Washington University in St. Louis

SECP18: CISM - Certified Information Security Manager ($2,995)

Washington University Logo
Course summary - 30hrs:

The CISM training course focuses on information security management and governance, covering topics such as the creation of security programs and incident management. With the increasing demand for skilled information security professionals, CISM has become a universal standard for the industry. Possession of this certification demonstrates precise knowledge, practical experience, and commitment to the field, making CISM holders some of the most certified professionals in information security.

Through the CISM certification, delegates learn how to tailor ever-changing technology to their enterprises and align information security programs with larger organizational goals. This enables organizations to emerge as valuable players in the industry and expand their clientele. Join the CISM cybersecurity training course and become a recognized expert in information security management.

Course outline:

Domain 1 – Information Security Governance

  • Information Security Governance
  • Effective Information Security Governance
  • Governance and Third Party Relationships
  • Information Security Metrics
  • Information Security Governance Metrics
  • Information Security Strategy
  • Information Security Strategy Development
  • Strategy Resources and Constraints
  • Other Frameworks and Compliances
  • Action Plans to Implement Strategy
  • Governance of Enterprise IT

Domain 2 – Information Risk Management and Compliance

  • Risk Management Overview
  • Risk Assessment
  • Information Asset Classification
  • Assessment Management
  • Information Resource Valuation
  • Recovery Time Objectives
  • Security Control Baselines
  • Risk Monitoring and Training and Awareness
  • Information Risk Management Documentation

Domain 3 – Information Security Program Development and Management

  • Information Security Program Management Overview
  • Information Security Program Objectives and Concepts
  • Information Security Program Technology Resources
  • Information Security Program Development and Framework
  • Information Security Program Roadmap and EISA
  • Security Program Management, Administration, Services and Operational Activities
  • Controls, Metrics and Monitoring
  • Measuring Operational Performance and Common Information Security Program Challenges

Domain 4 – Information Security Incident Management

  • Incident Management Overview and Procedures
  • Incident Management Resources and Objectives
  • Incident Management Metrics and Indicators
  • Business Continuity and Disaster Recovery Procedures
  • Post-Incident Activities and Investigation
  • ISACA Code of Professional Ethics, Laws, Regulations and Policies
Learning outcomes:
  • Identify critical issues and customize company-specific practices to support the governance of information and related technologies
  • Bring credibility to the enterprise for which they are employed
  • Take a comprehensive view of information systems security management and their relationship to organizational success
  • Demonstrate to enterprise customers their commitment to compliance, security and integrity; ultimately contributing to the attraction and retention of customers
  • Ensure that there is improved alignment between the organization's information security program, executives and its broader goals and objectives
  • Provide the enterprise with a certification for Information security management that is recognized by multinational clients and enterprises, lending credibility to the enterprise
Day & Time:
Sept 16-19
Monday - Friday 
4:00 to 8:00PM
Enrollment Deadline:
Sept 9, 2024
Course Fee(s):

Enrollment Deadline is Monday September 9, 2024 at 5 PM CST. Beyond this date, please call 314-935-4444 to register.

Parking and refreshments are provided.

A full refund will be given when a registrant cancels more than five (5) business days prior to the start of the class. Cancellations received within 5 business days of the start of the class and no-shows will be billed in full. Another person may be substituted at any time at no additional charge.

A request to transfer a class to a future date can only occur if the request is more than 5 business days prior to the start of class.  Otherwise, the request will be considered a cancellation and the policy will apply.
Thank you for your interest! Currently, we don't have any additional sessions with availability. However, we're committed to offering ongoing learning opportunities and are working to add more sessions in the future. We appreciate your interest and look forward to the opportunity to support your professional growth soon.

There are no prerequisites to take this course; however, to get the CISM certification you need to:

  • Pass the CISM examination
  • Submit an application for CISM certification
  • Adhere to the Code of Professional Ethics
  • Dedicate to the Continuing Professional Education Program
  • Compliance with the Information Security Standards

CISM certification is a globally recognized professional requirement in the IT Security domain. This certification is best suited for:

  • Security consultants and managers
  • IT directors and managers
  • Security auditors and architects
  • Security systems engineers
  • Chief Information Security Officers (CISOs)
  • Information security managers
  • IS/IT consultants
  • Chief Compliance/Privacy/Risk Officers
The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals or objectives.
Have questions?
Contact us if you would like to speak with a program director or visit our Frequently Asked Questions page.