Certified Information Security Manager (CISM)
Certified Information Security Manager (CISM)
Certified Information Security Manager (CISM) CertificationÂ


- Security Governance – Establish frameworks, gain management support, and implement strategies.
- Risk Management – Identify, analyze, monitor, and report security risks effectively.
- Program Development & Management – Align security programs with business goals and optimize resources.
- Incident Management – Plan, respond, and ensure business continuity during security incidents.

Fundamental Learnings
Training by Top Microsoft-Certified Trainers
1 Day of Live, Instructor-Led Sessions
Latest, Up-to-date Curriculum, Approved by Industry Experts
Access to a Digital Library of Learning Resources
Comprehensive Knowledge of Core Learnings
Blend of classroom sessions and hands-on training
Schedules
Prerequisites for this Courese

Things Included in the course learning
Course Curriculum
Domain 1: Information Security Governance
Organizational Culture
• Legal, Regulatory and Contractual Requirements
• Organizational Structures, Roles and Responsibilities
• Information Security Strategy Development
• Information Governance Frameworks and Standards
• Strategic Planning (e.g., Budgets, Resources, Business Case)
Domain 2: Information Security Risk Management
• Emerging Risk and Threat Landscape
• Vulnerability and Control Deficiency Analysis
• Risk Assessment and Analysis
• Risk Treatment / Risk Response Options
• Risk and Control Ownership
• Risk Monitoring and Reporting
Domain 3: Information Security Program
• Information Security Program Resources (e.g., People, Tools, Technologies)
• Information Asset Identification and Classification
• Industry Standards and Frameworks for Information Security
• Information Security Policies, Procedures and Guidelines
• Information Security Program Metrics
• Information Security Control Design and Selection
• Information Security Control Implementation and Integrations
• Information Security Control Testing and Evaluation
• Information Security Awareness and Training
• Management of External Services (e.g., Providers, Suppliers, Third Parties, Fourth Parties)
• Information Security Program Communications and Reporting
Domain 4: Incident Management
• Incident Response Plan
• Business Impact Analysis (BIA)
• Business Continuity Plan (BCP)
• Disaster Recovery Plan (DRP)
• Incident Classification/Categorization
• Incident Management Training, Testing and Evaluation
• Incident Management Tools and Techniques
• Incident Investigation and Evaluation
• Incident Containment Methods
• Incident Response Communications (e.g., Reporting, Notification, Escalation)
• Incident Eradication and Recovery
• Post-Incident Review Practices
Things Included in the course learning
Our Learners Love Us

Recently attended the Scrum Master course. The instructor demonstrated profound knowledge of Agile methodologies and Scrum in particular. Comprehensive course materials, including slides, workbooks, and supplementary readings, have become invaluable resources that I frequently reference in my daily role.

This is an amazing training ecosystem. They had assigned individual relationship managers who not only did the tactical things of reminding of sessions etc, but they also connected me with people who were experts for career guidance. This is the best example of customer delight - you not just engage clients but delight them! Highly recommended for Agile related courses.

I did a PSM-1course from One iTech and it was truly an enriching experience. The trainer was very good and has full expertise on the subject. He was quite interactive and engaging, always ensured everyone understood the concepts and fundamentals of Scrum Agile. He kept revising and recapping all important concepts throughout the session during these two days.

One iTech is very professional in handling entire process. They make sure all the support is provided during training and afterwards. I have done 2 courses with them and both times it was a great experience. The workshop was a well-organized event. The trainer was an expert which made it a valuable training.

What will I learn in this course
Output of this Course
- Security Governance – Establish frameworks, gain management support, and implement strategies.
- Risk Management – Identify, analyze, monitor, and report security risks effectively.
- Program Development & Management – Align security programs with business goals and optimize resources.
- Incident Management – Plan, respond, and ensure business continuity during security incidents.
Who Should Enroll Now Azure AI Fundamentals Course
Who is this course for
- Information Security Managers
- IT Auditors
- Risk Managers
- Chief Information Officers (CIOs)
- Chief Information Security Officers (CISOs)
- IT Consultants specializing in information security
- IT Directors or Managers responsible for security
- Security Systems Engineers
- Security Architects and Designers
- IT Professionals aspiring to management roles in Information Security
- Compliance Officers responsible for IT security compliance
- Information Security Analysts
- Network Architects and Engineers focusing on security
- Data Protection Officers (DPOs)

-
LevelIntermediate
-
Duration32 hours
-
Last UpdatedFebruary 1, 2025
-
CertificateCertificate of completion