSA Certification

MCSA Certification

MCSA (Microsoft Certified Solutions Associate) is a certification programme designed for individuals seeking entry-level positions in information technology (IT). It is required for advanced

IT Support Technician Courses Training

The roles of IT support technicians are significant for the IT department of any business. They are the key responsible person as the company's IT staff to keep any IT-related

London IT Training IT Technical

Coding Courses London

Our Programming and Development course portfolio caters to a wide range of learners, from beginners learning the fundamentals to experienced programmers honing their skills in multiple programming languages. These courses

IT Training Online

Online education and training have become more popular and convenient and also saw rapid progress in recent months due to COVID pandemic. But online learning has been around for quite

Short IT Courses Training

The rapid increase of modern digital technologies such as IoT, AI, applications and operations of robots have made the business sequences much easier and convenient for organisations and it can

AWS Courses

AWS (Azure Web Services) is an enterprise-level cloud platform from Amazon. We offer a list of AWS training to make you prepare to work effectively on this platform. Among the

Get a 10% discount

If you enrol two months in advance

Select your preferred training delivery mode

Who is this certification for?

ISACA’s Certified Information Security Manager (CISM) certification is for those with technical expertise and experience in IS/IT security and control and wants to make the move from team player to manager. CISM can add credibility and confidence to your interactions with internal and external stakeholders, peers and regulators.

Syllabus

  • Establish maintain an information security strategy in alignment with organizational goals and objectives
  • Maintain an information security governance framework to guide activities that support the information security strategy.
  • Integrate information security governance into corporate governance to ensure that organizational goals and objectives are supported by the information security program.
  • Maintain information security policies to guide the development of standards, procedures and guidelines in alignment with enterprise goals and objectives.
  • Develop business cases to support investments in information security.
  • Identify internal and external influences to the organization to ensure that these factors are continually addressed by the information security strategy.
  • Gain ongoing commitment from senior leadership and other stakeholders to support the successful implementation of the information security strategy.
  • Define, communicate, and monitor information security responsibilities throughout the organization
  • Establish, monitor, evaluate and report key information security metrics to provide management with accurate and meaningful information regarding the effectiveness of the information security strategy.
  • Maintain a process for information asset classification to ensure that measures taken to protect assets are proportional to their business value.
  • Identify legal, regulatory, organizational and other applicable requirements to manage the risk of noncompliance to acceptable levels.
  • Ensure that risk and vulnerability assessments and threat analyses are conducted consistently, at appropriate times, and to identify and assess risk to the organization’s information.
  • Identify, recommend or implement appropriate risk treatment/response options to manage risk to acceptable levels based on organizational risk appetite.
  • Determine whether information security controls are appropriate and effectively manage risk to an acceptable level.
  • Facilitate the integration of information risk management into business and IT processes
  • Monitor for internal and external factors that may require reassessment of risk to ensure that changes to existing, or new, risk scenarios are identified and managed appropriately.
  • Report noncompliance and other changes in information risk to facilitate the risk management decision-making process.
  • Ensure that information security risk is reported to senior management to support an understanding of potential impact on the organizational goals and objectives.
  • Establish the information security program in alignment with the information security strategy.
  • Align the information security program with the operational objectives of other business functions
  • Identify, acquire and manage requirements for internal and external resources to execute the information security program.
  • Establish and maintain information security processes and resources to execute the information security program in alignment with the organization’s business goals.
  • Establish, communicate and maintain organizational information security standards, guidelines, procedures and other documentation to guide and enforce compliance with information security policies.
  • Establish, promote and maintain a program for information security awareness and training to foster an effective security culture.
  • Integrate information security requirements into organizational processes to maintain the organization’s security strategy.
  • Integrate information security requirements into contracts and activities of third parties
  • Establish, monitor and analyze program management and operational metrics to evaluate the effectiveness and efficiency of the information security program.
  • Establish and maintain an organizational definition of, and severity hierarchy for, information security incidents to allow accurate classification and categorization of and response to incidents.
  • Establish and maintain an incident response plan to ensure an effective and timely response to information security incidents.
  • Develop and implement processes to ensure the timely identification of information security incidents that could impact the business.
  • Establish and maintain processes to investigate and document information security incidents in order to determine the appropriate response and cause while adhering to legal, regulatory and organizational requirements.
  • Establish and maintain incident notification and escalation processes to ensure that the appropriate stakeholders are involved in incident response management.
  • Organize, train and equip incident response teams to respond to information security incidents in an effective and timely manner.
  • Test, review and revise (as applicable) the incident response plan periodically to ensure an effective response to information security incidents and to improve response capabilities.
  • Establish and maintain communication plans and processes to manage communication with internal and external entities.
  • Establish and maintain integration among the incident response plan, business continuity plan and disaster recovery plan.

