Self-paced

CISM CertificationTraining – Certified Information Systems Manager

The CISM certification training course is designed to provide on-the-job skills, as well as knowledge to pass the Certified Information System Manager (CISM) certification exam. This cybersecurity training focuses on more advanced topics and should be completed after various certifications in Cisco and Microsoft have been earned, such as PenTest+ or CySA+.

 

With internship

$864

$1199

or

Without internship

$269

$599

this course includes

17 Training Hours

48 On-demand Videos

Closed Captions

6 Topics

100 Prep Questions

Certificate of Completion

What you’ll
learn

01

Information Security Governance

02

Information Risk Management

03

Information Security Program Development and Management

04

Information Security Incident Management

05

Information Security Managers

06

IT Directors and Managers

07

Security Consultants

08

Security Auditors and Architects

09

Security System Engineers

10

CISOs (Chief Information Security Officers)

11

Risk Officers

12

Compliance Officers

13

Network Administrators

14

Legal Professionals

15

Business Analysts

CISM Training Course: A Comprehensive Guide to Becoming a Certified Information Security Manager

The CISM Certification Training Course is your one-stop solution for mastering the skills required to become a Certified Information Security Manager. This advanced-level CISM online training focuses on equipping you with on-the-job skills and the knowledge you need to pass the CISM certification exam. The course is an excellent investment, especially considering the CISM exam cost.

 

course CURRICULUM

Introduction

Instructor Introduction
Course Introduction
Exam Overview

Information Security Governance

Module Overview
InfoSec Strategic Context Part 1
InfoSec Strategic Context Part 2
GRC Strategy and Assurance
Roles and Responsibilities
GMA Tasks Knowledge and Metrics
IS Strategy Overview
Strategy Implemenation
Strategy Development Support
Architecture and Controls
Considerations and Action Plan
InfoSec Prog Objectives and Wrap-Up

Information Security Risk Management

Module Overview
Risk Identification Task and Knowledge
Risk Management Strategy
Additional Considerations
Risk Analysis and Treatment Tasks & Knowledge
Leveraging Frameworks
Assessment Tools and Analysis
Risk Scenario Development
Additional Risk Factors
Asset Classification and Risk Management
Risk Monitoring and Communication
Information Risk Management Summary

InfoSec Prog Development and Management

Module Overview
Alignment and Resource Management - Task and Knowledge
Key Relationships
Standards Awareness and Training - Tasks and Knowledge
Awareness and Training
Building Security into Process and Practices - Tasks and Knowledge
Additional Technology Infrastructure Concerns
Security monitoring and reporting Overview Tasks and Knowledge
Metrics and Monitoring
Summary

Information Security Incident Management

Module Overview
Planning and Integration Overview Task and Knowledge
Incident Response Concepts and Process
Forensics and Recovery
Readiness and Assessment - Overview Tasks and Knowledge
Identification and Response Overview Tasks and Knowledge
Incident Processes

Exam Prep

Case Study - Security On a Shoestring Budget
Case Study - APT In Action
Summary
Exam Prep

Why become a Cybersecurity Engineer?

Growing Demand for Cybersecurity Professionals

The field of cybersecurity is experiencing rapid growth, driven by the escalating number and complexity of cyber threats. Both public and private sectors are investing heavily in cybersecurity measures to protect sensitive information and secure critical infrastructure. This increased investment has created a substantial demand for cybersecurity professionals, and the job market is teeming with opportunities. By becoming a cybersecurity engineer, you position yourself at the forefront of a booming industry with a multitude of career prospects.

Lucrative Salaries and Career Advancement

Cybersecurity professionals are highly sought after, and as a result, they enjoy attractive salaries and excellent benefits. The specialized skills and expertise required in this field command a premium in the job market. Furthermore, as you gain experience and demonstrate your capabilities, the potential for career advancement becomes significant. Cybersecurity engineers can progress to leadership positions, such as Chief Information Security Officer (CISO), and take on strategic roles in shaping an organization's security posture.

