Certified Information Security Manager (CISM)

Certified Information Security Manager (CISM)

Certified Information Security Manager (CISM) Certification 

Enrolled 0
  • Security Governance – Establish frameworks, gain management support, and implement strategies.
  • Risk Management – Identify, analyze, monitor, and report security risks effectively.
  • Program Development & Management – Align security programs with business goals and optimize resources.
  • Incident Management – Plan, respond, and ensure business continuity during security incidents.
Categories ISACA

Fundamental Learnings

Training by Top Microsoft-Certified Trainers

1 Day of Live, Instructor-Led Sessions

Latest, Up-to-date Curriculum, Approved by Industry Experts

Access to a Digital Library of Learning Resources

Comprehensive Knowledge of Core Learnings

Blend of classroom sessions and hands-on training

Schedules

Contact Us

Ready to unlock the full potential and become an expert?

Prerequisites for this Courese

Things Included in the course learning

Course Curriculum

Domain 1: Information Security Governance
Organizational Culture • Legal, Regulatory and Contractual Requirements • Organizational Structures, Roles and Responsibilities • Information Security Strategy Development • Information Governance Frameworks and Standards • Strategic Planning (e.g., Budgets, Resources, Business Case)

Domain 2: Information Security Risk Management
• Emerging Risk and Threat Landscape • Vulnerability and Control Deficiency Analysis • Risk Assessment and Analysis • Risk Treatment / Risk Response Options • Risk and Control Ownership • Risk Monitoring and Reporting

Domain 3: Information Security Program
• Information Security Program Resources (e.g., People, Tools, Technologies) • Information Asset Identification and Classification • Industry Standards and Frameworks for Information Security • Information Security Policies, Procedures and Guidelines • Information Security Program Metrics • Information Security Control Design and Selection • Information Security Control Implementation and Integrations • Information Security Control Testing and Evaluation • Information Security Awareness and Training • Management of External Services (e.g., Providers, Suppliers, Third Parties, Fourth Parties) • Information Security Program Communications and Reporting

Domain 4: Incident Management
• Incident Response Plan • Business Impact Analysis (BIA) • Business Continuity Plan (BCP) • Disaster Recovery Plan (DRP) • Incident Classification/Categorization • Incident Management Training, Testing and Evaluation • Incident Management Tools and Techniques • Incident Investigation and Evaluation • Incident Containment Methods • Incident Response Communications (e.g., Reporting, Notification, Escalation) • Incident Eradication and Recovery • Post-Incident Review Practices

Things Included in the course learning

Our Learners Love Us

Preeti Bhatiya Project Manager

Recently attended the Scrum Master course. The instructor demonstrated profound knowledge of Agile methodologies and Scrum in particular. Comprehensive course materials, including slides, workbooks, and supplementary readings, have become invaluable resources that I frequently reference in my daily role.

Ritesh Jain Project Mangaer

This is an amazing training ecosystem. They had assigned individual relationship managers who not only did the tactical things of reminding of sessions etc, but they also connected me with people who were experts for career guidance. This is the best example of customer delight - you not just engage clients but delight them! Highly recommended for Agile related courses.

Kshitij M Team Lead

I did a PSM-1course from One iTech and it was truly an enriching experience. The trainer was very good and has full expertise on the subject. He was quite interactive and engaging, always ensured everyone understood the concepts and fundamentals of Scrum Agile. He kept revising and recapping all important concepts throughout the session during these two days.

Sakshi Jha AI Developer

One iTech is very professional in handling entire process. They make sure all the support is provided during training and afterwards. I have done 2 courses with them and both times it was a great experience. The workshop was a well-organized event. The trainer was an expert which made it a valuable training.

What will I learn in this course

Output of this Course

  • Security Governance – Establish frameworks, gain management support, and implement strategies.
  • Risk Management – Identify, analyze, monitor, and report security risks effectively.
  • Program Development & Management – Align security programs with business goals and optimize resources.
  • Incident Management – Plan, respond, and ensure business continuity during security incidents.

Who Should Enroll Now Azure AI Fundamentals Course

Who is this course for

  • Information Security Managers
  • IT Auditors
  • Risk Managers
  • Chief Information Officers (CIOs)
  • Chief Information Security Officers (CISOs)
  • IT Consultants specializing in information security
  • IT Directors or Managers responsible for security
  • Security Systems Engineers
  • Security Architects and Designers
  • IT Professionals aspiring to management roles in Information Security
  • Compliance Officers responsible for IT security compliance
  • Information Security Analysts
  • Network Architects and Engineers focusing on security
  • Data Protection Officers (DPOs)
$98.50

Want to receive push notifications for all major on-site activities?

✕
Scroll to Top