06/10/202510:00 – 17:00Mon - Fri5 Days Classroom/ Live-onlinePlaces available Future Dates/Request Price
13/10/202510:00 – 17:00Mon - Fri5 Days Classroom/ Live-onlinePlaces available Future Dates/Request Price
20/10/202510:00 – 17:00Mon - Fri5 Days Classroom/ Live-onlinePlaces available Future Dates/Request Price
27/10/202510:00 – 17:00Mon - Fri5 Days Classroom/ Live-onlinePlaces available Future Dates/Request Price
03/11/202510:00 – 17:00Mon - Fri5 Days Classroom/ Live-onlinePlaces available Future Dates/Request Price
10/11/202510:00 – 17:00Mon - Fri5 Days Classroom/ Live-onlinePlaces available Future Dates/Request Price
17/11/202510:00 – 17:00Mon - Fri5 Days Classroom/ Live-onlinePlaces available Future Dates/Request Price
24/11/202510:00 – 17:00Mon - Fri5 Days Classroom/ Live-onlinePlaces available Future Dates/Request Price
01/12/202510:00 – 17:00Mon - Fri5 Days Classroom/ Live-onlinePlaces available Future Dates/Request Price
08/12/202510:00 – 17:00Mon - Fri5 Days Classroom/ Live-onlinePlaces available Future Dates/Request Price
15/12/202510:00 – 17:00Mon - Fri5 Days Classroom/ Live-onlinePlaces available Future Dates/Request Price
05/01/202610:00 – 17:00Mon - Fri5 Days Classroom/ Live-onlinePlaces available Future Dates/Request Price
12/01/202610:00 – 17:00Mon - Fri5 Days Classroom/ Live-onlinePlaces available Future Dates/Request Price
19/01/202610:00 – 17:00Mon - Fri5 Days Classroom/ Live-onlinePlaces available Future Dates/Request Price
26/01/202610:00 – 17:00Mon - Fri5 Days Classroom/ Live-onlinePlaces available Future Dates/Request Price
02/02/202610:00 – 17:00Mon - Fri5 Days Classroom/ Live-onlinePlaces available Future Dates/Request Price
09/02/202610:00 – 17:00Mon - Fri5 Days Classroom/ Live-onlinePlaces available Future Dates/Request Price
16/02/202610:00 – 17:00Mon - Fri5 DaysClassroom/ Live-onlinePlaces available Future Dates/Request Price
23/02/202610:00 – 17:00Mon - Fri5 Days Classroom/ Live-onlinePlaces available Future Dates/Request Price
02/03/202610:00 – 17:00Mon - Fri5 DaysClassroom/ Live-onlinePlaces available Future Dates/Request Price
09/03/202610:00 – 17:00Mon - Fri5 Days Classroom/ Live-onlinePlaces available Future Dates/Request Price
16/03/202610:00 – 17:00Mon - Fri5 Days Classroom/ Live-onlinePlaces available Future Dates/Request Price
23/03/202610:00 – 17:00Mon - Fri5 Days Classroom/ Live-onlinePlaces available Future Dates/Request Price
30/03/202610:00 – 17:00Mon - Fri5 Days Classroom/ Live-onlinePlaces available Future Dates/Request Price
13/03/202610:00 – 17:00Mon - Fri5 Days Classroom/ Live-onlinePlaces available Future Dates/Request Price
20/03/202610:00 – 17:00Mon - Fri5 Days Classroom/ Live-onlinePlaces available Future Dates/Request Price
27/03/202610:00 – 17:00Mon - Fri5 Days Classroom/ Live-onlinePlaces available Future Dates/Request Price
13/04/202610:00 – 17:00Mon - Fri5 Days Classroom/ Live-onlinePlaces available Future Dates/Request Price
20/04/202610:00 – 17:00Mon - Fri5 Days Classroom/ Live-onlinePlaces available Future Dates/Request Price
27/04/202610:00 – 17:00Mon - Fri5 Days Classroom/ Live-onlinePlaces available Future Dates/Request Price
11/05/202610:00 – 17:00Mon - Fri5 Days Classroom/ Live-onlinePlaces available Future Dates/Request Price
18/05/202610:00 – 17:00Mon - Fri5 Days Classroom/ Live-onlinePlaces available Future Dates/Request Price
25/05/2026
10:00 – 17:00Mon - Fri5 Days Classroom/ Live-onlinePlaces available Future Dates/Request Price
01/06/202610:00 – 17:00Mon - Fri5 Days Classroom/ Live-onlinePlaces available Future Dates/Request Price

Scroll Up