Certified Information Security Manager
ISACA's Certified Information Security Manager (CISM) certification brings credibility to your team and ensures alignment between the organization's information security program and its broader goals and objectives.
Talk to us

COURSE OVERVIEW

ISACA’s Certified Information Security Manager (CISM) certification is for those with technical expertise and experience in IS/IT security and control and wants to make the move from team player to manager. CISM can add credibility and confidence to your interactions with internal and external stakeholders, peers and regulators.

Candidates for the CISM certification must adhere to ISACA’s Code of Professional Ethics, and submit evidence of five years’ work experience in the field of information security. Work experience must be gained within the 10-year period preceding the application date for certification or within five years from the date of initially passing the exam. Three of the five years of work experience must be gained performing the role of an information security manager.

METHODOLOGY

Each of our security courses is done with a mixture of:• Lectures
• Practical exercises on equipment, simulators
• Case studies and discussions
• Access to our extensive database of past exams questions (with several thousands of sample questions)

FREE Course in Mastering Kali Linux for security investigations
The course is MQA Approved and eligible for HRDC refund.

CISM COURSE MODULES

INFORMATION SECURITY GOVERNANCE - (24%)

• Information Security Governance Overview
• Effective Information Security Governance
• Information Security Concepts and Technologies
• Information Security Manager
• Scope and Charter of Information Security Governance
• Information Security Governance Metrics
• Information Security Strategy Overview
• Creating an Information Security Strategy
• Determining Current State of Security
• Information Security Strategy Development
• Strategy Resources
• Strategy Constraints
• Action Plan to Implement Strategy

INFORMATION RISK MANAGEMENT AND COMPLIANCE - (30%)

• Risk Management Overview
• Good Information Security Risk Management
• Information Security Risk Management Concepts
• Implementing Risk Management
• Risk Assessment
• Controls Countermeasures
• Recovery Time Objectives
• Risk Monitoring and Communication

INFORMATION SECURITY PROGRAM DEVELOPMENT AND MANAGEMENT - (27%)

• Development of Information Security Program
• Information Security Program Objectives
• Information Security Program Development Concepts
• Scope and Charter of Information Security Program Development
• Information Security Management Framework
• Information Security Framework Components
• Information Security Program Resources
• Implementing an Information Security Program
• Information Infrastructure and Architecture
• Information Security Program
• Security Program Services and Operational Activities

INFORMATION SECURITY INCIDENT MANAGEMENT - (19%)

• Incident Management Overview
• Incident Response Procedures
• Incident Management Organization
• Incident Management Resources
• Incident Management Objectives
• Incident Management Metrics and Indicators
• Current State of Incident Response Capability
• Developing an Incident Response Plan
• BCP/DRP
• Testing Response and Recovery Plans

COURSE ORGANISATION & TIMING

We have created a schedule for this course to match with most availabilities.

The course is modular. Courses are hands-on(25% theory, 75% practice)

BENEFITS OF THIS COURSE

There are many benefits in becoming a CISM Certified.

RELATED COURSES - ARTICLES

Ethics in IT

Ethics for IT Professionals

Embarking on a cybersecurity career requires structured learning and certifications. At INFOCLUB Training Centre, we have a plan to make you become a top-level professional in Cybersecurity. Read below a detailed 18-24 month roadmap, highlighting certifications, skills acquired, exam structures, and potential job roles at each stage.

Read More »

Building a Career in Cybersecurity

Embarking on a cybersecurity career requires structured learning and certifications. At INFOCLUB Training Centre, we have a plan to make you become a top-level professional in Cybersecurity. Read below a detailed 18-24 month roadmap, highlighting certifications, skills acquired, exam structures, and potential job roles at each stage.

Read More »

Why IT Kids?

Unleash Your Child’s Digital Potential This Summer with Fun, Hands-On IT Courses! As the summer holidays roll around, it’s time to think beyond the textbooks

Read More »

THE BELBIN MODEL

The Belbin Model, also known as Belbin Team Roles, is a framework for understanding the roles individuals naturally adopt in a team setting. Developed in

Read More »

PRIVACY IN THE MODERN WORLD

What is Privacy? It is the right of an individual to keep their personal information and activities from being disclosed to others without their consent. In our article, we shall review the following: What are the top risks to privacy today, What are the technical solutions to protect privacy, The legal aspect and what is GDPR, How privacy varies across cultures, How new technologies could challenge privacy in the future

Read More »

CONTACT US FOR MORE INFORMATION

Contact Us if you have any questions regarding this course. We are also available after hours for any requests.

SEND US A MESSAGE

FAQs about this course

The CISM (Certified Information Security Manager) course, offered by ISACA, is a globally recognized certification that focuses on information security management. It covers governance, risk management, incident response, and developing security programs aligned with business goals.

Yes, the CISM exam is challenging because it requires both knowledge and practical experience. Candidates must understand security governance and risk management concepts deeply. However, with proper preparation and relevant work experience, it is achievable.

To become CISM certified, candidates need at least five years of work experience in information security management. Some waivers are available for related education or certifications, but professional experience remains a key requirement.

Yes, CISM is highly valued by employers worldwide. It validates management-level expertise in cybersecurity, making it especially beneficial for professionals aspiring to leadership roles such as Information Security Manager, Risk Manager, or Security Consultant.

Salaries for CISM-certified professionals vary by role, country, and experience. Globally, CISM holders often earn high-paying positions, with salaries that are among the top in the cybersecurity and IT governance fields.

Yes, CISM is in strong demand. As organizations face increasing cybersecurity threats, professionals who can manage security programs and align them with business objectives are highly sought after.

Yes, CISM is worth pursuing for professionals looking to advance into leadership roles in cybersecurity and IT governance. It offers career growth, higher salary potential, and global recognition.

CISA and CISM serve different purposes. CISA is best for those focusing on IT audit, control, and assurance, while CISM is ideal for professionals interested in managing and overseeing information security programs. The choice depends on your career goals—CISA for auditors and compliance specialists, CISM for security managers and leaders.

error: Active Learning Copyright content