Global Relevance and Job Security

Cybersecurity is a global concern affecting organizations of all sizes and industries worldwide. The need for cybersecurity professionals extends beyond borders, making it a globally relevant field. By becoming a cybersecurity engineer, you equip yourself with skills that are in demand not only locally but also internationally. Job security in the field of cybersecurity is robust, as the increasing threat landscape ensures a constant need for skilled professionals to protect against attacks and mitigate risks.

Continuous Learning and Growth

The field of UX/UI design is dynamic and ever-evolving. To stay competitive, designers need to keep learning and adapting to new technologies and design trends. This continuous learning keeps the work interesting and provides opportunities for personal and professional growth.

Opportunities for growth

As software testers gain experience and develop their skills, they can take on more challenging roles and responsibilities. This can lead to promotions and career advancement opportunities. Most Manual testers progress to QA automation, Software development, DevOps, or Cloud Engineering.

Our Talents Work Here
ti.webp
unicard_ltd_logo.jpeg
onecall.png
ibm.png
Fourth_new-logo-e1678350336847.png

Our talentstories

We connect learners with peers and experts from around the world, facilitating networking and collaboration opportunities.

IBT Training's DevOps course provided a comprehensive and insightful learning experience with valuable hands-on exercises. While the internship placement was beneficial, additional guidance could enhance the overall transition. Overall, IBT Training lays a solid foundation for entering the DevOps field.

Olaniyan Olatunde Kubernetes Admin, Microsoft

Enrolling in this course proved career-defining, offering invaluable knowledge and a guaranteed internship. It set me on a path to success, delivering everything promised—free certification, ongoing learning, and the ability to pass my sec+ on the first try.

Solomon Awuku Cybersecurity Analyst, Tek Computers

Upon completing the class, I felt confident and prepared to embark on a career in cybersecurity. The skills and knowledge I acquired have already proven invaluable, as I find myself better equipped to tackle real-world challenges and contribute to the protection of digital assets.

Raymond A. CYBERSECURITY ANALYST BLUE CROSS

"IBT Learning is an outstanding tech school, with experienced teachers. Graduates gain hands-on experience with management tools such as Git, Maven, Nexus, SonarQube, Ansible, Docker for microservices, Kubernetes for container orchestration, and Terraform for Infras as Code"

Landric N DevOps Engineer, Transportation Insight

Your Questions, Answered

What is CISM Certification?

he CISM (Certified Information Security Manager) certification is a highly respected credential in the field of information security management. Offered by ISACA (Information Systems Audit and Control Association), this certification is designed for IT professionals who manage and oversee an organization’s information security.

How long does a CISM certification last?

A CISM (Certified Information Security Manager) certification is valid for three years. To maintain the certification, holders are required to participate in continuing professional education (CPE) activities. ISACA, the organization that offers the CISM certification, mandates that certified professionals earn and report a minimum of 120 CPE credits over a three-year period. Additionally, a minimum of 20 CPE credits must be earned and reported annually.

Who is the instructor for this IT Training Course?

The course instructor is Roger St Hilaire. He brings 30+ years of experience in IT and various certifications including CISM, CGEIT, MOF, TOGAF, and PSP-Rainmaker Foundation. Roger has a proven track record of designing and managing large-scale technology systems and has achieved remarkable results in various domains of IT.

What are the prerequisites for the CISM Training Online Course?

To undertake this course, you should already have some experience in information security management. Specifically, you need to submit evidence verifying at least five years of experience in data security, with a 3-year information security management requirement dedicated to security experience spread across multiple security business model disciplines. This job practice analysis should be completed within 10 years leading up to your CISM application date or within 5 years from when you initially passed the exam​.

What modules does the CISM IT Training Course include?

The CISM Training Course consists of six modules: Information Security Governance, Information Security Risk Management, InfoSec Program Development and Management, Information Security Incident Management, and Exam Prep. Each module comes with a variety of sub-topics to give you a comprehensive understanding of the subject matter.

What type of content does the online course offer?

The CISM Training Online Course provides a mix of 48 on-demand videos and 100 prep questions for comprehensive learning. You’ll cover six topics across 17 training hours, ensuring you are well-prepared for the CISM certification exam. The course also includes closed captions for accessibility.